| SureLogSurelog | ||||||
| Related Products
 | ||||||
| About
            Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities.
The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface.
Scan your systems automatically and immediately recognize the security status of your IT infrastructure.  
100% self-developed (security by design) and has no dependencies on third-party tools. Permanently scan your IT environment for existing devices and create a live image of your IT infrastructure. 
Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux .
Start your  15 day free trial now.
             | About
            SureLog SIEM.  Capabilities.  SureLog Enterprise SIEM is a next-generation log and event management reporting platform that analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog Enterprise correlates and aggregates events into normalized alerts to spot cyber security threats and instantly notifies your IT & security teams. SureLog includes advanced SIEM capabilities like real-time event management, entity and user behaviour analytic, machine learning, incident management, threat intelligent and reporting.  SureLog enterprise has more than 2000 out-of-box correlations rules for broad selection of security, privacy and compliance use cases.  Use Cases. Gain full visibility into logs, data flow, and events across on-premises, IoT, and cloud environments. Satisfy regulatory compliance with pre-built reports including PCI, GDPR, HIPAA, SOX, PIPEDA, OSFI and more. Automatically detect threats 
             | |||||
| Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | Platforms Supported
            
                Windows
            
            
         
            
                Mac
            
            
         
            
                Linux
            
            
         
            
                Cloud
            
            
         
            
                On-Premises
            
            
         
            
                iPhone
            
            
         
            
                iPad
            
            
         
            
                Android
            
            
         
            
                Chromebook
            
            
         | |||||
| Audience
        Enterprise, SMB, IT specialists, Network Administrators, Head of IT, Software distributors and resellers, integrators, VARs
         | Audience
        Businesses interested in a platform that analyzes log event data in real time to detect and prevent security attacks
         | |||||
| Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | Support
            
                Phone Support
            
            
         
            
                24/7 Live Support
            
            
         
            
                Online
            
            
         | |||||
| API
            
                Offers API
            
            
         | API
            
                Offers API
            
            
         | |||||
| Screenshots and Videos | Screenshots and Videos | |||||
| Pricing
        $12.99 per month
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | Pricing
        No information available.
        
        
     
            
                Free Version
            
            
         
            
                Free Trial
            
            
         | |||||
| 
Reviews/ | 
Reviews/ | |||||
| Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | Training
            
                Documentation
            
            
         
            
                Webinars
            
            
         
            
                Live Online
            
            
         
            
                In Person
            
            
         | |||||
| Company InformationEnginsight Founded: 2017 Germany enginsight.com | Company InformationSurelog Founded: 2012 Canada surelog.ca | |||||
| Alternatives | Alternatives | |||||
|  | ||||||
|  |  | |||||
|  | ||||||
| Categories | Categories | |||||
| SIEM Features
            
                Application Security
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Compliance Reporting
            
            
         
            
                Endpoint Management
            
            
         
            
                File Integrity Monitoring
            
            
         
            
                Forensic Analysis
            
            
         
            
                Log Management
            
            
         
            
                Network Monitoring
            
            
         
            
                Real Time Monitoring
            
            
         
            
                Threat Intelligence
            
            
         
            
                User Activity Monitoring
            
            
         Cloud Security Features
            
                Antivirus
            
            
         
            
                Application Security
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Encryption
            
            
         
            
                Endpoint Management
            
            
         
            
                Incident Management
            
            
         
            
                Intrusion Detection System
            
            
         
            
                Threat Intelligence
            
            
         
            
                Two-Factor Authentication
            
            
         
            
                Vulnerability Management
            
            
         Cybersecurity Features
            
                AI / Machine Learning
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Endpoint Management
            
            
         
            
                Incident Management
            
            
         
            
                IOC Verification
            
            
         
            
                Tokenization
            
            
         
            
                Vulnerability Scanning
            
            
         
            
                Whitelisting / Blacklisting
            
            
         Network Monitoring Features
            
                Bandwidth Monitoring
            
            
         
            
                Baseline Manager
            
            
         
            
                Diagnostic Tools
            
            
         
            
                Internet Usage Monitoring
            
            
         
            
                IP Address Monitoring
            
            
         
            
                Real Time Analytics
            
            
         
            
                Resource Management
            
            
         
            
                Server Monitoring
            
            
         
            
                SLA Monitoring
            
            
         
            
                Uptime Monitoring
            
            
         
            
                Web Traffic Reporting
            
            
         Network Security Features
            
                Access Control
            
            
         
            
                Analytics / Reporting
            
            
         
            
                Compliance Reporting
            
            
         
            
                Firewalls
            
            
         
            
                Internet Usage Monitoring
            
            
         
            
                Intrusion Detection System
            
            
         
            
                Threat Response
            
            
         
            
                VPN
            
            
         
            
                Vulnerability Scanning
            
            
         Website Monitoring Features
            
                Availability Testing
            
            
         
            
                Event Logs
            
            
         
            
                Event-Based Notifications
            
            
         
            
                FTP Monitoring
            
            
         
            
                Mail Server Monitoring
            
            
         
            
                Maintenance Scheduling
            
            
         
            
                Performance Metrics
            
            
         
            
                Real Time Monitoring
            
            
         
            
                Transaction Monitoring
            
            
         
            
                Uptime Reporting
            
            
         | SIEM Features
            
                Application Security
            
            
         
            
                Behavioral Analytics
            
            
         
            
                Compliance Reporting
            
            
         
            
                Endpoint Management
            
            
         
            
                File Integrity Monitoring
            
            
         
            
                Forensic Analysis
            
            
         
            
                Log Management
            
            
         
            
                Network Monitoring
            
            
         
            
                Real Time Monitoring
            
            
         
            
                Threat Intelligence
            
            
         
            
                User Activity Monitoring
            
            
         | |||||
| Integrations
                
    
                
                    No info available.
                
             | Integrations
                
    
                
                    No info available.
                
             | |||||
|  |  |