Best SysTools Exchange Log Analyzer Alternatives in 2024
Find the top alternatives to SysTools Exchange Log Analyzer currently available. Compare ratings, reviews, pricing, and features of SysTools Exchange Log Analyzer alternatives in 2024. Slashdot lists the best SysTools Exchange Log Analyzer alternatives on the market that offer competing products that are similar to SysTools Exchange Log Analyzer. Sort through SysTools Exchange Log Analyzer alternatives below to make the best choice for your needs
-
1
New Relic
New Relic
2,505 RatingsAround 25 million engineers work across dozens of distinct functions. Engineers are using New Relic as every company is becoming a software company to gather real-time insight and trending data on the performance of their software. This allows them to be more resilient and provide exceptional customer experiences. New Relic is the only platform that offers an all-in one solution. New Relic offers customers a secure cloud for all metrics and events, powerful full-stack analytics tools, and simple, transparent pricing based on usage. New Relic also has curated the largest open source ecosystem in the industry, making it simple for engineers to get started using observability. -
2
ManageEngine EventLog Analyzer
ManageEngine
148 RatingsEventLog Analyzer from Manage Engine is the industry's most affordable security information and event management software (SIEM). This cloud-based, secure solution provides all essential SIEM capabilities, including log analysis, log consolidation, user activity monitoring and file integrity monitoring. It also supports event correlation, log log forensics and log retention. Real-time alerting is possible with this powerful and secure solution. Manage Engine's EventLog Analyzer allows users to prevent data breaches, detect the root cause of security issues, and mitigate sophisticated cyber-attacks. -
3
Log360 is a SIEM or security analytics solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. It also helps organizations adhere to compliance mandates such as PCI DSS, HIPAA, GDPR and more. You can customize the solution to cater to your unique use cases and protect your sensitive data. With Log360, you can monitor and audit activities that occur in your Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365 environment, cloud services and more. Log360 correlates log data from different devices to detect complex attack patterns and advanced persistent threats. The solution also comes with a machine learning based behavioral analytics that detects user and entity behavior anomalies, and couples them with a risk score. The security analytics are presented in the form of more than 1000 pre-defined, actionable reports. Log forensics can be performed to get to the root cause of a security challenge. The built-in incident management system allows you to automate the remediation response with intelligent workflows and integrations with popular ticketing tools.
-
4
Sematext Cloud
Sematext Group
$0 62 RatingsSematext Cloud provides all-in-one observability solutions for modern software-based businesses. It provides key insights into both front-end and back-end performance. Sematext includes infrastructure, synthetic monitoring, transaction tracking, log management, and real user & synthetic monitoring. Sematext provides full-stack visibility for businesses by quickly and easily exposing key performance issues through a single Cloud solution or On-Premise. -
5
LogicMonitor
LogicMonitor
LogicMonitor is the leading SaaS-based, fully-automated observability platform for enterprise IT and managed service providers. Cloud-first and hybrid ready. LogicMonitor helps enterprises and managed service providers gain IT insights through comprehensive visibility into networks, cloud, applications, servers, log data and more within one unified platform. Drive collaboration and efficiency across IT and DevOps teams, in a fully secure, intelligently automated platform. By providing end-to-end observability for enterprise businesses, LogicMonitor connects coders to consumers, customer experience to the cloud, infrastructure to applications and business insights into instant actions. Maximize uptime, optimize end-user experience, predict what comes next, and keep your business fearlessly moving forward. -
6
EventSentry
NETIKUS.NET ltd
$85.00/one-time Hybrid SIEM solutions combine real-time log monitoring with comprehensive system and network monitoring to provide users with a complete view of their servers, endpoints, and networks. The security event log normalization and correlation engine with descriptive emails alerts provides additional context. It presents cryptic Windows security incidents in easy-to-understand reports that provide insight beyond what is available as raw events. EventSentry's NetFlow component visualizes network traffic and can detect malicious activity. It also provides insight into bandwidth usage. EventSentry's ADMonitor component makes it easy to keep track of Active Directory changes. It records all changes to Group Policy objects and provides a complete user inventory that can be used to identify old accounts. There are many integrations and multi-tenancy options. -
7
With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
-
8
Splunk Observability Cloud
Splunk
Splunk Observability Cloud provides a comprehensive real-time monitoring platform that helps organizations gain visibility into their cloud native environments, infrastructures, applications, and service. It combines metrics with logs and traces to create a unified platform that provides seamless visibility from end-to-end across complex architectures. Splunk Observability helps teams identify and resolve performance problems, reduce downtime and improve system reliability with its powerful analytics and AI-driven insights. It provides real-time data in high resolution and supports a variety of integrations. This allows IT and DevOps to detect anomalies, optimize the performance, and ensure that their cloud and hybrid environment is healthy and efficient. -
9
The Dynatrace software intelligence platform. Transform faster with unmatched observability, automation, intelligence, and efficiency in one platform. You don't need a bunch of tools to automate your multicloud dynamic and align multiple teams. You can spark collaboration between biz and dev with the most purpose-built use cases in one location. Unify complex multiclouds with out-of the box support for all major platforms and technologies. Get a wider view of your environment. One that includes metrics and logs, and trace data, as well as a complete topological model with distributed traceing, code-level detail and entity relationships. It also includes user experience and behavioral information. To automate everything, from development and releases to cloud operations and business processes, integrate Dynatrace's API into your existing ecosystem.
