Alternatives to Scribbler Log Manager

Compare Scribbler Log Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Scribbler Log Manager in 2025. Compare features, ratings, user reviews, pricing, and more from Scribbler Log Manager competitors and alternatives in order to make an informed decision for your business.

  • 1
    groundcover

    groundcover

    groundcover

    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity. 100% visibility, all the time. Cover your entire Kubernetes stack instantly, with no code changes using the superpowers of eBPF instrumentation. Take control of your data, all in-cloud. groundcover’s unique inCloud architecture keeps your data private, secured and under your control without ever leaving your cloud premises.
    Compare vs. Scribbler Log Manager View Software
    Visit Website
  • 2
    Cynet All-in-One Cybersecurity Platform
    Cynet empowers MSPs and MSSPs with a comprehensive, fully managed cybersecurity platform that consolidates essential security functions into a single, easy-to-use solution. Cynet simplifies cybersecurity management, reduces operational overhead, and lowers costs by eliminating the need for multiple vendors and complex integrations. The platform provides multi-layered breach protection, offering robust security for endpoints, networks, and SaaS/Cloud environments. Cynet’s advanced automation streamlines incident response, ensuring rapid detection, prevention, and resolution of threats. Additionally, the platform is backed by Cynet’s 24/7 Security Operations Center (SOC), where the expert CyOps team delivers around-the-clock monitoring and support to safeguard all client environments. By partnering with Cynet, You can offer your clients advanced, proactive cybersecurity services while optimizing efficiency. Discover how Cynet can transform your security offerings today.
    Compare vs. Scribbler Log Manager View Software
    Visit Website
  • 3
    ManageEngine EventLog Analyzer
    ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
    Compare vs. Scribbler Log Manager View Software
    Visit Website
  • 4
    Sematext Cloud

    Sematext Cloud

    Sematext Group

    Sematext Cloud is an innovative, unified platform with all-in-one solution for infrastructure monitoring, application performance monitoring, log management, real user monitoring, and synthetic monitoring to provide unified, real-time observability of your entire technology stack. It's used by organizations of all sizes and across a wide range of industries, with the goal of driving collaboration between engineering and business teams, reducing the time of root-cause analysis, understanding user behaviour and tracking key business metrics. The main capabilities range from log monitoring to APM, server monitoring, database monitoring, network monitoring, uptime monitoring, website monitoring or container monitoring Find complete details on our website. Or better: start a free demo, no email address required.
  • 5
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 6
    Splunk Observability Cloud
    Splunk Observability Cloud is a comprehensive, real-time monitoring and observability platform designed to help organizations gain full visibility into their cloud-native environments, infrastructure, applications, and services. It combines metrics, logs, and traces into a unified solution, providing seamless end-to-end visibility across complex architectures. With its powerful analytics, AI-driven insights, and customizable dashboards, Splunk Observability Cloud helps teams quickly identify and resolve performance issues, reduce downtime, and improve system reliability. It supports a wide range of integrations and provides real-time, high-resolution data for proactive monitoring. This enables IT and DevOps teams to detect anomalies, optimize performance, and ensure the health and efficiency of their cloud and hybrid environments.
  • 7
    Datadog

    Datadog

    Datadog

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.
  • 8
    ServiceNow Cloud Observability
    ServiceNow Cloud Observability is a solution that provides real-time monitoring and visibility into cloud infrastructure, applications, and services. It enables organizations to proactively identify and resolve performance issues by integrating data from various cloud environments into a unified dashboard. With advanced analytics and alerting capabilities, ServiceNow Cloud Observability helps IT and DevOps teams detect anomalies, troubleshoot problems, and ensure optimal system performance. The platform also supports automation and AI-driven insights, allowing teams to respond quickly to incidents and prevent potential disruptions. Overall, it improves operational efficiency and ensures a seamless user experience across cloud environments.
    Starting Price: $275 per month
  • 9
    Mezmo

