SearchInform SIEM

SearchInform SIEM

SearchInform
+
+

Related Products

  • ManageEngine EventLog Analyzer
    159 Ratings
    Visit Website
  • Blumira
    131 Ratings
    Visit Website
  • ManageEngine Log360
    93 Ratings
    Visit Website
  • AdRem NetCrunch
    147 Ratings
    Visit Website
  • groundcover
    32 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • Delska
    14 Ratings
    Visit Website
  • Uptime.com
    275 Ratings
    Visit Website
  • SpamTitan
    813 Ratings
    Visit Website
  • ManageEngine OpManager
    1,417 Ratings
    Visit Website

About

Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.

About

SearchInform SIEM is a system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The system accumulates information from various sources, analyzes it, records incidents and alerts the designated staff. How the system works: •Collects events from various software and hardware sources: network equipment, third-party software, security tools, OS. •Analyses events and generates incidents in accordance with the rules, detects threats by identifying relationships (correlations, including cross-correlations) of events and/or incidents. •Automatically notifies employees in charge when incidents occur. •Normalises and details incidents for further investigation: determines the type and source of the incident, when integrated with AD – identifies the user. The solution provides 300+ ready-made rules – security policies. What's more, users can edit and customize existing rules and create their own policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams searching for a powerful SIEM solution

Audience

Companies from various business spheres and G-sector clients of different size and structure

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

LogPoint
Founded: 2001
Denmark
www.logpoint.com

Company Information

SearchInform
Founded: 1995
searchinform.com/products/siem/

Alternatives

Alternatives

Juniper Secure Analytics

Juniper Secure Analytics

Juniper Networks
EventSentry

EventSentry

NETIKUS.NET ltd
SureLog

SureLog

Surelog

Categories

Categories

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Application Performance Monitoring (APM) Features

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
Risk Monitor
SOC Prime Platform
SearchInform DLP
Tenable One

Integrations

Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
Risk Monitor
SOC Prime Platform
SearchInform DLP
Tenable One
Claim LogPoint and update features and information
Claim LogPoint and update features and information
Claim SearchInform SIEM and update features and information
Claim SearchInform SIEM and update features and information