-
10
Burstek LogAnalyzer
Burstek
In a perfect world, there wouldn't be any need to track employee Web usage. It is not a perfect world. Today's world is filled with malware, illegal file sharing and spyware, adware hacking, cracking and Phishing. Burstek has a serious solution: the bt-LogAnalyzer. Burstek's Web log analysis software, bt-LogAnalyzer, is concise and comprehensive. Burstek's Enterprise Suite of products includes bt-LogAnalyzer. This software provides the security insight and Internet log analysis needed to make informed decisions about how to deploy, use, protect and optimize a company's Internet resources and Email resources. bt-LogAnalyzer analyzes all outbound Web activity to generate categorized graphical or numerical Web usage reports that detail or highlight all Web usage within an organisation. -
11
Datadog is the cloud-age monitoring, security, and analytics platform for developers, IT operation teams, security engineers, and business users. Our SaaS platform integrates monitoring of infrastructure, application performance monitoring, and log management to provide unified and real-time monitoring of all our customers' technology stacks. Datadog is used by companies of all sizes and in many industries to enable digital transformation, cloud migration, collaboration among development, operations and security teams, accelerate time-to-market for applications, reduce the time it takes to solve problems, secure applications and infrastructure and understand user behavior to track key business metrics.
-
12
Retrospective
Retrospective
$92 per yearRetrospective and your laptop can turn tedious search and monitoring processes into a few minutes of work. Retrospective can turn tedious search and monitoring processes into a few minutes' work. No log collector agents or additional software is required. Retrospective allows you to search and monitor large collections of log files from local and remote sources, without overloading your server. Retrospective has advanced features that allow you to browse your files and explore the results of your search. The guided search criteria composer allows you to monitor container log data, and pinpoint areas of particular interest in your local logs. Retrospective gives you a unified overview of your Docker installation, even if several containers are running simultaneously. The tabularized data is exportable in different formats for other analysis software. -
13
SolarWinds Log Analyzer
SolarWinds
You can quickly and easily examine machine data to identify the root cause of IT problems faster. Log aggregation, filtering, filtering, alerting, and tagging are all part of this intuitive and powerfully designed system. Integrated with Orion Platform products, it allows for a single view of IT infrastructure monitoring logs. Because we have experience as network and system engineers, we can help you solve your problems. Log data is generated by your infrastructure to provide performance insight. Log Analyzer log monitoring tools allow you to collect, consolidate, analyze, and combine thousands of Windows, syslog, traps and VMware events. This will enable you to do root-cause analysis. Basic matching is used to perform searches. You can perform searches using multiple search criteria. Filter your results to narrow down the results. Log monitoring software allows you to save, schedule, export, and export search results. -
14
Logz.io
Logz.io
$89 per monthOpen source is a passion for engineers. We supercharged the top open-source monitoring tools, including Jaeger, Prometheus and ELK, and combined them into a scalable SaaS platform. You can collect and analyze all your logs, metrics, traces and other data on one platform for end to end monitoring. You can visualize your data using customizable and easy-to-use monitoring dashboards. Logz.io's AI/ML human-coach automatically detects and corrects any errors or exceptions in your logs. Alerting to Slack and PagerDuty, Gmail and other endpoints allows you to quickly respond to new events. Centralize your metrics at any scale on Prometheus-as-a-service. Unified with logs, traces. Just three lines of code are required to add to your Prometheus config file to start forwarding your metrics and data to Logz.io. -
15
Corner Bowl Event Log Manager
Corner Bowl Software Corporation
$84 4 RatingsA Centralized Windows Event Log Management Software Tool for Enterprises. A Centralized Log Consolidator. A real-time Windows Event Log, Syslog, and Application Log Monitor software tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS PCI/DSS. HIPAA, SOX. GDPR, CIS Microsoft 365 Security & Compliance and more. 80+ pre-built reports. A Windows Event Log Viewer that is enhanced with advanced search and filtering capabilities. Windows Event Logs, Syslogs and text-based Application Logs on Windows, Linux and the cloud-based Azure Active Directory Audit Logs are supported. Log entries can be saved to a local or remote log repository once they have been harvested. Event Log Manager offers 5 methods to centralize log entries, including MySQL, Microsoft SQL Server and elasiticsearch. -
