CRYPTOLOG

CRYPTOLOG

Crypttech
+
+

Related Products

  • ManageEngine Log360
    163 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    208 Ratings
    Visit Website
  • Graylog
    411 Ratings
    Visit Website
  • New Relic
    2,911 Ratings
    Visit Website
  • Site24x7
    1,160 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    516 Ratings
    Visit Website
  • groundcover
    32 Ratings
    Visit Website
  • LegalEdge
    17 Ratings
    Visit Website
  • Polonious
    2 Ratings
    Visit Website
  • Interfacing Integrated Management System (IMS)
    71 Ratings
    Visit Website

About

One of the major needs of businesses is a convenient log management system that collects logs of the IT systems in the organization and analyzes them to meet legal regulations and industry standards. CRYPTOLOG complies with public & sectoral requirements and offers unified and easy-to-use search, analysis, correlation options that can be customized to the needs and size of the IT systems. CRYPTOLOG makes it easy to identify potential security threats from log data to conduct forensic investigations. CRYPTOLOG is a cost-effective integrated log management system that helps you meet regulatory compliance on the one hand, while reducing your security risks in a variety of IT environments. With its fast and powerful engines, CRYPTOLOG brings together a wide range of log and events to give you a comprehensive view of all your network activities on a customizable panel.

About

Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Log Analysis solution for IT teams

Audience

Data analysts

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Crypttech
Founded: 2006
Turkey
www.crypttech.com/en/products/cryptolog/

Company Information

Gravwell
USA
gravwell.io

Alternatives

Alternatives

Nagios Log Server

Nagios Log Server

Nagios Enterprises
EventSentry

EventSentry

NETIKUS.NET ltd

Categories

Categories

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

SCYTHE
ThreatBlockr

Integrations

SCYTHE
ThreatBlockr
Claim CRYPTOLOG and update features and information
Claim CRYPTOLOG and update features and information
Claim Gravwell and update features and information
Claim Gravwell and update features and information