Best Logentries Alternatives in 2024
Find the top alternatives to Logentries currently available. Compare ratings, reviews, pricing, and features of Logentries alternatives in 2024. Slashdot lists the best Logentries alternatives on the market that offer competing products that are similar to Logentries. Sort through Logentries alternatives below to make the best choice for your needs
-
1
Site24x7
ManageEngine
672 RatingsSite24x7 provides unified cloud monitoring to support IT operations and DevOps within small and large organizations. The solution monitors real users' experiences on websites and apps from both desktop and mobile devices. DevOps teams can monitor and troubleshoot applications and servers, as well as network infrastructure, including private clouds and public clouds, with in-depth monitoring capabilities. Monitoring the end-user experience is done from more 100 locations around the globe and via various wireless carriers. -
2
ManageEngine EventLog Analyzer
ManageEngine
148 RatingsEventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks. -
3
CPTRAX for Windows
Visual Click Software
1 RatingServer File Activity Tracking – Audit who is creating, accessing and moving your files and folders. Track file permission changes. Alerts in real-time about critical file activity Malicious activity containment (Ransomware and mass file deletions, etc. Automatically stop threats to your Windows servers by calling PowerShell scripts so you can determine exactly what you want to have happen for each type of alert/threat. Examples of containment: Disable the user causing the threat Block the remote IP causing the threat Workstation File Activity Tracking: Audit who copies files to USB or other removable media. Track who uploads files via FTP or a browser. Block files being created on USB/removable devices. Notifications by email when a removable device connects. Active Directory Auditing – Keep audit logs and receive real-time alerts about important Active Directory changes, without having to deal with SACLs or Windows Event Logs. Server Authentication Auditing: Track authentications into Citrix sessions and Windows Servers. All failed logon attempts are reviewed. Workstation Logon/Logoff Tracking: Get visibility on logons/logoffs at workstations, including locks, unlocks and password changes. -
4
Sematext Cloud
Sematext Group
$0 62 RatingsSematext Cloud provides all-in-one observability solutions for modern software-based businesses. It provides key insights into both front-end and back-end performance. Sematext includes infrastructure, synthetic monitoring, transaction tracking, log management, and real user & synthetic monitoring. Sematext provides full-stack visibility for businesses by quickly and easily exposing key performance issues through a single Cloud solution or On-Premise. -
5
PagerDuty
PagerDuty
44 RatingsPagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits. -
6
Coralogix
Coralogix
Coralogix is the most popular stateful streaming platform, providing engineering teams with real-time insight and long-term trend analysis without relying on storage or indexing. To manage, monitor, alert, and manage your applications, you can import data from any source. Coralogix automatically narrows the data from millions of events to common patterns, allowing for faster troubleshooting and deeper insights. Machine learning algorithms constantly monitor data patterns and flows among system components and trigger dynamic alarms to let you know when a pattern is out of the norm without the need for static thresholds or pre-configurations. Connect any data in any format and view your insights anywhere, including our purpose-built UI and Kibana, Grafana as well as SQL clients and Tableau. You can also use our CLI and full API support. Coralogix has successfully completed the relevant privacy and security compliances by BDO, including SOC 2, PCI and GDPR. -
7
Errsole Cloud
errsole
0Errsole is a bug-tracking solution that helps streamline logging and debugging for Node.js live apps. The platform offers various functionalities such as error tracking, slow request logging, and centralized logging. Errsole also provides real-time error notifications and daily summaries via Email or Slack. Additionally, the solution helps developers debug live applications directly from their web browsers. - Centralized Logging: Errsole centralizes all application logs from servers in one place. - Error Tracking: Errsole centralizes all application errors in one place for viewing and resolution. - Root Cause Analysis: With Errsole, developers can pinpoint the exact HTTP requests that caused errors. - Slow Request Logging: Errsole tracks and records slow HTTP requests in the application, enabling users to pinpoint and address performance bottlenecks. - Debugging: With Errsole Debugger, developers can debug live applications directly from their web browser. - Collaboration: Invite developers to the app, manage their permissions, and assign errors to individual developers. -
8
SpectX
SpectX
