About us

Optrics is an authorized ManageEngine Partner with expertise in customized network solutions.

read more

Optrics Call Answer Guarantee
Toll Free: 1-877-386-3763
Direct: 1-780-430-6240

If you have any questions, call us during regular business hours, and you will always speak with a person.
Monday to Friday, 8am - 5pm MST

Eventlog Analyzer

Log Management Software

Your IT infrastructure generates huge amount of logs every day and these machine generated logs contain vital information of all network activities such as user logons/logoffs, policy changes, object deletion and more. Log management software with this information helps organizations to audit their network for internal threats and meet regulatory IT compliance requirements.

"Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application."
Jim Lloyd, Information Systems Manager First Mountain Bank

Event Log Analyzer Customers

Log Management Software

What is EventLog Analyzer?

With organizations generating terabytes of log, analyzing these logs manually is painful and time consuming. That's where Security Information and Event Management (SIEM) solutions like EventLog Analyzer come in.

EventLog Analyzer helps organizations to collect, analyze, correlate, report, archive, and search logs without any hassle. Unlike other IT management tools which are hard to use, difficult to install and expensive, EventLog Analyzer boasts about its ease of use, agent-less installation, instant reports, and cost effective pricing.

EventLog Analyzer offers a centralized repository to collect and archive machine generated logs from heterogeneous systems, network devices, and applications in your organization. The product supports a wide variety of IT Security and Regulatory IT Compliance reports such as SOX, HIPAA, FISMA, GLBA, ISO 27001, etc. Its intelligent log search and alerting engine helps network administrators to quickly troubleshoot and identify the root cause of IT problems.

Also, EventLog Analyzer using its powerful Universal Log Parsing and Indexing (ULPI) technology allows you to index new fields and decipher any log data regardless of the source and log format. Now you can stop sifting through voluminous logs manually and get it all done with EventLog Analyzer.

Why Choose EventLog Analyzer?

Unlock the Real value of your logs

  • Supports an extensive array of machine generated logs which includes system logs, device logs, and application logs
  • Provides a wide variety of reports for internal threat monitoring and regulatory compliance audits

Productivity improvement for IT teams

  • From product deployment to report generation in minutes!
  • Real-time alerts to network events enable IT to respond instantaneously to security threats
Get a Quote  or  Download Free Trial

 

Meet dynamic business needs quickly

  • Rapidly transforms machine generated logs into actionable information
  • Receive reports in user friendly formats and meet regulatory business requirements

Attractive TCO & Rapid ROI

  • No additional hardware required, minimal IT overhead , ease-of-deploymen t and ease-of-use ensures a low TCO and rapid ROI

Features

Log Collection

  • Agentless log collection (optional agents available)
  • Collects logs from heterogeneous sources (Windows systems, Unix/Linux systems, Applications, Databases, Routers, Switches and other Syslog devices)

Privileged User Monitoring

  • Collects and analyzes all events on user and administrator activity
  • Get precise information of user access such as which user performed the action, what was the result of the action, on which server it happened and track down the user workstation from where the action was triggered

Compliance Reports

  • Generate pre-defined/canned compliance reports for Event logs & Syslogs, to meet HIPAA, GLBA, PCI DSS, SOX, ISO 27001, and FISMA
  • Provides value added new feature to create custom report for new compliance to help comply with growing new regulatory

Real-Time Event Correlation

  • With 70+ predefined event correlation rules, detect breach attempts, insider threats, policy violations and more without any manual intervention
  • Flexible drag-n-drop correlation rule builder allows users to define attack patterns thus help in proactively reacting to security threats

Log Forensics

  • Drill down to the raw log events and do a root cause analysis within minutes, and drastically reduce the time-to-remediate
  • Generates network forensic reports like user activity reports, system audit reports, regulatory compliance reports, etc.

Real-time Alerting

  • Get alerted in real-time via SMS and email upon the occurrence of network anomaly. You can even run a program or script to remediate the alert condition.
  • 500+ predefined alert criteria across Windows, Unix/Linux, Application and Network device infrastructure eliminates the need for setting up alert profile for routine tasks thus increasing the operational efficiency.