    Mezmo

    Mezmo

    Mezmo (formerly LogDNA) enables organizations to instantly centralize, monitor, and analyze logs in real-time from any platform, at any volume. We seamlessly combine log aggregation, custom parsing, smart alerting, role based access controls, and real-time search, graphs, and log analysis in one suite of tools. Our cloud based SaaS solution sets up within two minutes to collect logs from AWS, Docker, Heroku, Elastic and more. Running Kubernetes? Start logging in two kubectl commands. Simple, pay-per-GB pricing without paywalls, overage charges, or fixed data buckets. Simply pay for the data you use on a month-to-month basis. We are SOC2, GDPR, PCI, and HIPAA compliant and are Privacy Shield certified. Our military grade encryption ensures your logs are secure in transit and storage. We empower developers with user-friendly, modernized features and natural search queries. With no special training required, we save you even more time and money.
  • 10
    SolarWinds Log Analyzer
    Easily investigate machine data to help identify the root cause of IT issues faster. Powerfully designed and intuitive log aggregation, tagging, filtering, and alerting for effective troubleshooting. Fully integrated with Orion Platform products, enabling a unified view of IT infrastructure monitoring and associated logs. We’ve worked as network and systems engineers, so we understand your problems and how to solve them. Your infrastructure is constantly generating log data to provide performance insight. Collect, consolidate, and analyze thousands of syslog, traps, Windows, and VMware events to perform root-cause analysis with log monitoring tools from Log Analyzer. Perform searches using basic matching. Execute searches using multiple search criteria and apply filters to narrow results. Save, schedule, and export search results within the log monitoring software.
  • 11
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. The platform’s scalable architecture, with features like zero data loss and long-term compliance storage, ensures that businesses can maintain high security standards while optimizing performance.
  • 12
    LogFusion

    LogFusion

    Binary Fortress Software

    LogFusion is a powerful realtime log monitoring application designed for system administrators and developers! Use custom highlighting rules, filtering and more. You can even sync your LogFusion settings between computers. Use LogFusion's powerful custom highlighting to match text strings or regex patterns and format the matched log lines to suit your needs. Use LogFusion's Advanced Text Filtering to filter and hide lines that don't match your search text, all in realtime as new lines are being added. Complex queries allow you to easily narrow down your results. LogFusion can automatically add new logs from Watched Folders. Just specify the folders to monitor, and LogFusion will automatically open any new log files created in those folders.
  • 13
    SolarWinds Loggly
    SolarWinds® Loggly® is a cost-effective, hosted, and scalable full-stack, multi-source log management solution combining powerful search and analytics with comprehensive alerting, dashboarding, and reporting to proactively identify problems and significantly reduce Mean Time to Repair (MTTR). LOGGLY AT A GLANCE » Full-stack, multi-source log aggregation, log monitoring, and data analytics » Log analytics show events in context, highlight patterns, and detect anomalies for deeper insights » Highly scalable to ingest massive data volumes and help enable quick searching across large and complex environments » Spot usage patterns with application, service, and infrastructure-aligned historical analysis of user, log, and infrastructure data » Manage by exception by identifying variations from normal with powerful log formatting and analytic search capabilities
  • 14
    ALog SMASH
    ALog SMASH is a server access log product that records "when, who, and what" for Windows servers. Since it is installed directly on the file server, there is no need for a manager server dedicated to log management. With ALog SMASH, compact log management can be achieved quickly. The database and report/alert functions are all standard equipment. There is no additional cost. With 1-year of maintenance support. Everything from log search/report to system settings can be operated on the browser. Also equipped with a log translation function unique to the ALog series. You no longer have to spend time decrypting the event log. You can flexibly search the collected logs with an intuitive GUI. Designed for long-term log storage. Logs are automatically compressed up to about 1/4000. You can rest assured that you have ALog SMASH.
    Starting Price: $1740.00/one-time/user
  • 15
    Corner Bowl Event Log Manager

    Corner Bowl Event Log Manager

    Corner Bowl Software Corporation

    An enterprise class Centralized Windows Event Log Management Software Tool. A Centralized Log Consolidator. A Real-Time Windows Event Log, Syslog and Application Log Monitor Software Tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.
  • 16
    Logmanager

