Haltdos vs ManageEngine Log360
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
No images available
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
5/ 5Features
2/ 5Customer Service
1/ 5Value for Money
2/ 5Ease of Use
4.8/ 5Features
4.5/ 5Customer Service
4.8/ 5Value for Money
4.8/ 5Features
Total features 99
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Security
- Archiving & Retention
- Assessment Management
- Audit Management
- Audit Trail
- Authentication
- Automatic Configuration
- Backup and Recovery
- Bandwidth Monitoring
- Behavior Tracking
- Behavioral Analytics
- Bot Detection
- Bot Mitigation
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Compression
- Configuration Management
- Content Caching
- Content Routing
- Correlation Analysis
- DDoS Protection Software
- Dashboard
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Email Alerts
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Firewalls
- Fraud Detection
- HTTP Caching
- Health Monitoring
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Intrusion Detection System
- Load Distribution
- Log Analysis Software
- Log Collection
- Log Management
- Monitoring
- Multi-Cloud Management
- Network Analysis
- Network Monitoring
- Network Provisioning
- Network Resource Management
- PCI Compliance
- Password Management
- Patch Management
- Performance Metrics
- Policy Management
- Predefined Protocols
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Redundancy Checking
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Reverse Proxy
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Reporting
- Risk Scoring
- SSL Decryption
- SSL Offload
- SSL Security
- Schedulers
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Logs
- Server Monitoring
- Single Sign On
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Tokenization
- Traffic Control
- Two-Factor Authentication
- Uptime Reporting
- User Management
- VPN Software
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Traffic Monitoring
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Total features 60
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Notifications
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Security
- Archiving & Retention
- Assessment Management
- Audit Management
- Audit Trail
- Authentication
- Automatic Configuration
- Backup and Recovery
- Bandwidth Monitoring
- Behavior Tracking
- Behavioral Analytics
- Bot Detection
- Bot Mitigation
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Compression
- Configuration Management
- Content Caching
- Content Routing
- Correlation Analysis
- DDoS Protection Software
- Dashboard
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Email Alerts
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Firewalls
- Fraud Detection
- HTTP Caching
- Health Monitoring
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Intrusion Detection System
- Load Distribution
- Log Analysis Software
- Log Collection
- Log Management
- Monitoring
- Multi-Cloud Management
- Network Analysis
- Network Monitoring
- Network Provisioning
- Network Resource Management
- PCI Compliance
- Password Management
- Patch Management
- Performance Metrics
- Policy Management
- Predefined Protocols
- Prioritization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Redundancy Checking
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Reverse Proxy
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Reporting
- Risk Scoring
- SSL Decryption
- SSL Offload
- SSL Security
- Schedulers
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Logs
- Server Monitoring
- Single Sign On
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Tokenization
- Traffic Control
- Two-Factor Authentication
- Uptime Reporting
- User Management
- VPN Software
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Traffic Monitoring
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Integrations
Not provided by vendor
- Azure Active Directory
- Microsoft 365