16
Snare
Prophecy International Holdings Ltd.
Snare Central is an integrated log management solution. It collects, processes and stores logs from multiple sources in an organization's network. It provides a scalable and secure platform for aggregating the logs of systems, applications, devices, allowing efficient monitoring and analyzation. Snare Central's advanced filtering and report capabilities enable organizations to detect security threats and ensure compliance while optimizing operational performance. The platform integrates with third-party analytics tools and provides customizable dashboards to provide real-time insights. Snare Central was designed to meet the security, compliance, IT, and IT team's needs by providing a unified log data view and supporting detailed investigations. -
17
Mezmo
Mezmo
You can instantly centralize, monitor, analyze, and report logs from any platform at any volume. Log aggregation, custom-parsing, smart alarming, role-based access controls, real time search, graphs and log analysis are all seamlessly integrated in this suite of tools. Our cloud-based SaaS solution is ready in just two minutes. It collects logs from AWS and Docker, Heroku, Elastic, and other sources. Running Kubernetes? Log in to two kubectl commands. Simple, pay per GB pricing without paywalls or overage charges. Fixed data buckets are also available. Pay only for the data that you use on a monthly basis. We are Privacy Shield certified and comply with HIPAA, GDPR, PCI and SOC2. Your logs will be protected in transit and storage with our military-grade encryption. Developers are empowered with modernized, user-friendly features and natural search queries. We save you time and money with no special training. -
18
LogMX
LightySoft
$99 one-time paymentLogMX is a cross-platform tool that allows administrators and developers to analyze log files. LogMX displays, monitors, and parses logs from any source using a powerful graphical interface. LogMX will help you save a lot of time and effort while analysing logs. LogMX will not require you to use multiple tools if you have different log formats from different sources. LogMX does more than just read log files. It also parses log events from any data stream or file to provide a structured view of logs. LogMX is a standalone application that weighs only 8 MB. It can be used to update log producers or install a web server. LogMX allows you to quickly locate log events, filter them, monitor logs in real time, make time calculations, monitor interlaced logs and much more. -
19
SpectX
SpectX
$79/month SpectX is a powerful log analysis tool for data exploration and incident investigation. It does not index or ingest data, but it runs queries directly on log files in file systems and blob storage. Local log servers, cloud storage Hadoop clusters JDBC-databases production servers, Elastic clusters or anything that speaks HTTP – SpectX transforms any text-based log file into structured virtual views. SpectX query language was inspired by Unix piping. Analysts can create complex queries and gain advanced insights with the extensive library of query functions that are built into SpectX. Each query can be executed via the browser-based interface. Advanced options allow you to customize the resultset. This makes it easy for SpectX to be integrated with other applications that require clean, structured data. SpectX's easy-to-read pattern-matching language can match any data without the need to read or create regex. -
20
Nagios Log Server
Nagios Enterprises
$1995.00/one-time Nagios Log Server greatly simplifies the process for searching log data. You can set up alerts to be notified when possible threats are detected, or query your log data to quickly inspect any system. Nagios Log Server allows you to store all your log data in one place, with fail-over and high availability built in. You can quickly configure your servers to send log data using the easy source setup wizards. Then, you can start monitoring your logs within minutes. In just a few clicks, you can easily correlate log events across all servers. Nagios Log Server allows for you to see log data in real time, allowing you to quickly analyze and resolve problems as they arise. This ensures that your organization is safe, secure, streamlined, and runs smoothly. Nagios Log Server gives users advanced awareness of their infrastructure. Deep dive into logs, network events, and security events. Log Server can provide the evidence you need to track down security threats and quickly fix vulnerabilities using built-in alerts. -
21
Deep Log Analyzer
Deep Software
