Audience

IT teams looking for an advanced Log Management solution

About ManageEngine Log360

Log360 is a one-stop solution for all your log management and network security challenges. This tightly-integrated solution combines the capabilities of ADAudit Plus, EventLog Analyzer, O365 Manager Plus, Exchange Reporter Plus, and Cloud Security Plus. With a versatile combination like this, you'll gain complete control over your network; you'll be able to audit Active Directory changes, network device logs, Microsoft Exchange Servers, Microsoft Exchange Online, Azure Active Directory, and your public cloud infrastructure all from a single console. Monitor and audit critical Active Directory changes in real time. Meet stringent requirements of regulatory mandates such as PCI DSS, FISMA, HIPAA, SOX, GLBA, GPG 13, and the GDPR by means of readily available reports. Receive exhaustive information in the form of audit reports on critical events in Azure Active Directory and Exchange Online.

Pricing

Pricing Details:
Based on number of log sources. Doesn't limit number of log data.
Free Version:
Free Version available.
Free Trial:
Free Trial available.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Zoho
Founded: 1996
India

Videos and Screen Captures

Product Details

Platforms Supported
Windows
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
Online

ManageEngine Log360 Frequently Asked Questions

Q: What kinds of users and organization types does ManageEngine Log360 work with?
Q: What languages does ManageEngine Log360 support in their product?
Q: What kind of support options does ManageEngine Log360 offer?
Q: What other applications or services does ManageEngine Log360 integrate with?
Q: What type of training does ManageEngine Log360 provide?
Q: Does ManageEngine Log360 offer a free trial?

ManageEngine Log360 Product Features

Cybersecurity

Behavioral Analytics
Incident Management
Vulnerability Scanning
Whitelisting / Blacklisting
AI / Machine Learning
Endpoint Management
IOC Verification
Tokenization

Data Loss Prevention

Policy Management
Sensitive Data Identification
Whitelisting / Blacklisting
Web Threat Management
Incident Management
Compliance Reporting

Incident Response

Workflow Management
Workflow Automation
Incident Database
Incident Alerting
Incident Reporting
Incident Logs
Threat Intelligence
Security Orchestration
Automated Remediation
SLA Tracking / Management
Forensic Data Retention
Privacy Breach Reporting
Compliance Reporting
SIEM Data Ingestion / Correlation
Timeline Analysis
Attack Behavior Analytics

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring