EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

N/A

  • Free
  • Subscription

Starting from

  • Free
  • Subscription

Overall rating

4,7 /5
(3)
Ease of Use
4,7/5
Features & Functionality
5/5
Customer Service
5/5
Value for Money
4,3/5

Overall rating

3,6 /5
(22)
Ease of Use
3,1/5
Features & Functionality
3,9/5
Customer Service
4/5
Value for Money
3,8/5

Total features 70

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Management
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Backup and Recovery
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • CPU Monitoring
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Security
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • FISMA Compliance
  • File Integrity Monitoring
  • File Management
  • Filtering
  • Financial Data Protection
  • Firewalls
  • Forensic Analysis
  • HIPAA Compliant
  • Historical Reporting
  • IP Address Monitoring
  • ISO Compliance
  • Incident Management
  • Intrusion Detection System
  • Issue Auditing
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Maintenance Scheduling
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Security Software
  • PCI Assessment
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Scheduled / Automated Reports
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Management
  • VPN Software
  • Version Control
  • Virtual Machine Monitoring
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 80

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Management
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Backup and Recovery
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • CPU Monitoring
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard
  • Dashboard Creation
  • Data Security
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • FISMA Compliance
  • File Integrity Monitoring
  • File Management
  • Filtering
  • Financial Data Protection
  • Firewalls
  • Forensic Analysis
  • HIPAA Compliant
  • Historical Reporting
  • IP Address Monitoring
  • ISO Compliance
  • Incident Management
  • Intrusion Detection System
  • Issue Auditing
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Maintenance Scheduling
  • Monitoring
  • Network Analysis
  • Network Monitoring
  • Network Security Software
  • PCI Assessment
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Management
  • Role-Based Permissions
  • Root Cause Analysis
  • Sarbanes-Oxley Compliance
  • Scheduled / Automated Reports
  • Scheduling
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Management
  • VPN Software
  • Version Control
  • Virtual Machine Monitoring
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management