$299.95 one-time paymentWeb analytics solutions for small and medium websites that are affordable and effective. In just a few steps, you can analyze the behavior of web site visitors and obtain complete statistics about website usage. Deep Log Analyzer website statistics software and web analytics software will allow you to see exactly where your visitors are coming from and how they move around your website. This software will help to increase your website's traffic, optimize it, and convert more customers to visitors. Get web analytics reports by analysing logs from Microsoft IIS or Apache web servers from any hosting provider. It can be run on your Windows computer, or server. Deep Log Anazer allows you to view reports on top web pages, search engines & phrases and search engines & phrases. Export to HTML and Excel Deep Log Analyzer web analytics software is highly configurable. You can create your own reports or modify any of the 50+ reports included using SQL language. -
22
You get the answers you need, when you need them, with seamless log data collection. Graylog uses open standards for connectivity to seamlessly collect, store, analyze, and transfer log data. Graylog is also SIEM-agnostic in design. Our log streams can be passed unaltered and enriched data to any application within your monitoring, alerting and analysis stack. You should be able to do more with your security data and performance data by choosing a scalable log management system.
-
23
LogFusion
Binary Fortress Software
LogFusion is a powerful log monitoring tool for developers and system administrators! You can create custom filtering, highlighting rules and more. LogFusion settings can be synced between computers. LogFusion's powerful custom highlighter allows you to match text strings and regex patterns, and format the matched lines to your specifications. LogFusion's Advanced Text filtering allows you to filter out and hide lines that do not match your search text. This is done in real-time, as new lines are added. Complex queries can be easily narrowed down to your results. LogFusion can automatically add logs from Watched Folders. LogFusion can automatically open log files created in the folders you specify. -
24
Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
-
25
Sumo Logic
Sumo Logic
$270.00 per month 2 RatingsSumo Logic is a cloud-based solution for log management and monitoring for IT and security departments of all sizes. Integrated logs, metrics, and traces allow for faster troubleshooting. One platform. Multiple uses. You can increase your troubleshooting efficiency. Sumo Logic can help you reduce downtime, move from reactive to proactive monitoring, and use cloud-based modern analytics powered with machine learning to improve your troubleshooting. Sumo Logic Security Analytics allows you to quickly detect Indicators of Compromise, accelerate investigation, and ensure compliance. Sumo Logic's real time analytics platform allows you to make data-driven business decisions. You can also predict and analyze customer behavior. Sumo Logic's platform allows you to make data-driven business decisions and reduce the time it takes to investigate operational and security issues, so you have more time for other important activities. -
26
PiaSoft Flow Logs Viewer
PiaSoft
$0.03 per hourPiaSoft Flow logs Viewer, available in the AWS marketplace, provides a clear view of your data. Filtering and sorting help you quickly draw conclusions. It helps you clean your security groups by comparing your VPC flowlogs with rules to find used, unused, and detached Security Group rules. The flow logs contain a wealth information. Pia Software FlowLogs Viewer gives you a clear view of your logs with enriched data and useful conversions. It also allows for filtering and sorting. The Flow Logs Viewer adds vital information to your logs. It allows you to dig deeper into data and answers your questions. It enriches your data by adding information about your VPC so that you can find the log stream you want faster. Sorting and filtering data to help you quickly draw conclusions. Quickly access the data you need. PiaSoft Flow Logs Viewer sends data to FLV immediately, so there is no delay in ingestion. -
27
Falcon LogScale
CrowdStrike
Reduce logging costs while quickly detecting and eliminating threats. Process incoming data in less than a second to detect threats faster. Find suspicious activity in fractions of the time it takes to use traditional security logging software. A powerful architecture that does not use indexes allows you to log all of your data, and keep it for years without experiencing any ingestion bottlenecks. Scale to 1 PB per day of data ingestion with minimal performance impact. Collect more data for investigation and threat hunting. Falcon LogScale's powerful, intuitive querying language takes your searching, hunting and troubleshooting abilities to the next level. Filtering, aggregation and regex support will help you gain more context. Search all events quickly with a free text search. Dashboards allow users to prioritize threats, monitor trends and troubleshoot problems instantly. You can easily drill down from charts into search results. -
28