    Logmanager

    Logmanager

    Logmanager is a centralized log management platform enhanced with SIEM capabilities that radically simplifies responses to cyberthreats, legal compliance, and troubleshooting. By transforming diverse logs, events, metrics, and traces into actionable insights, it helps security and operations teams respond swiftly to any incident. Experience effortless self-management and customization, peerless functionality, and the flexibility to take control of your entire technology stack. – Effortlessly aggregate and standardize log files from diverse sources into one unified platform. – Enjoy rapid deployment, 140+ built-in integrations, and effortless scalability. – Get real-time visibility into security events to quickly detect, analyze, and address threats. – Use dozens of predefined security dashboards or customize your own views. – Set up alerts based on multiple trigger conditions or custom-defined rules. – Transparent pricing with no hidden fees. Pay as you go, scale as you grow.
    Starting Price: $500 per month
  • 17
    ALog ConVerter
    ALog ConVerter / ALog ConVerter DB automatically collects and analyzes access records (logs) for important data . With patented translation technology, A huge amount of data access records are extracted from complex system logs and compiled into an easy-to-read "access log" using the world's unique log analysis and conversion technology. Automatically learn file access frequency / access destination for each user. It scores unusual behaviors according to the degree of risk, revealing signs of fraud and attacks. By setting alerts / reports in advance, such as "Recording access to important folders", you can streamline the periodic checks / monitoring required for auditing. Monitor suspicious behavior from various perspectives, such as users who repeatedly fail to log on and users who repeatedly delete files.
  • 18
    Logz.io

    Logz.io

    Logz.io

    We know engineers love open source. So we supercharged the best open source monitoring tools — including ELK, Prometheus, and Jaeger, and unified them on a scalable SaaS platform. Collect and analyze your logs, metrics, and traces on one unified platform for end-to-end monitoring. Visualize your data on easy-to-use and customizable monitoring dashboards. Logz.io’s human-coached AI/ML automatically uncovers errors and exceptions in your logs. Quickly respond to new events with alerting to Slack, PagerDuty, Gmail, and other endpoints. Centralize your metrics at any scale on Prometheus-as-a-service. Unified with logs and traces. Add just three lines of code to your Prometheus config files to begin forwarding your metrics to Logz.io for storage and analysis. Quickly respond to new events by alerting Slack, PagerDuty, Gmail, and other endpoints. Logz.io’s human-coached AI/ML automatically uncovers errors and exceptions in your logs.
    Starting Price: $89 per month
  • 19
    Sumo Logic

    Sumo Logic

    Sumo Logic

    Sumo Logic offers a cloud solution for log management and metrics monitoring for IT and security teams of organizations of all sizes. Faster troubleshooting with integrated logs, metrics and traces. One platform. Many use cases. Increase your troubleshooting effectiveness. Sumo Logic helps you reduce downtime and move from reactive to proactive monitoring with cloud-based modern analytics powered by machine learning. Quickly detect Indicators of Compromise (IoCs), accelerate investigation, and ensure compliance using Sumo Logic Security Analytics. Enable data-driven business decisions and predict and analyze customer behavior using Sumo Logic’s real-time analytics platform. The Sumo Logic platform helps you make data-driven decisions and reduce the time to investigate security and operational issues so you can free up resources for more important activities.
  • 20
    Nagios Log Server

    Nagios Log Server

    Nagios Enterprises

    Nagios Log Server greatly simplifies the process of searching your log data. Set up alerts to notify you when potential threats arise, or simply query your log data to quickly audit any system. With Nagios Log Server, you get all of your log data in one location, with high availability and fail-over built right in. Quickly configure your servers to send all log data with easy source setup wizards and start monitoring your logs in minutes. Easily correlate log events across all servers in a few clicks. Nagios Log Server allows you to view log data in real-time, providing the ability to quickly analyze and solve problems as they occur. This keeps your organization safe, secure, and running smoothly. Nagios Log Server provides users with advanced awareness of their infrastructure. Dive deep into network events, logs, and security events. Use Log Server to provide the evidence necessary to track down security threats, and quickly resolve vulnerabilities with built-in alerts.
    Starting Price: $1995.00/one-time
  • 21
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 22
    Retrospective

