EventSentryNETIKUS.NET ltd
|
SolarWinds Kiwi Log ViewerSolarWinds
|
|||||
Related Products
|
||||||
About
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints.
The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events.
EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts.
Various integrations & multi-tenancy available.
|
About
Display log files in an easy-to-read tabular format and choose various search and filter options. Kiwi Log Viewer can read files up to 14TB to make sure you can view and search all logs you need regardless of size. Easily monitor changes to a specified log file in real-time. Display log files in easy-to-read tabular format. Monitor changes to a specified log file in real-time. Open files of any size and automatically highlight important text. Leverage sub-string matching or Perl-style regular expression (regex) matching. Apply highlighting rules to detect the most important messages quickly. Easily monitor log files for specific keywords, phrases, or patterns. Kiwi Log Viewer displays text-based log files in a tabular format. You can copy selected rows in tab-delimited format or click-select-copy any part of the row text. Thanks to the file tailing feature, you can monitor the specified log file for changes and view any new data added in real-time.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT Professionals,SysAdmins,Consultants, small businesses, government & military institutions, universities and large Fortune 500 companies
|
Audience
Anyone seeking a solution to monitor log files for specific keywords, phrases, or patterns
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$85.00/one-time
Free Version
Free Trial
|
Pricing
$111 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationNETIKUS.NET ltd
Founded: 2002
United States
www.eventsentry.com
|
Company InformationSolarWinds
Founded: 1999
United States
www.solarwinds.com/kiwi-log-viewer
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
|
||||||
|
|
|