$79/month SpectX is a powerful log analysis tool for data exploration and incident investigation. It does not index or ingest data, but it runs queries directly on log files in file systems and blob storage. Local log servers, cloud storage Hadoop clusters JDBC-databases production servers, Elastic clusters or anything that speaks HTTP – SpectX transforms any text-based log file into structured virtual views. SpectX query language was inspired by Unix piping. Analysts can create complex queries and gain advanced insights with the extensive library of query functions that are built into SpectX. Each query can be executed via the browser-based interface. Advanced options allow you to customize the resultset. This makes it easy for SpectX to be integrated with other applications that require clean, structured data. SpectX's easy-to-read pattern-matching language can match any data without the need to read or create regex. -
9
Corner Bowl Event Log Manager
Corner Bowl Software Corporation
$84 4 RatingsA Centralized Windows Event Log Management Software Tool for Enterprises. A Centralized Log Consolidator. A real-time Windows Event Log, Syslog, and Application Log Monitor software tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS PCI/DSS. HIPAA, SOX. GDPR, CIS Microsoft 365 Security & Compliance and more. 80+ pre-built reports. A Windows Event Log Viewer that is enhanced with advanced search and filtering capabilities. Windows Event Logs, Syslogs and text-based Application Logs on Windows, Linux and the cloud-based Azure Active Directory Audit Logs are supported. Log entries can be saved to a local or remote log repository once they have been harvested. Event Log Manager offers 5 methods to centralize log entries, including MySQL, Microsoft SQL Server and elasiticsearch. -
10
KloudMate
KloudMate
$60 per monthSquash latencies and detect bottlenecks. Debug errors. Join the rapidly growing community of businesses around the globe that are achieving a 20X ROI and value by adopting KloudMate compared to other observability platforms. Monitor critical metrics and dependencies quickly, and detect anomalies using alarms and issue trackers. Locate 'breakpoints' within your application development lifecycle to fix issues proactively. View service maps of every component within your application and discover intricate dependencies and interconnections. Track every request and operation to gain detailed visibility into performance metrics and execution paths. Unified Infrastructure Monitoring capabilities can be used to monitor metrics, regardless of whether it is a multi-cloud, private, hybrid or hybrid architecture. A complete system view will help you debug faster and more precisely. Identify and solve issues faster. -
11
Honeycomb
Honeycomb.io
$70 per monthLog management. Upgraded Honeycomb. Honeycomb is designed for modern developers to help them understand and improve their log management. You can quickly query system logs, metrics, and traces to find unknown unknowns. Interactive charts provide the most detailed view against raw, high-cardinality data. You can set Service Level Objectives (SLOs), based on what users are most interested in, to reduce noise alerts and prioritize work. Customers will be happy if you reduce on-call time, ship code faster, and minimize the amount of work required. Find the cause. Optimize your code. View your prod in high-res. -
12
SolarWinds Papertrail
SolarWinds
$7 per monthLog management that is easy and painless. You can get started in seconds. -
13
ArcSight Recon
OpenText
Log management and security analytics solutions can be implemented to improve compliance and speed up forensic investigation. Big-data search, visualization and reporting are key to identifying and defeating threats. You can access terabytes from any source. SmartConnectors can make SIEM log management easier. They collect, normalize and aggregate data from over 480 source types. Source types include clickstreams, stream traffic, security devices and web servers. The columnar database of ArcSight Recon responds faster to queries than traditional databases. This allows you to efficiently and quickly investigate millions of events. It allows for threat hunting in large datasets, which allows security analytics at scale. ArcSight Recon reduces compliance burden by providing content that facilitates regulatory requirements. Its built-in reports reduce the time it takes to document compliance. -
14
LOGalyze
Zuriel
LOGalyze, an open-source, centralized log management software and network monitoring software, is available. LOGalyze can be used to manage all your log data from one location. It supports Linux/Unix servers and network devices. It can detect real-time events and provide extensive search capabilities. This open-source application log analyzer can collect log data from any device and analyze, normalize and interpret them with any Log Definition. You can also use the built in Statistics and Report Definitions, or create your own. Correlating log data can be used to create Alerts and Events. The ticketing system is a powerful tool to quickly close open incidents. LOGalyze, an open-source network management tool, helps to reduce internal costs, improve network uptime, and eliminate unwanted network traffic. The built-in scheduled Reports provide a comprehensive overview of the entire network. -