    Retrospective

    centeractive AG

    Retrospective is a desktop application for convenient and effective searching in local and distributed log files as well as log data from container platforms such as Docker and Kubernetes. Such data sources are accessed on local and/or remote computers and the log data of different format is extracted, combined and displayed in one place (the result table). Advanced features such as profile definition, data source monitoring, sorting/filtering result entries, highlighting, bookmarking, exporting etc. enable fast and robust log data exploration. Retrospective assists you in early error detection by monitoring application servers’ logs, searching for exceptions, etc. The highly optimized search engine together with the aforementioned features ensures that much precious time is saved. Being able to access all log data in one place makes log data processing incredibly efficient, thus ensuring quick and effective reactions to problems, and therefore gain customers’ trust and loyalty.
  • 23
    Trunc

    Trunc

    Trunc

    All your logs. One place. Troubleshoot errors, detect attacks, audit your users and solve compliance requirements with Trunc. Keep all your logs, easily accessible, with full-text logging search. Logs are automatically categorized, correlated and stored. Alerts and active response included.
    Starting Price: $10 per month
  • 24
    Graylog

    Graylog

    Graylog

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: 1. Decrease risk and metrics like mean time to detect (MTTD) by aligning threat detection coverage to meet your security objectives 2. Reduce TCO with native data routing and data tiering functionality 3. Reduce key metrics like mean time to respond (MTTR) by quickly resolving the alerts that matter. Graylog Security is a robust, scalable solution that empowers analysts to detect and respond to cybersecurity threats efficiently. With integrated SOAR functionality, it automates repetitive tasks, orchestrates workflows, and accelerates incident response.
    Starting Price: $1550/month (10GB per day)
  • 25
    Quiver

    Quiver

    Castle Shield

    Quiver – Log Management Solutions that are Advanced & Easy-to-Use. Identify and mitigate threats, system breaches, & policy violations with Quiver™. Quiver™ is a cost-effective, powerful and flexible log management and log monitoring solution that combines complete log management with powerful correlation technology, real-time event log correlation and log monitoring, and an integrated incident response system – all on one appliance. Quiver™ offers organizations of all sizes and industries. Quiver™ provides an arsenal of log management, threat detection and risk reduction tools.
  • 26
    LogPoint

    LogPoint

    LogPoint

    Get a simple and fast security analytics implementation, along with a user-friendly interface that can be integrated with an entire IT infrastructure with LogPoint. LogPoint’s modern SIEM with UEBA provides advanced analytics and ML-driven automation capabilities that enable their customers to securely build-, manage, and effectively transform their businesses.They have a flat licensing model, based on nodes rather than data volume. This helps to reduce the cost of deploying a SIEM solution on-premise, in the cloud or even as an MSSP. The solution integrates easily with all devices in your network, giving a holistic and correlated overview of events in your IT infrastructure. LogPoint’s Modern SIEM solution translates all data into one common language, making it possible to compare events across all systems. Having a common language makes it both very easy and efficient to search, analyze and report on data.
  • 27
    Snare

    Snare

    Prophecy International Holdings Ltd.

    Snare Central is a centralized log management solution that collects, processes, and stores log data from various sources across an organization’s network. It provides a secure and scalable platform for aggregating logs from systems, applications, and devices, allowing for efficient monitoring and analysis. With advanced filtering and reporting capabilities, Snare Central enables organizations to detect security threats, ensure compliance, and optimize operational performance. The platform supports integration with third-party tools for enhanced analytics and provides customizable dashboards for real-time insights. Snare Central is designed to meet the needs of security, compliance, and IT teams by providing a unified view of log data and supporting detailed investigations.
  • 28
    CRYPTOLOG

    CRYPTOLOG

    Crypttech

    One of the major needs of businesses is a convenient log management system that collects logs of the IT systems in the organization and analyzes them to meet legal regulations and industry standards. CRYPTOLOG complies with public & sectoral requirements and offers unified and easy-to-use search, analysis, correlation options that can be customized to the needs and size of the IT systems. CRYPTOLOG makes it easy to identify potential security threats from log data to conduct forensic investigations. CRYPTOLOG is a cost-effective integrated log management system that helps you meet regulatory compliance on the one hand, while reducing your security risks in a variety of IT environments. With its fast and powerful engines, CRYPTOLOG brings together a wide range of log and events to give you a comprehensive view of all your network activities on a customizable panel.
  • 29
    Falcon LogScale

    Falcon LogScale

    CrowdStrike

    Rapidly shut down threats with real-time detection and blazing-fast search while reducing logging costs. Detect threats faster by processing incoming data in under a second. Find suspicious activity in a fraction of the time of traditional security logging tools. A powerful, index-free architecture lets you log all your data and retain it for years while avoiding ingestion bottlenecks. Collect more data for investigations, and threat hunting, and scale to over 1 PB of data ingestion per day with negligible performance impact. Falcon LogScale takes your searching, hunting, and troubleshooting capabilities to the next level with its powerful, intuitive query language. Dig deeper to gain additional context with filtering, aggregation, and regex support. Quickly scan all events with a free-text search. Live and historical dashboards let users instantly prioritize threats, monitor trends, and troubleshoot issues. Easily drill down from charts to search results.
  • 30
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.
  • 31
    Humio

    Humio

    Humio

    Log everything, answer anything in real-time. Modern log management with streaming observability and affordable Unlimited Plans. Humio is built to ingest and retain streaming data as quickly as it arrives, regardless of volume. Alerts, scripts, and dashboards are updated in real-time, and live tail and retained data searches have virtually no latency. Humio is index-free, and it works with any structured or unstructured data format. Because you don’t need to define fields upfront, you can ask any question with live or archived data, and experience blazing-fast response. Humio offers affordable licenses and industry-leading Unlimited Plans. Its advanced compression and use of bucket storage saves up to 70% on compute and storage costs. And Humio deploys in minutes and requires little maintenance. Humio ingests unlimited data at any throughput to provide the full data set needed to detect and respond to any incident.
  • 32
    Corner Bowl Server Manager

    Corner Bowl Server Manager

    Corner Bowl Software Corporation

    SIEM, Log Management, Server Monitoring and Uptime Monitoring Software for Less! Industry leading free and responsive phone and remote session support when you need it the most. Get compliant by centrally storing Event Logs, syslogs and application logs from any system or device. Receive real-time notifications when users login, accounts are locked out and accounts are changed. Satisfy auditing requirements such as JSIG and NIST with our out-of-the-box SIEM and security reports. Monitor server resources such as CPU, memory, disk space, directory size and process specific resource consumption. Restart services, kill processes, remote launch custom scripts and fire SNMP Traps. Generate file and directory user access audit reports. Receive SNMP Traps, monitor SNMP Get values and much more. Get real-time notifications when network performance degrades below acceptable performance thresholds. Monitor web, email, database, FTP, DNS and Active Directive servers. Monitor Docker Containers.
  • 33
    Intelligent Discovery
    Intelligent Discovery helps you manage your AWS security with ease. Our industry-leading AWS vulnerability scanning and remediation tool allows you to quickly identify potential threats—without slowing down your infrastructure. Stay ahead of attackers looking for exploitable weaknesses by proactively identifying, resolving, and mitigating security threats through a user-friendly interface. Automate Security Auditing, Security Log Management, Customize Controls and so much more! Consolidated capacity, cost, and volume tools are in an evolving and scaling environment without impacting production or breaking the bank. As an organization grows, so does the management complexity of compliance. Defined organizational rule sets and customization expedite compliance. Consistent and frequent security logs, inventory, and change log monitoring bring inventory management into a consolidated interface.
    Starting Price: $199 per month
  • 34
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 35
    Fortra Event Manager
    Real-time cybersecurity insight and response platform. As threats grow more sophisticated, speed is essential. Risks need to be identified and addressed before damage can occur. Fortra's SIEM software, Event Manager, prioritizes security risks in real time. Automated escalation and streamlined incident response with security event management fast-tracks your response time and resolution. Organizations today collect more security data than ever. Many security events require little to no attention, but serious issues require a rapid response. In that sea of security data, it's easy for important information to be overlooked. Event Manager reduces alert fatigue by identifying and escalating critical security events, enabling security analysts to respond quickly and effectively. In addition to default settings filtering out insignificant information or benign threats, users can fine tune the data they see, and add inclusion/exclusion rules about what exactly should be processed.
  • 36
    Logentries

