+
+

Related Products

  • Graylog
    402 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    191 Ratings
    Visit Website
  • AdRem NetCrunch
    156 Ratings
    Visit Website
  • Grafana
    607 Ratings
    Visit Website
  • groundcover
    32 Ratings
    Visit Website
  • Cloudflare
    1,918 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ManageEngine OpManager
    1,631 Ratings
    Visit Website

About

Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.

About

Get your easy-to-use NTFS permissions tool to analyze and report NTFS security! Report NTFS permissions in a nicely formatted Excel sheet or HTML report. Report effective NTFS permissions owner to the owner of the data. Get User-specific effective NTFS permissions of a share or folder and its hierarchy. You can save any Permissions Report using Company Edition or Enterprise Edition to either a local built-in database or an external Microsoft SQL Server, to load it at any time to see the differences. Keep your NTFS Permissions Report clean and exclude any Active Directory security groups from the scan. There is no need to report the names of known accounts, e.g. backup operator or share operator. In case there are some special ACEs set to folders you can translate these security settings to meaningful labels.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams searching for a powerful SIEM solution

Audience

IT teams in need of a network security solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

€997 per year
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.0 / 5
design 5.0 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

LogPoint
Founded: 2001
Denmark
www.logpoint.com

Company Information

G-TAC Software
India
www.foldersecurityviewer.com

Alternatives

Alternatives

DSRAZOR for Windows

DSRAZOR for Windows

Visual Click Software
Quest ControlPoint

Quest ControlPoint

Quest Software
EventSentry

EventSentry

NETIKUS.NET ltd
UQube

UQube

Upper Quadrant
Cloudsfer

Cloudsfer

Tzunami Inc

Categories

Categories

Application Performance Monitoring (APM) Features

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
SOC Prime Platform
Tenable One

Integrations

Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
SOC Prime Platform
Tenable One
Claim LogPoint and update features and information
Claim LogPoint and update features and information
Claim NTFS Permissions Reporter and update features and information
Claim NTFS Permissions Reporter and update features and information