15
Retrospective
Retrospective
$92 per yearRetrospective and your laptop can turn tedious search and monitoring processes into a few minutes of work. Retrospective can turn tedious search and monitoring processes into a few minutes' work. No log collector agents or additional software is required. Retrospective allows you to search and monitor large collections of log files from local and remote sources, without overloading your server. Retrospective has advanced features that allow you to browse your files and explore the results of your search. The guided search criteria composer allows you to monitor container log data, and pinpoint areas of particular interest in your local logs. Retrospective gives you a unified overview of your Docker installation, even if several containers are running simultaneously. The tabularized data is exportable in different formats for other analysis software. -
16
LogFusion
Binary Fortress Software
LogFusion is a powerful log monitoring tool for developers and system administrators! You can create custom filtering, highlighting rules and more. LogFusion settings can be synced between computers. LogFusion's powerful custom highlighter allows you to match text strings and regex patterns, and format the matched lines to your specifications. LogFusion's Advanced Text filtering allows you to filter out and hide lines that do not match your search text. This is done in real-time, as new lines are added. Complex queries can be easily narrowed down to your results. LogFusion can automatically add logs from Watched Folders. LogFusion can automatically open log files created in the folders you specify. -
17
SolarWinds Log Analyzer
SolarWinds
You can quickly and easily examine machine data to identify the root cause of IT problems faster. Log aggregation, filtering, filtering, alerting, and tagging are all part of this intuitive and powerfully designed system. Integrated with Orion Platform products, it allows for a single view of IT infrastructure monitoring logs. Because we have experience as network and system engineers, we can help you solve your problems. Log data is generated by your infrastructure to provide performance insight. Log Analyzer log monitoring tools allow you to collect, consolidate, analyze, and combine thousands of Windows, syslog, traps and VMware events. This will enable you to do root-cause analysis. Basic matching is used to perform searches. You can perform searches using multiple search criteria. Filter your results to narrow down the results. Log monitoring software allows you to save, schedule, export, and export search results. -
18
SolarWinds Loggly
SolarWinds
FreeSolarWinds®, Loggly®, is a cost-effective, hosted and scalable multi-source log management system that combines powerful search and analytics with extensive alerting, dashboarding and reporting to help you identify potential problems and reduce Mean Time to Fix (MTTR). LOGGLY AT A GLANCE >> Full-stack log aggregation, log monitoring and data analytics Log analytics provides context and patterns for events, as well as anomalies that can be used to gain deeper insights. >> Highly scalable to ingest large data volumes and enable quick searching across large and complicated environments >> Spot usage patterns with application, service, and infrastructure-aligned historical analysis of user, log, and infrastructure data >> Manage by exception: Identify variations from the norm with powerful log formatting capabilities and analytic search capabilities -
19
Nagios Log Server
Nagios Enterprises
$1995.00/one-time Nagios Log Server greatly simplifies the process for searching log data. You can set up alerts to be notified when possible threats are detected, or query your log data to quickly inspect any system. Nagios Log Server allows you to store all your log data in one place, with fail-over and high availability built in. You can quickly configure your servers to send log data using the easy source setup wizards. Then, you can start monitoring your logs within minutes. In just a few clicks, you can easily correlate log events across all servers. Nagios Log Server allows for you to see log data in real time, allowing you to quickly analyze and resolve problems as they arise. This ensures that your organization is safe, secure, streamlined, and runs smoothly. Nagios Log Server gives users advanced awareness of their infrastructure. Deep dive into logs, network events, and security events. Log Server can provide the evidence you need to track down security threats and quickly fix vulnerabilities using built-in alerts. -
20
Oracle Log Analytics Cloud Service analyzes, aggregates and indexes log data from your applications. This allows users to search, explore and correlate the data to help them troubleshoot faster, gain operational insight, make better decisions, and take better decisions. Identify and resolve potential problems quickly. Develop and operate together. Real-time operational insight into the health and availability of applications.
