LogSentinel SIEM Features
Centralized log collection, aggregation and normalization | ||
---|---|---|
Unlimited On-Premise Integrations | Supported integrations and sources | |
Unlimited Cloud Integrations | Supported integrations and sources | |
Custom Connectors | UI-based configuration for any text file or database source | |
Agentless collection | Collect logs without the need to install an agent on each monitored machine | |
Long-term retention | Data retention policies | |
Per-source retention | Data retention documentation | |
Asset discovery | Setting up automated asset discovery | |
Threat detection | ||
Rule-based event correlation and threat detection | Configuring correlation and statistics rules | |
Machine-learning threat detection | Overview of machine learning anomaly detection | |
Threat intelligence | Supported threat intelligence feeds | |
Threat hunting | Threat hunting dashboard | |
Phishing detection | Phishing detection overview | |
Leaked credentials notification | Leaked credentials | |
Website formjacking detection | Website formjacking overview | |
File integrity monitoring | Setting up file and registry integrity monitoring | |
Honeypot data collection | Configuring a honeypot agent | |
Incident response | ||
Incident response capabilities | Incident response actions | |
Investigation and triage | Investigation dashboard | |
Flexible threat notifications | Configuring alert destinations | |
Automation | Incident response automation & SOAR integration | |
Dashboards and reporting | ||
Custom security dashboards | Custom dashboards user guide | |
Management reporting | Configuring reports | |
Compliance reporting | Supported regulations for compliance reporting | |
Security Monitoring | ||
Application monitoring | Flexible application audit log collection | |
Database activity monitoring | Supported databases | |
Network monitoring | Supported appliances | |
SAP Security Monitoring | SAP Security monitoring details | |
IAM Security Monitoring | IAM Security monitoring details | |
Implementation and support | ||
Flexible deployment options | On-premises, Cloud/SaaS, Whitelabeled | |
Automated implementation plan | Implementation templates documentation | |
Email and phone support | Support is included in the license | |
Advanced security and compliance | ||
Log integrity | Tamper-protected audit trail | |
Digital evidence | Legally sound digital evidence | |
End-to-end log encryption | Log searchable encryption details | |
Billing | ||
Flexible billing options | Annual, bi-annual or monthly | |
Price based on the number of active users | Ask for quote or see pricing | |
Managed detection and response | Managed service pricing model that follows the SIEM pricing model |