ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(11)

Ease of Use

4.8/ 5

Features

4.5/ 5

Customer Service

4.8/ 5

Value for Money

4.8/ 5

Overall rating

4.3 /5
(3)

Ease of Use

4/ 5

Features

4.7/ 5

Customer Service

3.3/ 5

Value for Money

4.3/ 5

Total features 60

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Cloud Application Security
  • Cloud Backup
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Monitoring
  • Correlation Analysis
  • Customizable Reports
  • Customization
  • DDoS Protection Software
  • Dashboard
  • Dashboard Creation
  • Data Analysis Tools
  • Data Collection
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deployment Management
  • Device Management
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • IP Address Monitoring
  • IT Asset Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Load Balancing Tools
  • Log Access
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Mobile Access
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Network Scanning
  • Next-Generation Firewall
  • Policy Management
  • Prioritization
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Risk Reporting
  • Risk Scoring
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Summary Reports
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 90

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Authentication
  • Bandwidth Monitoring
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Cloud Application Security
  • Cloud Backup
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configuration Management
  • Continuous Monitoring
  • Correlation Analysis
  • Customizable Reports
  • Customization
  • DDoS Protection Software
  • Dashboard
  • Dashboard Creation
  • Data Analysis Tools
  • Data Collection
  • Data Import/Export
  • Data Security
  • Data Visualization
  • Deployment Management
  • Device Management
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • IP Address Monitoring
  • IT Asset Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Load Balancing Tools
  • Log Access
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Mobile Access
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Resource Management
  • Network Scanning
  • Next-Generation Firewall
  • Policy Management
  • Prioritization
  • Ransomware Protection
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Risk Reporting
  • Risk Scoring
  • Root Cause Analysis
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Server Logs
  • Server Monitoring
  • Summary Reports
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Uptime Reporting
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management
  • Azure Active Directory
  • Microsoft 365
  • Proofpoint Email Protection
  • Zscaler
  • Azure Active Directory
  • Microsoft 365
  • Proofpoint Email Protection
  • Zscaler