BleskPrival 
                        
                        
                     | 
        
        
        
            EventSentryNETIKUS.NET ltd 
                        
                        
                     | 
        
        |||||
Related Products
  | 
            
            ||||||
                
            
            
            About
            blësk is the only all in one solution available on the market that performs all aspects of network monitoring from a single machine. The solution provides fast, scalable deployments and a high ROI. It’s the industry’s first monitoring application to integrate major Open Source monitoring technologies that are used throughout the world in a single and very easy-to-use application. blësk layers are added on top bringing enhanced features and a uniform graphical interface. Identify and resolve issues that cause applications to be down for your users. Quick detection of network failures, protocol failures, service failures, process and batch tasks, and alerts on SNMP traps. Trace serial data such as CPU load or bandwidth usage. Collect, analyze, and measure performance data for SNMP compliant devices in near real-time. Prediction of saturation, classification of the interface ports by use and calculation of the losses and latencies of different equipment.
             
            
        
         | 
        
        
                
            
            
            About
            Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints.
The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events.
EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts.
Various integrations & multi-tenancy available.
             
            
        
         | 
        |||||
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        
        
        
        Platforms Supported
            
                Windows
            
            
         
        
    
        
        
            
                Mac
            
            
         
        
    
        
        
            
                Linux
            
            
         
        
    
        
        
            
                Cloud
            
            
         
        
    
        
        
            
                On-Premises
            
            
         
        
    
        
        
            
                iPhone
            
            
         
        
    
        
        
            
                iPad
            
            
         
        
    
        
        
            
                Android
            
            
         
        
    
        
        
            
                Chromebook
            
            
         
        
    
         | 
        |||||
                
            
        
        Audience
        Companies and enterprises searching for a solution to monitor their networks
         
        
    
         | 
        
        
                
            
        
        Audience
        IT Professionals,SysAdmins,Consultants, small businesses, government & military institutions, universities and large Fortune 500 companies
         
        
    
         | 
        |||||
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        
        
                
            
        
        Support
            
                Phone Support
            
            
         
        
    
        
        
            
                24/7 Live Support
            
            
         
        
    
        
        
            
                Online
            
            
         
        
    
         | 
        |||||
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        
        
                
            
        
        API
            
                Offers API
            
            
         
        
    
         | 
        |||||
                
            
        
        Screenshots and Videos | 
        
        
                
            
        
        Screenshots and Videos | 
        |||||
                
            
        
        Pricing
        $1300.00/year
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        
        
                
            
        
        Pricing
        $85.00/one-time
        
     
    
    
        
        
            
                Free Version
            
            
         
        
    
        
        
            
                Free Trial
            
            
         
        
    
         | 
        |||||
                
            
        
    
        
Reviews/
         | 
        
        
                
            
        
    
        
Reviews/
         | 
        |||||
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        
        
                
            
        
        Training
            
                Documentation
            
            
         
        
    
        
        
            
                Webinars
            
            
         
        
    
        
        
            
                Live Online
            
            
         
        
    
        
        
            
                In Person
            
            
         
        
    
         | 
        |||||
                
            
        
        Company InformationPrival 
    
    Founded: 2003 
    
    Canada 
    www.blesk.ca 
         | 
        
        
                
            
        
        Company InformationNETIKUS.NET ltd 
    
    Founded: 2002 
    
    United States 
    www.eventsentry.com 
         | 
        |||||
                
            
            
    
        
        
        
            Alternatives | 
        
        
                
            
            
    
        
        
        
            Alternatives | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        ||||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
| 
                
            
            
    
        
        
        
        
             | 
        
        
                
            
            
    
        
        
        
        
             | 
        |||||
                
            
        
    
        Categories | 
        
        
                
            
        
    
        Categories | 
        |||||
                
            
        
    
        
            
            
                
                IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Log Management Features
            
                Archiving
            
            
         
        
    
        
        
            
                Audit Trails
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Consolidation
            
            
         
        
    
        
        
            
                Data Visualization
            
            
         
        
    
        
        
            
                Event Logs
            
            
         
        
    
        
        
            
                Network Logs
            
            
         
        
    
        
        
            
                Remediation
            
            
         
        
    
        
        
            
                Syslogs
            
            
         
        
    
        
        
            
                Thresholds
            
            
         
        
    
        
        
            
                Web Logs
            
            
         
        
    
                    Network Monitoring Features
            
                Bandwidth Monitoring
            
            
         
        
    
        
        
            
                Baseline Manager
            
            
         
        
    
        
        
            
                Diagnostic Tools
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                IP Address Monitoring
            
            
         
        
    
        
        
            
                Real Time Analytics
            
            
         
        
    
        
        
            
                Resource Management
            
            
         
        
    
        
        
            
                Server Monitoring
            
            
         
        
    
        
        
            
                SLA Monitoring
            
            
         
        
    
        
        
            
                Uptime Monitoring
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Application Performance Monitoring (APM) Features
            
                Baseline Manager
            
            
         
        
    
        
        
            
                Diagnostic Tools
            
            
         
        
    
        
        
            
                Full Transaction Diagnostics
            
            
         