WholeClear Exchange Backup
WholeClear
$499 one-time paymentThe WholeClear Exchange Backup Software can be used to create backups of Exchange mailboxes. The tool can download Exchange database backups and offers multiple scheduling options to backup Exchange Server mailboxes to PST files. The program generates a detailed report about the backup process. This software backs up all mailbox folders, including archive, public, and user mailboxes. This software allows users to backup Exchange mailbox items such as emails, contacts, calendars, events and notes. In PST file format. It provides 100% security for user data when backing up Exchange mailbox items. To backup the Exchange database, one only needs to enter login details. This program can backup Exchange 2019, Exchange 2013, 2010, and older versions. PowerShell scripts are not required. Third-party support tools are not required to manage the entire backup process. Exchange Mailbox Backup Wizard can backup multiple mailboxes at once. -
29
Log2Stats
BitStrike Software
$299.95 one-time paymentLog-to-Stats allows you to extract your website stats from log files. The software converts web log files into a statistics database and manages them. You can then view your website stats with interactive and detailed reports, or save them in html or another format. Log-to-Stats allows you to easily view stats over time and compare web traffic reports based on different dates or special conditions. -
30
KDETools Outlook PST Converter
KDETools
$29Outlook PST Converter tool can be used to convert Outlook PST file data. This software converts PST files into MBOX as well as other file formats such HTML, MSG, EMLX, HTML and PDF. You can also export your contacts and calendar separately by selecting the VCARD or VCAL option. PST converter can also preserve Meta properties like (to, cc., bcc., subject from & attachment) and will not alter any data after the conversion. This software can also import PST files into Office 365 or Live Exchange server. The PST file can be converted without limiting its size. After scanning is complete, this Outlook data file converter will preview and display the item. All items, such as emails, contacts and calendars, can be converted without risk. This software can also convert password-protected files. KDETools PST Conversion tool supports all versions of Windows and Microsoft Outlook 2019, 2016, 2010, 2007, etc. -
31
FastStats Log Analyzer
Mach5 Development
$99.95 one-time paymentYour log files can be a treasure trove of information about your web site and your business. Your web site traffic patterns are key to improving your business. Web server log files can give you a glimpse into your customer's activities and help you optimize your web site for new customers. FastStats Log Analyzer can quickly and cheaply scan through gigabytes worth of logs to produce easy-to-understand summaries about your web site traffic. Is your Google advertising costing $0.75 per click, but you only receive $0.56 per click in revenue. FastStats can help you calculate your revenue per click. This information can be used to price your Google ads. FastStats Hyperlink Tree View allows you to see how customers move around your website. FastStats, which is appropriately named, can process logs 40x faster that WebTrends, a leader in the industry. -
32
WatchWave
ScanWave CTS
WatchWave Security Operations Center provides a comprehensive view of all data from the organization's devices and systems. It also provides real-time security insight that allows for immediate action to scale the resources and reduce risk exposure. WatchWave gives security professionals comprehensive capabilities to accelerate threat detection, investigation and response. This includes modernizing security operations and strengthening cyber defenses. The universal agent is a small program that is installed on enterprise systems to monitor WatchWave Security Operations Center. The agent provides monitoring and response capabilities. The WatchWave server provides security intelligence and data analysis. WatchWave can also use an agentless approach to systems that cannot be installed an agent on (firewalls routers and Unix systems, for example). . -
33
DUPI
D10 Networks
$0.25 per hourDiscover advanced real-time monitoring of network traffic, including NETFLOW, HTTP, DNS & SSL. Cloud-based monitoring of AWS logs and any protocol on your sites is possible. A lightweight application on-site exports relevant protocol information over a fast internet connection to your dedicated server. Observe protocol statistics aggregated across multiple sites in order to view your network traffic as a whole. You can also choose to only observe the network traffic of a single site, depending on your needs. Analyze network traffic in real-time to gain a deeper understanding of traffic patterns. Define detailed alerting rule per specific protocol field for various metrics, such as request rate, randomization, lengths and counts, and geolocation information. You can easily and interactively explore network traffic at your site from your browser. You can quickly switch protocols, fields and intervals, and apply specific filter criteria. -