-
21
Corner Bowl Server Manager
Corner Bowl Software Corporation
$20 one-time fee 5 RatingsSIEM, Log Management Software, Server Monitoring, and Uptime Monitoring Software for less! Industry-leading, free and responsive remote support phone and email when you need it most. You can be compliant by centrally storing Event Logs as well as Syslogs and Application Logs from any device or system. Receive real-time notifications when users log in, accounts are locked out, or accounts are modified. Our out-of-the box SIEM and security reports will satisfy auditing requirements such as PCI/DSS, JSIG, NIST, CJIS, SOX, HIPAA and GDPR. Monitor server resources, such as memory, disk space and directory size, and monitor process specific resource consumption. Fire SNMP traps, restart services, kill processes, remote-launch custom scripts, and kill processes. Generate audit reports on directory and file access. Monitor SNMP Get values, receive SNMP traps and more. Receive real-time notifications when network performance drops below acceptable thresholds. Monitor web, email and database performance. Monitor Docker Containers. -
22
LOGIQ
LOGIQ.AI
LogIQ.AI's LogFlow allows you to centrally manage your observability data pipes. Data streams are automatically organized and optimized as they arrive for your business teams or knowledge workers. XOps teams can centralize the management of data flows, increase data quality, and relevance. LogFlow's InstaStore, which can be built on any object store allows for infinite data retention and data replay to any target observation platform of your choosing. Analyze operational metrics across applications, infrastructure and gain actionable insight that will help you scale with confidence and maintain high availability. By analyzing and collecting behavioral data from business systems, you can help your business make better business decisions and provide better user experiences. Don't let new attack techniques catch you off guard. Automate threat prevention and remediation by automating the detection and analysis of threat patterns from multiple sources. -
23
Splunk Enterprise
Splunk
2 RatingsSplunk makes it easy to go from data to business results faster than ever before. Splunk Enterprise makes it easy to collect, analyze, and take action on the untapped value of big data generated by technology infrastructures, security systems, and business applications. This will give you the insight to drive operational performance, and business results. You can collect and index logs and machine data from any source. Combine your machine data with data stored in relational databases, data warehouses, Hadoop and NoSQL data storages. Multi-site clustering and automatic loads balancing scale can support hundreds of terabytes per day, optimize response time and ensure continuous availability. Splunk Enterprise can be customized easily using the Splunk platform. Developers can create custom Splunk apps or integrate Splunk data in other applications. Splunk, our community and partners can create apps that enhance and extend the power and capabilities of the Splunk platform. -
24
LogMX
LightySoft
$99 one-time paymentLogMX is a cross-platform tool that allows administrators and developers to analyze log files. LogMX displays, monitors, and parses logs from any source using a powerful graphical interface. LogMX will help you save a lot of time and effort while analysing logs. LogMX will not require you to use multiple tools if you have different log formats from different sources. LogMX does more than just read log files. It also parses log events from any data stream or file to provide a structured view of logs. LogMX is a standalone application that weighs only 8 MB. It can be used to update log producers or install a web server. LogMX allows you to quickly locate log events, filter them, monitor logs in real time, make time calculations, monitor interlaced logs and much more. -
25
VMware Aria Operations for Logs
Broadcom
VMware Aria Operations for Logs is a log management tool that provides highly scalable logs with intuitive dashboards, sophisticated analytics, and third-party extensibility. It provides deeper operational visibility and quicker troubleshooting in physical, virtual and clouds environments. Innovative indexing and machine-learning-based intelligent grouping are used to provide high performance searching for faster troubleshooting in physical, virtual, and cloud environments. The software analyzes large amounts of log data to provide near-real-time monitoring, log analytics and search, along with a dashboard that stores queries, reports, and alerts. Correlation of events across a whole IT environment is accelerated. -
26
Yandex Cloud Logging
Yandex
