Ratings and Reviews 0 Ratings
Ratings and Reviews 179 Ratings
What is SOC ITrust?
ITrust runs the Control and Supervision Center, also known as the Security Operation Center (SOC), which is committed to managing the security protocols of an organization, either entirely or partially. By leveraging the expertise of our IT security professionals, you can concentrate on your core business goals while we take care of the cybersecurity for your information systems. Commonly recognized as a Managed Security Services Provider (MSSP) or Managed Detection and Response (MDR), we focus on protecting your business and efficiently addressing any security threats that may occur. The SOC that ITrust either sets up or manages significantly strengthens your cyber defense mechanisms, ensuring your services remain available at a competitive price while complying with all relevant regulations. Our intuitive graphical interface stands out for its clarity and customizability, offering a detailed overview of activities and facilitating thorough monitoring of security across your servers, routers, applications, databases, and websites. This guarantees that you are continuously updated about the cybersecurity posture of your organization, empowering informed decision-making. Furthermore, our dedicated team is committed to adapting to the evolving digital landscape, ensuring that your security measures are always one step ahead of potential threats.
What is ManageEngine EventLog Analyzer?
Manage Engine's EventLog Analyzer stands out as the most cost-effective security information and event management (SIEM) software in the market. This secure, cloud-based platform encompasses vital SIEM functionalities such as log analysis, log consolidation, user activity surveillance, and file integrity monitoring. Additional features include event correlation, forensic analysis of logs, and retention of log data. With its robust capabilities, real-time alerts can be generated, enhancing security response. By utilizing Manage Engine's EventLog Analyzer, users can effectively thwart data breaches, uncover the underlying causes of security challenges, and counteract complex cyber threats while ensuring compliance and maintaining a secure operational environment.
Integrations Supported
Kayako
ManageEngine ServiceDesk Plus
Zendesk
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$595
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
ITrust
Company Location
France
Company Website
www.itrust.fr/en/security-control-centre-soc/
Company Facts
Organization Name
ManageEngine
Date Founded
1996
Company Location
United States
Company Website
www.manageengine.com/products/eventlog/log-management-tool.html
Categories and Features
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Categories and Features
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring