Please enable JavaScript.
Coggle requires JavaScript to display documents.
EventLog Analyzer (SIEM, Threat, Vulnerability, Antivirus (User activity…
EventLog Analyzer
SIEM, Threat, Vulnerability, Antivirus
User activity
Privileged User Activity Audit
External User Authentication
User Session Monitoring
Privilege User Monitoring Reports
Alerts
SMS Event Alerting
Event Alerting
Eventlog Analyzer Two Factor Authentication
FIM
File Integrity Monitoring
Correlation
Correlation(Sub)
File Integrity threats
File Integrity Monitoring
Log Forensics
Log Forensics
Ransomeware threats
STIX/TAXI Feed processor
STIX TAXII Threat Intelligence
Database threats
Symantec DLP
Malwarebytes
Mbam Malwarebytes Antimalware Log Reporting Software
System/Server threats
CEF format report
User account threats
Web server threats
Event Correlation
Vulnerability Scanner Audit
Openvas Reporting Tool
Threat
Threat (Sub)
Malwarebytes
Mbam Malwarebytes Antimalware Log Reporting Software
Threat Intelligence
Monitor Threat Intelligence Solutions
STIX TAXII Threat Intelligence
SIEM Threat Intelligence
Threat Intelligence Log Manager
Threat Intelligence Solution
Cryptojack
Cryptojacking Attacks Detection Prevention
Fireeye
Fireeye Threat Intelligence Reports
Fireeye Log Correlation Analysis
Fireeye Event Log Management
Web Server Attack Prevention
SIEM
siem(Sub)
SIEM
Security Information Management Solution
Security Information Event Management
Security Log Management Solution
SIEM Incident Response Management
SIEM Dos Attack Prevention
Event Trends
Critical Business Application Logs Management
Antivirus
Mcafee Endpoint Log Monitoring And Management
Symantec Log Management Solution
IT Compliance & Auditing
IT Compliance & Auditing
GPG
GPG13 Compliance Auditing Reporting
SOX
SOX Compliance Reports
GDPR
GDPR Compliance Handbook
General Data Protection Regulation Gdpr Solution
ISO 27001
ISO 27001 Compliance Audit
GLBA
Glba Compliance Reports
HIPAA
HIPAA Compliance Reports
FISMA
FISMA Compliance Reports
PCI
PCI DSS Challenges And Our Log Management Solutions
Eventlog Other PCI Requirements
Eventlog PCI Compliance Reports
PCI Compliance Reports
Eventlog PCI Compliance Reports
Regulatory Compliance Audit Solution
Eventlog New Compliance Reports
Eventlog Custom Compliance Reports
Eventlog Compliance
IT Compliance Management Software
Log Management & Log analysis
Server
Server Log Monitoring Software
Print Server Management
Server Log Management
Server(Sub)
Cloud
Cloud Infrastructure Monitoring
Cloud(sub)
Stackato
AWS EC2
AWS Log Monitoring
Monitor AWS EC2 Instance
On-Permises
Hyper-V
Hyper V Event Log Auditing
Hyper V Virtual Machine Event Log Management
Hyper V Server Event Log Reports
VMware
Vmware Log Management
Other Server
IBM Iseries
IBM AS 400 Log Management
Jboss
Apache Tomcat
Application
Application Log Processing
Application Log Monitoring Software
Database Auditing
Application Log Management
Application Log Processing 1
Application Log Processing 2
Application(Sub)
Oracle
Oracle Database Monitoring
Oracle Database Auditing Tool
DHCP
Dhcp Server Auditing Monitoring On Windows And Linux
SQL
SQL Auditing Tool
SQL Injection Attack Prevention
Ms SQL Server Log Analysis Reports
MS SQL Server Monitoring Analysis
Microsoft IIS
IIS Web Server Management Reports
IIS Server Log Analyzer
IIS Ftp Server Management Reports
Apache
Apache Web Server Log Analyzer
Mitigate Apache Web Server Attacks
Apache Top And Error Reports
Devices
Firewall
Monitor Windows Firewall
Firewall Traffic Monitoring Tool
Firewall Auditing Tool
Firewall(Sub)
Palo Alto
Palo Alto Logon Reports
Palo Alto Firewall Log Management
Palo Alto Traffic Analysis
Palo Alto Security Reporting
Fortigate
Fortigate Firewall Audit
SonicWall
Sonicwall Firewall Syslog Management
Sonicwall Firewall Traffic Analyzer
Sonicwall Log Analyzer
Sonicwall Firewall Configuration Management
Sonicwall Firewall Security Audit Reports
Sonicwall Firewall Network Security Monitor
Sonicwall Firewall Network Log Management
Sonicwall Firewall Syslog Analysis
Sonicwall Firewall User Audit
Sophos
Sophos Firewall Log Monitoring
Sophos Firewall Monitoring
CheckPoint
Check Point Traffic Log Monitoring
Checkpoint Log Analyzer
Fortinet
Fortinet Firewall Audit
Netscreen
Netscreen Log Analyzer Tool
Netscreen Traffic Analysis Tool
Huawei
Huawei Network Syslog Management
WatchGaurd
Watchguard Monitoring Tool
Cyberoam
Cyberoam Firewall Log Monitoring Software
pfSense
pfSense Firewall Log Analyzer
h3c
h3c network firewall log management
Cisco Meraki
Cisco Meraki Firewall Log Reporting Software
Network
VPN
VPN Assigned IP Reports
VPN Log Analyzer
Network Device Monitoring
Switch Log Monitoring
IDS IPS Monitoring Reporting
Network(sub)
Router
Router User Activity Tracking
Router User Activity Tracking
Monitor Router Logs
Barracuda
Barracuda Attack Prevention
Barracuda Security Report
Barracuda Web Traffic Monitoring
Barracuda User Auditing Tool
Barracuda Log Analysis Tool
Cisco
Cisco Security Monitoring Ids Ips
Cisco ASA Log Management
Cisco Asa Traffic Monitoring Tool
Cisco Asa VPN Monitoring
Cisco Log Analyzer
Cisco User Monitoring Tool
Hp
Juniper
Juniper Network Devices Log Auditing
Juniper IDS IPS Auditing
Juniper Firewall Audit Tool
Juniper Users Auditing
Juniper Routers Switches Auditing Tool
Solaris Log Auditing And Analysis Software
USB
USB Removable Disk Auditing
Removable Device Data Theft Detection
Other OS
Unix
Unix Auditing And Reporting
Monitor Unix Privileged User
Track Unix Mail Server Logs
Unix Severity Error Reports
Unix User Account Log Monitor
Unix Syslog Monitoring
Unix
Centos
Centos Log Server
Linux
Linux Auditing Reporting
Solaris
IBMAIX
BSD UNIX
HP UX
Windows(Sub)
Windows Event Log Monitoring
Windows Registry Log Audit
Analyze Critical Windows Application Log
Microsoft Terminal Server Log Monitoring
Windows System Audit
Log Pages
Type Of Log
Eventlog
Windows Event Log Management
Event Log Import Tool
Eventlog Analysis
Eventlog Monitor Custom Reports
Eventlog Monitor Ask Me Reports
Eventlog Monitoring Software
Importing Eventlogs
Event Log Auditing
Eventlog Archiving
Eventlog Reports
Syslog
Syslog Server
Syslog Security Reports
Network Syslog Auditing Software
Syslog Management 1
Syslog Management 2
Syslog Management
Syslog Monitoring Software
Universal Log Collection
Log Collection (Sub)
Agentles
Agent
Collect Eventlogs
Common Log Pages
Active Directory Log Monitoring
Log Management
Log Search
Universal Log Parsing Indexing
Log Forensics