Log & Event Manager

A SIEM that makes it easy to use logs for security, compliance, and troubleshooting

Starts at $4495
DOWNLOAD FREE TRIAL Fully functional for 30 days

Out of the box rules and reports make it easy to meet industry compliance requirements.

Log & Event Manager includes rules and reports for standards like HIPAA, PCI-DSS, SOX, GLBA, NCUA, NERC-CIP, DISA-STIG, and more.

Normalize log data to quickly spot security incidents and make troubleshooting easy.

Log & Event Manager normalizes logs so your rules and reports work regardless of the source. For example, see all logon failures regardless of the original log structure.

Key Features

Node based licensing

Licensing based on number of nodes, such as servers and network devices, with special pricing for endpoints.


Real-time event correlation

In memory, cross platform event processing for instant notification and remediation without waiting on data queries.


Search log data

Simple keyword search or powerful custom queries using drag-and-drop interface. Save, share, and schedule searches for efficient forensics.


Real-time remediation

Mitigate issues in real-time with Active Responses that will Block IPs, change privileges, disable accounts, block USB devices and kill applications.


File integrity monitoring

Monitor and alert on registry, file and folder activity to detect suspicious and malicious behavior.


High data compression

Average data compression of 95%. Simply provision more storage to the virtual appliance to expand data retention as needed.


More Features

USB Defender

Detach unauthorized USB devices and monitor file activity for potential data theft.

Configurable Dashboard

Create and customize widgets to display critical events across your IT environment.

Scheduled Searches

Schedule an automatic search and receive an email with the results attached.

User Defined Groups

Add UDG’s as white or black lists in filters, rules and searches.

Custom Email Templates

Customize email alerts with additional text and formatting.

Event Explorer

Use Event Explorer for extended correlation rule analysis.

Threat Intelligence Feed

Find events indicating malicious activity using automatically updated list of known bad IPs.


  • screenshot Zoom

    Easy Log Collection

  • screenshot Zoom

    Real-Time Event Correlation

  • screenshot Zoom

    Automated Remediation

  • screenshot Zoom

    Security, Compliance and Operations Reporting

  • screenshot Zoom

    Cutting Edge IT Search

  • screenshot Zoom

    USB Defender for Data Loss Protection

  • screenshot Zoom

    File Integrity Monitoring

  • screenshot Zoom

    Data Compression and Log Archiving

System Requirements

Technical Requirements for virtual appliance
  • Hard Drive 250 GB
  • Memory8 GB
  • CPUDual Core, 2GHz
  • HypervisorVMware® ESX/ESXi 4.0+
    Hyper-V Server versions 2008R2, 2012/2012R2


Used by Companies of all Sizes

Take the Next Step
Let's Talk it Over

Call Us at 866.530.8100