34
SolarWinds Kiwi Log Viewer
SolarWinds
$111 one-time paymentChoose from a variety of search and filter options and display log files in a tabular format that is easy to read. Kiwi Log Viewer is able to read files up 14TB, so you can search and view all logs regardless of their size. Monitor changes to a log file in real time. Display log files in an easy-to-read tableular format. Monitor changes in a log file specified in real-time. Open files of any length and highlight important text automatically. Use regular expressions (regex), or sub-string matching, in Perl. Use highlighting rules to quickly identify the most important messages. Monitor log files for specific phrases, keywords, or patterns. Kiwi Log Viewer displays log files that are text-based in a tabular form. You can copy selected columns in tab-delimited form or click-select and copy any part of the row's text. The file tailing feature allows you to monitor changes in the specified log file and view any newly added data in real-time. -
35
GoAccess
GoAccess
FreeGoAccess is a real-time, interactive web log analyzer that runs in a terminal or browser on Unix-like operating systems. It is designed for rapid analysis and provides immediate HTTP statistics. This makes it ideal for system admins who need to quickly understand server performance. The tool supports a variety of web log formats including those from Apache Nginx Elastic Load Balancing CloudFront Caddy CloudFront and Amazon S3. Users can easily set the log format, and analyze logs. GoAccess is written in C and only requires ncurses to run, ensuring millisecond-level update speed. It allows users to customize color schemes on the terminal and web-based dashboards. GoAccess is capable of generating comprehensive real-time HTML and JSON reports. This allows for analytics, monitoring, data visualization, and monitoring. -
36
Corner Bowl Server Manager
Corner Bowl Software Corporation
$20 one-time fee 5 RatingsSIEM, Log Management Software, Server Monitoring, and Uptime Monitoring Software for less! Industry-leading, free and responsive remote support phone and email when you need it most. You can be compliant by centrally storing Event Logs as well as Syslogs and Application Logs from any device or system. Receive real-time notifications when users log in, accounts are locked out, or accounts are modified. Our out-of-the box SIEM and security reports will satisfy auditing requirements such as PCI/DSS, JSIG, NIST, CJIS, SOX, HIPAA and GDPR. Monitor server resources, such as memory, disk space and directory size, and monitor process specific resource consumption. Fire SNMP traps, restart services, kill processes, remote-launch custom scripts, and kill processes. Generate audit reports on directory and file access. Monitor SNMP Get values, receive SNMP traps and more. Receive real-time notifications when network performance drops below acceptable thresholds. Monitor web, email and database performance. Monitor Docker Containers. -
37
Tencent Cloud Log Service
Tencent
CLS provides a variety of features including real-time log collection and structured logging. It also offers reliable storage, fast searches, multidimensional analysis, scheduled log shipping, reliable storage, reliable log shipping, reliable storage, reliable searches, multidimensional analysis, and rapid search. CLS also offers an API and console that allow for easy log management. CLS employs a highly elastic, scalable distributed architecture that allows for simultaneous processing of large quantities of logs. Users can process hundreds to millions of log files per day without having to worry about resource provisioning. Logs can be captured immediately and searched and analyzed once they reach CLS. The powerful query engine can search hundreds to millions of files in a second, which allows for large amounts of log data to be processed and analyzed. CLS provides a variety log aggregation options, including the LogListener agent API and SDK. This allows for easy collection and central management of logs. Initial deployment takes only five minutes. -
38
Atatus
NamLabs Technologies
$49.00/month NamLabs Technologies is a software business formed in 2014 in India that publishes a software suite called Atatus. Atatus is a SaaS Software & a unified monitoring solution that includes providing a demo. Atatus is Application Performance Management software, including features such as full transaction diagnostics, performance control, Root-Cause diagnosis, server performance, and trace individual transactions. Our other products include Real-User Monitoring, Synthetic Monitoring, Infrastructure Monitoring, and API Analytics. Guaranteed 24*7 Customer Support. -
39
WebSitePulse
WebSitePulse