The service aggregates data collected during runtime from different resources to create a log group. Use log groups that are pre-configured or create new ones to suit specific services and applications. Filter entries using queries. Cloud Logging allows you to search by parameters or JSON parameters. Cloud Logging stores, processes and collects logs up to 31-days. Each log group is assigned a separate data storage space. Roles can be used to configure read-only and write-only access. Add data from Cloud Logging as well as diagnostic information from other integrated systems to Grafana in one dashboard. -
27
Tencent Cloud Log Service
Tencent
CLS provides a variety of features including real-time log collection and structured logging. It also offers reliable storage, fast searches, multidimensional analysis, scheduled log shipping, reliable storage, reliable log shipping, reliable storage, reliable searches, multidimensional analysis, and rapid search. CLS also offers an API and console that allow for easy log management. CLS employs a highly elastic, scalable distributed architecture that allows for simultaneous processing of large quantities of logs. Users can process hundreds to millions of log files per day without having to worry about resource provisioning. Logs can be captured immediately and searched and analyzed once they reach CLS. The powerful query engine can search hundreds to millions of files in a second, which allows for large amounts of log data to be processed and analyzed. CLS provides a variety log aggregation options, including the LogListener agent API and SDK. This allows for easy collection and central management of logs. Initial deployment takes only five minutes. -
28
Scribbler Log Manager
SyskeyOT Cybersecurity
Scribbler Log manager can monitor logs real-time and alert administrators to potential security issues or performance problems as they arise. Scribbler Log manager can help organizations comply with regulatory compliance requirements through the ability to report and retain log data. Scribbler Log manager has an intuitive interface that allows administrators and users to search, analyze and create custom reports. Scribbler Log manager allows organizations to store log data in a central location and search, analyze and report the data. Scribbler log manager automatically rotates and archives all log data in order to prevent data loss. It also allows you to archive your data on cloud storage. Scribbler Log manager has advanced search and filtering features, so that you can quickly find the logs that you need. -
29
XCavate
Cloudwave
Find and quickly recover your logs. Do you back up Salesforce logs for all your orgs? Data drives your business. Logs provide essential information about how data is used. What would you like to do with this data to track adoption of a new app? To track the performance of an existing app, to identify potential improvements. To investigate a security incident. We have your logs covered for auditing and compliance. Why Salesforce log backup is necessary? Your logs must be accessible and auditable at any time so your business doesn't stall. XCavate can locate all your logs. Scheduled log backups Powerful relevant search. Log backups available 24/7. Security compliance. All logs will be permanently retained. Security compliance. Audit logs can be searched to ensure that you always find the information you need. Powerful search. Strong search maintains relationships so that results can be easily consumed -
30
LogGRIFFIN
Secuve
LogGRIFFIN is a solution for consolidated log management that can be used for big data analysis. It collects logs in real time to prevent audit logs from being modified or forgeried by heterogeneous servers and networks. LogGRIFFIN also analyzes the logs collected and stored to support incident response, audit trail and/or legal compliance. Log-collecting speed can be adjusted according to the CPU workload of log collecting servers. Log-collecting agents can communicate encrypted with log-collecting server log-collecting agents. Distributed search engine supports big data processing. Support for defining PROPERTY for new log formats and for analysing them. Dynamic analytic chains allow for user-defined correlation analysis of nonconformative logs. Real-time detection of and analysis correlation. -
31
ServicePilot
ServicePilot
ServicePilot's goal is to provide a clear view of IT and applications. This includes security, availability, and performance. Maintaining applications in perfect working order in a secure and high-performance environment is a challenging problem for teams. This is a difficult task in an age of agile development, frequent changes and rapid evolution, as well as increasing complexity of information system architecture. Many things have changed in IT since their introduction: Cloud computing is now the standard, mobile devices are more powerful, the Internet of Things grows more rapidly, and micro-services, containers, are changing how applications are built. These changes are causing new requirements, and the old tools will have a hard time adapting and will not be sufficient. New monitoring tools are required. The infrastructure, network, and storage must be taken into consideration as applications cannot function without them. -
