ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Intezer Protect is a security orchestration, automation, and response (SOAR) software that provides businesses with tools to identify potential threats across public/private cloud environments. Supervisors can use the dashboard to gain an overview of asset performance or identified vulnerabilities via actionable analytics.
Intezer Protect is a security orchestration, automation, and response (SOAR) software that provides businesses with tools to identify potential...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$40.00/year

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(11)

Ease of Use

4.8/ 5

Features

4.5/ 5

Customer Service

4.8/ 5

Value for Money

4.8/ 5

No reviews available

Already have Intezer Protect?

Write a Review!

Total features 60

  • AI/Machine Learning
  • Activity Dashboard
  • Alerts/Notifications
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Tracking
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Correlation Analysis
  • Dashboard
  • Data Security
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Firewalls
  • IP Address Monitoring
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Risk Scoring
  • Secure Data Storage
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting

Total features 19

  • AI/Machine Learning
  • Activity Dashboard
  • Alerts/Notifications
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Tracking
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Correlation Analysis
  • Dashboard
  • Data Security
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Firewalls
  • IP Address Monitoring
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Risk Scoring
  • Secure Data Storage
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Azure Active Directory
  • Microsoft 365
  • Slack
  • Azure Active Directory
  • Microsoft 365
  • Slack