Free 1 RatingWebSitePulse allows you to monitor your web assets remotely and independently. Uptime monitoring, website monitoring and server monitoring are some of the most popular services. -
40
Nixstats
Nixstats
$9.95 per monthIt takes only one line to install the monitoring agent onto all your servers. It takes only minutes to get started. You can keep track of the usage of your servers infrastructure to prevent downtime and performance issues. There are over 40 plugins that can be installed straight out of the box, including CPU, Process, Network and NGiNX. Server logs are vital to diagnose and prevent problems on your server infrastructure. Use the live tail feature or our advanced log search. Are you sure you have a clean IP space? You can ensure that your e mail does not get lost in the spam folder. Our control panel is customizable and simple to use, ensuring a better user experience. We can monitor HTTP(S), TCP, and ICMP (ping), endpoints. Be the first to know if your web endpoints are down. -
41
CubexSoft SQL Database Recovery
CubexSoft
EDB Repair Tool allows you to repair Exchange EDB user mailbox databases completely. The application allows retrieval of deleted emails with contacts, calendars, journals and tasks, as well as deleted email files. Inaccessible MS Exchange Server mailboxes. Repair EDB Software allows users to select EDB files from any storage group, and retrieve all associated Exchange Mailboxes. The app has multiple advanced options which allow users to customize the way they save their Exchange mailbox. To export data without error, you should also have Outlook installed on the system. EDB Repair Tool allows you to repair and retrieve exchange EDB in public and private folders. The application allows users to access the exchange Priv.edb and exchange pub.edb files without losing any data. -
42
LogGRIFFIN
Secuve
LogGRIFFIN is a solution for consolidated log management that can be used for big data analysis. It collects logs in real time to prevent audit logs from being modified or forgeried by heterogeneous servers and networks. LogGRIFFIN also analyzes the logs collected and stored to support incident response, audit trail and/or legal compliance. Log-collecting speed can be adjusted according to the CPU workload of log collecting servers. Log-collecting agents can communicate encrypted with log-collecting server log-collecting agents. Distributed search engine supports big data processing. Support for defining PROPERTY for new log formats and for analysing them. Dynamic analytic chains allow for user-defined correlation analysis of nonconformative logs. Real-time detection of and analysis correlation. -
43
Kernel for OST to PST Converter
KernelApps
$49 2 RatingsKernel for OST-to-PST Converter is a powerful conversion and recovery software that can repair and recover OST files damaged or corrupted from Exchange mailboxes. This software allows you to migrate OST files into PST files. It uses a sophisticated algorithm to scan corrupt OST files and retrieve all important data such as emails, attachments contacts calendars tasks notes journals and calendars. It also offers various saving options such as MSG, EML HTML, RTF Office 365, Live Exchange Server, and RTF. The software also offers multiple preview options such as Hex, MIME and HTML to allow you to view the data items before saving them. To save disk space, you can also split or compress the PST files. -
44
Enginsight
Enginsight
$12.99 per monthEnginsight is a comprehensive cybersecurity solution crafted in Germany, adept at unifying threat identification and protection measures. Incorporating automated security audits, penetration testing, IDS/IPS, micro-segmentation, vulnerability assessments, and risk analysis, Enginsight equips businesses across scales to seamlessly establish and supervise potent security approaches via a user-friendly dashboard. Automatically examine your systems to instantly discern the security posture of your IT assets. Entirely self-engineered with security by design principles, Enginsight operates independently of third-party tools. Continuously scour your IT landscape to detect devices, generating a real-time depiction of your IT framework. With automatic detection and endless inventory of IP network devices, including categorization, Enginsight serves as an all-encompassing monitor and security shield for your Windows and Linux servers, and endpoint devices such as PCs. Start your 15 day free trial now. -
45
ServicePilot
ServicePilot
ServicePilot's goal is to provide a clear view of IT and applications. This includes security, availability, and performance. Maintaining applications in perfect working order in a secure and high-performance environment is a challenging problem for teams. This is a difficult task in an age of agile development, frequent changes and rapid evolution, as well as increasing complexity of information system architecture. Many things have changed in IT since their introduction: Cloud computing is now the standard, mobile devices are more powerful, the Internet of Things grows more rapidly, and micro-services, containers, are changing how applications are built. These changes are causing new requirements, and the old tools will have a hard time adapting and will not be sufficient. New monitoring tools are required. The infrastructure, network, and storage must be taken into consideration as applications cannot function without them. -