32
SOC ITrust
ITrust
ITrust Security Operation Center (SOC) manages the Control and Supervision Center. It aims to oversee all or part of an organization’s security. You can focus on your core business and leave the cybersecurity of your information system in the hands of IT security professionals. We are also known as MSSP (Managed Security Services provider) or MDR, which means we can manage your company's security to respond to and protect it from potential threats. ITrust has set up the SOC (Security Operation Center), which allows you to maximize your cyber protection and ensure the availability of your services at a low cost. This is while adhering to the regulatory framework. The user can see exactly what is happening and monitor all security of servers, routers and applications. -
33
Mezmo
Mezmo
You can instantly centralize, monitor, analyze, and report logs from any platform at any volume. Log aggregation, custom-parsing, smart alarming, role-based access controls, real time search, graphs and log analysis are all seamlessly integrated in this suite of tools. Our cloud-based SaaS solution is ready in just two minutes. It collects logs from AWS and Docker, Heroku, Elastic, and other sources. Running Kubernetes? Log in to two kubectl commands. Simple, pay per GB pricing without paywalls or overage charges. Fixed data buckets are also available. Pay only for the data that you use on a monthly basis. We are Privacy Shield certified and comply with HIPAA, GDPR, PCI and SOC2. Your logs will be protected in transit and storage with our military-grade encryption. Developers are empowered with modernized, user-friendly features and natural search queries. We save you time and money with no special training. -
34
Alibaba Log Service
Alibaba
Alibaba Group has developed Log Service, a comprehensive real-time data log service. Log Service allows log collection, consumption, shipping, searching, and analysis. It also improves the processing and analysis of large log volumes. In five minutes, completes data collection from more than 30 sources. High-availability service nodes are deployed in data centers all over the world. Fully supports offline and real-time computing and seamlessly connects with open-source, commercial, and Alibaba Cloud software. You can adjust the access permissions to individual rows so that different reports are displayed for different user roles. -
35
NetWitness
RSA Security
NetWitness Platform combines advanced SIEM and threat defense systems that provide unsurpassed visibility, analysis and automated response capabilities. These combined capabilities help security teams work more efficiently and effectively, up-leveling their threat hunting skills and enabling them to investigate and respond to threats faster, across their organization's entire infrastructure--whether in the cloud, on premises or virtual. Security teams have the visibility they need in order to spot sophisticated threats hidden in today's hybrid IT infrastructures. Analytics, machine learning, orchestration, and automation capabilities make it easier to prioritize threats and conduct investigations faster. It detects attacks in half the time as other platforms and connects incidents to reveal the full attack scope. NetWitness Platform speeds up threat detection and response by analyzing data from more capture points. -
36
Google Cloud Logging
Google
$0.50 per GiBLog management and analysis at scale. All log data and events can be securely stored, searched, analyzed, and alerted on. You can import custom log data from any source. Fully managed service that can manage your application and infrastructure logs. Log data can be analyzed in real-time. Cloud Monitoring, Error Reporting and Cloud Trace are all supported by Google Cloud services. This allows you to quickly troubleshoot problems across your infrastructure and applications. You can securely store logs from all sources in one place, with a sub-second ingestion delay, terabyte per second ingestion rate and exabytes stored each month. Cloud Logging and BigQuery combine to provide advanced analysis and log-based metrics for real-time Cloud Monitoring dashboards. -
37
CruzLog
Dorado Software
