LogSentinel SIEM Features

Centralized log collection, aggregation and normalization
Unlimited On-Premise IntegrationsSupported integrations and sources
Unlimited Cloud IntegrationsSupported integrations and sources
Unlimited retentionData retention policies
Asset discoverySetting up automated asset discovery
Threat detection
Rule-based event correlation and threat detectionConfiguring correlation and statistics rules
Machine-learning threat detectionOverview of machine learning anomaly detection
Threat intelligenceSupported threat intelligence feeds
Threat huntingThreat hunting dashboard
Phishing detectionPhishing detection overview
Website formjacking detectionWebsite formjacking overview
File integrity monitoringSetting up file and registry integrity monitoring
Honeypot data collectionConfiguring a honeypot agent
Incident response
Incident response capabilitiesIncident response actions
Investigation and triageInvestigation dashboard
Flexible threat notificationsConfiguring alert destinations
AutomationIncident response automation & SOAR integration
Dashboards and reporting
Custom security dashboardsCustom dashboards user guide
Management reportingConfiguring reports/a>
Compliance reportingSupported regulations for compliance reporting
Security Monitoring
Application monitoringFlexible application audit log collection
Database activity monitoringSupported databases
Network monitoringSupported appliances
SAP Security MonitoringSAP Security monitoring details
IAM Security MonitoringIAM Security monitoring details
Implementation, support and managed services
Flexible deployment optionsOn-premises, Cloud/SaaS, Whitelabeled
Automated implementation planImplementation templates documentation
Managed detection and responseMDR details
Email and phone supportSupport is included in the subscription
Advanced security and compliance
Log integrityTamper-protected audit trail
Digital evidenceLegally sound digital evidence
End-to-end log encryptionLog searchable encryption details
Flexible billing optionsAnnual, bi-annual or monthly
Price based on the number of active usersAsk for quote or see pricing
Managed detection and responseManaged service pricing model that follows the SIEM pricing model

Protect your organization. Get a Quote.