46
Unomaly
Unomaly
All sources are supported for ingest logs. Unomaly gives you complete visibility into every component of your IT infrastructure, regardless of whether it is containers, servers, or services. Unomaly analyses data without the need for any special parsers or pre-defined knowledge about data structure or format. You can input data from log collectors, log servers and log servers. Unomaly creates profiles to each log source that sends data after learning repeated patterns. These profiles can adapt to changing environments. Our knowledge is constantly changing as a result. Unomaly automatically updates your state to reflect changes as new data arrives. Most incidents are not known causes, so they can't be attributed to anything except their negative consequences. Unomaly identifies and surfaces potential root causes as they occur. -
47
CruzLog
Dorado Software
$1350Next-gen log analysis, visualization, and collection for better troubleshooting, compliance management, and IT security. CruzLog is a suite of integrated tools that IT administrators and operators can use to collect, filter and analyze logs from network, server, and application servers for auditing, compliance, issue tracking, and compliance. CruzLog's extensive suite of IT resource management features, Cruz Operations Center (CruzOC), adds comprehensive log collection, data administration, and detailed visualization. They combine to provide a single console management tool for managing the network and datacenter operations of today's converging infrastructures. Cruz Operations Center (CruzOC), infrastructure administration for IT/IOT resources, is fully integrated. This allows for comprehensive and automated problem resolution through a single pane of glass. Log management allows you to store, analyze, visualize, and manage resource management data. This helps improve IT security and compliance. -
48
Blesk
Prival
$1300.00/year Blesk is the only solution that does all aspects of network monitoring from one machine. The solution is fast and easy to deploy, with a high ROI. It is the first industry-standard monitoring application to integrate Open Source monitoring technologies from around the globe in one, very user-friendly application. blesk layers are an additional layer that adds enhanced features and a uniform interface. You can quickly identify and fix issues that cause applications to go down for your users. Rapid detection of protocol and service failures, network failures, and batch tasks. Alerts on SNMP traps. Track serial data, such as CPU load and bandwidth usage. In near real-time, collect, analyze, and measure performance data of SNMP-compliant devices. Prediction of saturation, classification and measurement of interface ports using the use of different equipment. -
49
CRYPTOLOG
Crypttech
A log management system that can collect logs from all IT systems within an organization and analyze them to comply with industry standards and legal regulations is a key requirement for businesses. CRYPTOLOG is compliant with sectoral and public requirements. It offers an easy-to-use search, analysis and correlation option that can be tailored to the specific needs of the IT systems. CRYPTOLOG makes it simple to identify security threats in log data and conduct forensic investigations. CRYPTOLOG, a cost-effective integrated log manager system, helps you meet regulatory compliance and reduce security risks in a variety IT environments. CRYPTOLOG's powerful engines combine a variety of log and event data to provide a comprehensive overview of all network activities. It can be customized to show you the entire panel. -
50
LOGalyze
Zuriel
LOGalyze, an open-source, centralized log management software and network monitoring software, is available. LOGalyze can be used to manage all your log data from one location. It supports Linux/Unix servers and network devices. It can detect real-time events and provide extensive search capabilities. This open-source application log analyzer can collect log data from any device and analyze, normalize and interpret them with any Log Definition. You can also use the built in Statistics and Report Definitions, or create your own. Correlating log data can be used to create Alerts and Events. The ticketing system is a powerful tool to quickly close open incidents. LOGalyze, an open-source network management tool, helps to reduce internal costs, improve network uptime, and eliminate unwanted network traffic. The built-in scheduled Reports provide a comprehensive overview of the entire network.