$1350Next-gen log analysis, visualization, and collection for better troubleshooting, compliance management, and IT security. CruzLog is a suite of integrated tools that IT administrators and operators can use to collect, filter and analyze logs from network, server, and application servers for auditing, compliance, issue tracking, and compliance. CruzLog's extensive suite of IT resource management features, Cruz Operations Center (CruzOC), adds comprehensive log collection, data administration, and detailed visualization. They combine to provide a single console management tool for managing the network and datacenter operations of today's converging infrastructures. Cruz Operations Center (CruzOC), infrastructure administration for IT/IOT resources, is fully integrated. This allows for comprehensive and automated problem resolution through a single pane of glass. Log management allows you to store, analyze, visualize, and manage resource management data. This helps improve IT security and compliance. -
38
CRYPTOLOG
Crypttech
A log management system that can collect logs from all IT systems within an organization and analyze them to comply with industry standards and legal regulations is a key requirement for businesses. CRYPTOLOG is compliant with sectoral and public requirements. It offers an easy-to-use search, analysis and correlation option that can be tailored to the specific needs of the IT systems. CRYPTOLOG makes it simple to identify security threats in log data and conduct forensic investigations. CRYPTOLOG, a cost-effective integrated log manager system, helps you meet regulatory compliance and reduce security risks in a variety IT environments. CRYPTOLOG's powerful engines combine a variety of log and event data to provide a comprehensive overview of all network activities. It can be customized to show you the entire panel. -
39
Centreon
Centreon
Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure. -
40
You get the answers you need, when you need them, with seamless log data collection. Graylog uses open standards for connectivity to seamlessly collect, store, analyze, and transfer log data. Graylog is also SIEM-agnostic in design. Our log streams can be passed unaltered and enriched data to any application within your monitoring, alerting and analysis stack. You should be able to do more with your security data and performance data by choosing a scalable log management system.
-
41
ALog SMASH
AMIYA
$1740.00/one-time/ user ALog SMASH, a server access log product, records "when," "who", and "what" for Windows servers. It is directly installed on the file server so there is no need to have a manager server for log management. ALog SMASH allows for compact log management that can be done quickly. All standard equipment includes the database and alert/report functions. There is no additional charge. 1-year maintenance support. The browser can do everything, from log search/report to system setting. The ALog series is also equipped with a unique log translation function. It is no longer necessary to decrypt the event log. With an intuitive GUI, you can search the logs in a flexible manner. This is a long-term log storage solution. Logs can be automatically compressed to a maximum of 1/4000. You can rest assured that ALog SMASH is available. -
42
Seagence
Seagence Technologies
$52 per monthSeagence's unique execution pathway technology, combined with machine learning, allows you to receive realtime alerts that pinpoint the root cause of any defects in your Java production applications. You can fix your code without any debugging. When you start your application, attach a lightweight runtime Java agent. Seagence agent tracks data about how requests are processed as users access the application. Seagence needs to have enough sample for analysis within 24 hours. Seagence's analytics engine receives the data in realtime. It detects defects and alerts when they occur. Seagence can uncover all defects in your application, even those that are not obvious. Seagence provides defect and root cause information to help you fix your code. Seagence monitors your production application continuously and finds defects and root causes in real-time. This eliminates the need to debug. -
43
ChaosSearch
ChaosSearch
$750 per monthLog analytics shouldn't break the bank. The cost of operation is high because most logging solutions use either Elasticsearch database or Lucene index. ChaosSearch is a new approach. ChaosSearch has redesigned indexing which allows us to pass significant cost savings on to our customers. This price comparison calculator will allow you to see the difference. ChaosSearch is a fully managed SaaS platform which allows you to concentrate on search and analytics in AWS S3 and not spend time tuning databases. Let us manage your existing AWS S3 infrastructure. Watch this video to see how ChaosSearch addresses today's data and analytic challenges. -
44
Shoreline
Shoreline.io
Shoreline is the only cloud reliability platform that allows DevOps engineers to build automations in a matter of minutes and fix problems forever. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud. Debugging and repairing issues is easy with advanced tooling for your best SREs, Jupyter style notebooks for the broader team, and a platform that makes building automations 30X faster by allowing operators to manage their entire fleet as if it were a single box. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment. -