        
    
        
        
            
                Performance Control
            
            
         
        
    
        
        
            
                Resource Management
            
            
         
        
    
        
        
            
                Root-Cause Diagnosis
            
            
         
        
    
        
        
            
                Server Performance
            
            
         
        
    
        
        
            
                Trace Individual Transactions
            
            
         
        
    
                    IT Asset Management Features
            
                Asset Tracking
            
            
         
        
    
        
        
            
                Audit Management
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Configuration Management
            
            
         
        
    
        
        
            
                Contract/License Management
            
            
         
        
    
        
        
            
                Cost Tracking
            
            
         
        
    
        
        
            
                Depreciation Management
            
            
         
        
    
        
        
            
                Inventory Management
            
            
         
        
    
        
        
            
                IT Service Management
            
            
         
        
    
        
        
            
                Maintenance Management
            
            
         
        
    
        
        
            
                Procurement Management
            
            
         
        
    
        
        
            
                Requisition Management
            
            
         
        
    
        
        
            
                Supplier Management
            
            
         
        
    
                     | 
        
        
                
            
        
    
        
            
            
                
                IT Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Anti Virus
            
            
         
        
    
        
        
            
                Email Attachment Protection
            
            
         
        
    
        
        
            
                Event Tracking
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                IP Protection
            
            
         
        
    
        
        
            
                Spyware Removal
            
            
         
        
    
        
        
            
                Two-Factor Authentication
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
        
        
            
                Web Threat Management
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Log Management Features
            
                Archiving
            
            
         
        
    
        
        
            
                Audit Trails
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Consolidation
            
            
         
        
    
        
        
            
                Data Visualization
            
            
         
        
    
        
        
            
                Event Logs
            
            
         
        
    
        
        
            
                Network Logs
            
            
         
        
    
        
        
            
                Remediation
            
            
         
        
    
        
        
            
                Syslogs
            
            
         
        
    
        
        
            
                Thresholds
            
            
         
        
    
        
        
            
                Web Logs
            
            
         
        
    
                    Network Monitoring Features
            
                Bandwidth Monitoring
            
            
         
        
    
        
        
            
                Baseline Manager
            
            
         
        
    
        
        
            
                Diagnostic Tools
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                IP Address Monitoring
            
            
         
        
    
        
        
            
                Real Time Analytics
            
            
         
        
    
        
        
            
                Resource Management
            
            
         
        
    
        
        
            
                Server Monitoring
            
            
         
        
    
        
        
            
                SLA Monitoring
            
            
         
        
    
        
        
            
                Uptime Monitoring
            
            
         
        
    
        
        
            
                Web Traffic Reporting
            
            
         
        
    
                    Network Security Features
            
                Access Control
            
            
         
        
    
        
        
            
                Analytics / Reporting
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Firewalls
            
            
         
        
    
        
        
            
                Internet Usage Monitoring
            
            
         
        
    
        
        
            
                Intrusion Detection System
            
            
         
        
    
        
        
            
                Threat Response
            
            
         
        
    
        
        
            
                VPN
            
            
         
        
    
        
        
            
                Vulnerability Scanning
            
            
         
        
    
                    Computer Security Features
            
                Anti Spam
            
            
         
        
    
        
        
            
                Antivirus
            
            
         
        
    
        
        
            
                Audit Trail
            
            
         
        
    
        
        
            
                Compliance Management
            
            
         
        
    
        
        
            
                Database Security Audit
            
            
         
        
    
        
        
            
                File Access Control
            
            
         
        
    
        
        
            
                Financial Data Protection
            
            
         
        
    
        
        
            
                Maintenance Scheduling
            
            
         
        
    
        
        
            
                Real Time Monitoring
            
            
         
        
    
        
        
            
                Security Event Log
            
            
         
        
    
        
        
            
                Virus Definition Update
            
            
         
        
    
        
        
            
                Vulnerability Protection
            
            
         
        
    
                    SIEM Features
            
                Application Security
            
            
         
        
    
        
        
            
                Behavioral Analytics
            
            
         
        
    
        
        
            
                Compliance Reporting
            
            
         
        
    
        
        
            
                Endpoint Management
            
            
         
        
    
        
        
            
                File Integrity Monitoring
            
            
         
        
    
        
        
            
                Forensic Analysis
            
            
         
        
    
        
        
            
                Log Management
            
            
         
        
    
        
        
            
                Network Monitoring
            
            
         
        
    
        
        
            
                Real Time Monitoring
            
            
         
        
    
        
        
            
                Threat Intelligence
            
            
         
        
    
        
        
            
                User Activity Monitoring
            
            
         
        
    
                     | 
        |||||
                
            
        
    
        Integrations
            
                
    Freshdesk
            
            
         
        
    
        
        
            
                
    SMSEagle
            
            
         
        
    
        
        
            
                
    Slack
            
            
         
        
    
        
        
            
                
    Spiceworks IT Help Desk
            
            
         
        
    
        
        
            
                
    Trello
            
            
         
        
    
                
             | 
        
        ||||||
| 
                
            
        
    
     | 
        
        
                
            
        
    
     |