Log Archive

  • Automatically archives all machine generated logs - system logs, device logs & application logs to a centralized repository
  • Archived log files are encrypted to make it secure and are hashed & time-stamped to make it tamper-proof

Log Search

  • Conduct a search using Wild-cards, Phrases, Boolean operators, etc.
  • Search for anything, not just a handful of pre-indexed fields, and quickly detect network anomalies - misconfigurations, viruses, user activities, system/applications errors, etc.

Universal Log Collection

  • Decipher any log data regardless of the source and log format
  • Allows you to index any machine-generated logs (provided it is in human readable, non-encrypted format) by defining and extracting log fields of your choice using regular expression (regex) patterns

File Integrity Monitoring

  • Centrally track all changes when files and folders are created, accessed, viewed, deleted, modified, renamed, etc.
  • Get a complete audit trail of all the changes that happen on files and folders. Audit trail answers the "who what, when, where and how" of all changes in real-time!
Get a Quote  or  Download Free Trial

EventLog Analyzer Documentation

Here you can find EventLog Analyzer product documentation, brochures and guides. If you have any questions please feel free to contact us and one of our specialists will address your inquiry as soon as possible.

Get a Quote  or  Download Free Trial

System Requirements

For 32 Bit Installation

The minimum hardware requirements for installing and working with EventLog Analyzer are given below.

  • 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent
  • 4 GB RAM*
  • 50 GB Hard disk space for the product

For 64 Bit Installation

The minimum hardware requirements for EventLog Analyzer to start running are listed below.

  • 2.80 GHz, 64-bit (x64) Xeon LV processor or equivalent
  • 4 GB RAM*
  • 50 GB Hard disk space for the product

EventLog Analyzer is optimized for 1024x768 monitor resolution and above.

* The following table recommends the disk space and RAM size requirements of the system where EventLog Analyzer is installed. The disk space and RAM size requirements depends on the number of host sending log information to EventLog Analyzer, the number of host log records received per second or the host log data received per day by EventLog Analyzer. The calculation is worked out for 100 hosts and an average log record size of 350 bytes.

Log Records Rate or Volume RAM Size Hard Disk Space Requirement Per Month to Archive Logs
500/sec or 20 GB/day 4 GB 400 GB
1000/sec or 40 GB/day 8 GB 800 GB

Operating System Requirements

EventLog Analyzer can be installed and run on the following operating systems and versions:

  • Windows™ 8, Windows™ 7, Vista, 2000, XP, & NT and Windows™ Server 2000/2003/2008/2008 R2/2012
  • Linux - RedHat 8.0/9.0, Mandrake/Mandriva, SuSE, Fedora, CentOS
  • Ability to run in VMware environment

Supported Web Browsers

EventLog Analyzer has been tested to support the following browsers and versions:

  • Internet Explorer 8 and later
  • Firefox 4 and later
  • Chrome 8 and later

Supported Databases

Bundled with the product

  • PostgreSQL

External Databases

  • MS SQL 2005
  • MS SQL 2008
  • MS SQL 2012
  • MS SQL 2014

PostgreSQL Performance Improvement Parameters

For better performance, we recommend replacing the existing PostgreSQL parameters mentioned in postgres_ext.txt available under\pgsql\data\directory with the values mentioned below:

Parameters This change requires EventLog Analyzer Application/Service restart.
shared_buffers=128 MB Minimum requirement is 128 KB. This change requires EventLog Analyzer Application/Service restart.
work_mem=12 MB Minimum requirement is 64 KB.
maintenance_work_mem=100 MB Minimum requirement is 1 MB.
checkpoint_segments=15 Logfile segments minimum 1 and 16 MB each.
checkpoint_timeout=11 minutes Range: 30 seconds to 1 hour.
checkpoint_completion_target=0.9 checkpoint target duration is 0.0 - 1.0.
seq_page_cost=1.0 This parameter is measured in an arbitrary scale.
random_page_cost=2.0 This parameter is measured in same scale as above.
effective_cache_size=512MB
synchronous_commit=off

Videos

Get a Quote  or  Download Free Trial
  Download Free Trial   Get A Quote   Contact Us