45
ManageEngine AlarmsOne
ManageEngine
$15.00/month/ user AlarmsOne from ManageEngine allows users to manage all alerts from their IT management tools. AlarmsOne integrates easily with many on-premise or SaaS-based IT infrastructure monitor systems. AlarmsOne allows users to centralize their IT alarms. Users can create an account and install Alarm Poller on the server. AlarmsOne offers real-time alerts, multi-channel notifications, and quick responses. -
46
UTMStack
UTMStack
$25 per device per monthA centralized management dashboard gives you complete visibility into the organization. All solutions in the stack can be integrated with one another and report to a single database. This makes it easy to perform daily tasks like monitoring, investigation and incident response. Both active and passive vulnerability scanners are available for early detection. They also provide compliance audit reports. Manage accounts access and permission changes. Alerts are sent when suspicious activity occurs. Remotely manage your environment, and respond to attacks from your dashboard. Keep track of all changes and gain access to classified information. Advanced threat protection protects servers and endpoints. -
47
XpoLog
XpoLog
Reduce complexity and cut-costs of manual work by 90%. PortX Automated Parsing of all log Types/Sources, Cloud Data, Apps, and Service Collectors. PortX - Automatically identifies, parses, tags, and tags sources. PortX automatically recognizes data patterns from a variety of systems and applications. XpoLog uses PortX for Automatically Deploy Analysis Apps to generate instant insights. Security, performance, audit and errors, trends, anomalies and many other factors. XpoLog automatically matches analytics apps to log data once it has been collected. These apps offer ready-to-use reports. Get instant real-time insights. XpoLog automatically detects anomalies, errors, exceptions, anomalies and unique patterns. It also helps to identify risk. Check out XpoLogs market-leading marketplace with dozens of analytics apps. -
48
TrueSight Operations Management
BMC Software
TrueSight Operations Management provides end-to-end performance monitoring, event management, and event management. It uses AIOps technology to dynamically learn, correlate, analyze and prioritize event data. This allows IT operations teams to predict, find, and fix problems faster. Predictively alert to identify data anomalies and fix issues before they impact service. TrueSight Infrastructure Management allows you to detect and correct performance anomalies before they affect your business. It automatically detects abnormalities in your infrastructure and alerts you when they need attention. This allows you to focus on the most important events for IT and business. TrueSight IT Data Analytics uses machine assisted analysis to analyze log data, metrics and events. With a single click, you can automatically sort through millions of messages to find the right solution faster. -
49
Shipbook
Shipbook
$50 per monthYou can search your logs and exceptions using parameters such as User ID and device type. This will allow you to navigate the data tsunami. With a simple configuration, you can control which logs are sent directly to the cloud. You can combine the warning logs and error logs into separate comprehensive lists that are categorized according to issue frequency. This is basically doing all the work for your. This platform allows you to locate all recurring issues within your code. You will receive an alert as soon as our system detects any unusual activity or a new issue in your code. This means that we help you prioritize the important leaks and fix them immediately. With a clear, holistic map of your mobile application, you can view your logs and exceptions. You can easily switch between a monthly, daily, or hourly overview. -
50
Shiftconnector
eschbach
The interactive Shift Log is now available. Shiftconnector®, tracks and manages all information needed at the time the shift handover takes place. Supervisors have access to all information. You can access reports live at any moment. Management is made easier by direct communication with shift teams. Data in Shiftconnector® can be analysed to identify optimization opportunities and areas of error, resulting in improved business processes. Shiftconnector®, GO connects field workers to board operators via the Shiftconnector platform, for routine actions and compliance administration. The app is available on iOS, Android, and Windows. Workers can report any activity directly from their mobile devices to a central place, regardless of where they are located. It is a huge advantage for workers who use it to perform daily inspection rounds of the plant's environment, safety, and compliance activities.