    Logentries

    Logentries

    The Fastest Way to Analyze Your Log Data. No complex setup. No waiting. Just answers. Whether your data is in structured JSON or mysterious plain text, it’s easy to send to Logentries for immediate search. Our search is now 300x faster than its previous generation. Whether you’re searching keywords, key value pairs or regex patterns, get results faster than ever. Organize logs from servers, applications, routers, containers and more in one central location. Create custom tags for spotting important events. View logs in raw format or in Table View for easy interpretation. Easily analyze logs from servers, network services, platforms, containers and more. Stream live application logs and performance metrics for real-time analysis and debugging. Immutable log storage, centralization and reporting to meet compliance requirements.
  • 37
    OpenText Security Log Analytics
    OpenText™ Security Log Analytics is a scalable and user-friendly security operations platform designed to accelerate threat detection through comprehensive log management and big data analytics. It features a natural language-like querying interface that simplifies complex data searches, enabling security teams to visualize and analyze security events quickly and efficiently. The core columnar database ensures data immutability, enhancing trust and integrity in log management. This solution helps reduce analyst fatigue by streamlining threat hunting processes and automating repetitive remediation tasks. Integrated compliance reporting supports audit readiness for standards like GDPR, PCI, and FIPS 140-2. It also supports data ingestion from over 480 sources, providing a unified and normalized view for enhanced security visibility.
  • 38
    Stackify Retrace
    After one too many unexpected late night code fires, we went searching for a set of application performance management tools to help us put an end to it. What we found told us what was broken, but lacked the ability to tell us why our applications failed, or how to maintain them and prevent the potential dumpster fire. So, we built Retrace to do exactly that. From pre-production to deployment, it is our belief that when our 1300+ customers spend less time fighting technology they spend more time releasing it, and those new applications make the world a better place for all of us.
  • 39
    Checkmk

    Checkmk

    Checkmk

    Checkmk is a comprehensive IT monitoring system that enables system administrators, IT managers, and DevOps teams to identify issues across their entire IT infrastructure (servers, applications, networks, storage, databases, containers) and act quickly to resolve them More than 2,000 commercial customers and many more open source users worldwide use Checkmk daily. Key product features: • Service state monitoring with almost 2,000 checks 'out of the box' • Log and event-based monitoring • Metrics, dynamic graphing, and long-term storage • Comprehensive reporting incl. availability and SLAs • Flexible notifications and automated alert handling • Monitoring of business processes and complex systems • Hardware and software inventory • Graphical, rule-based configuration, and automated service discovery Top use cases: • Server Monitoring • Network Monitoring • Application Monitoring • Database Monitoring • Storage Monitoring • Cloud Monitoring • Container Monitoring
  • 40
    Lumen Security Log Monitoring
    Sophisticated log ingestion, monitoring, and event correlation with a powerful data analysis engine and SOC monitoring for rapid threat insights. It is not enough to collect logs and alerts on possible breaches. Security Log Monitoring tracks incidents in real time, applies advanced analytics, categorizes them, and sends them to experts for review. We then investigate and prioritize leads and events for deeper analysis or immediate action. We help you achieve a deeper understanding of your security posture by applying a more strategic approach to threats and focusing on the most critical issues. The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all your devices, endpoints, systems, and networks. Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, Lumen can accommodate you.
  • 41
    Tencent Cloud Log Service
    CLS offers a wealth of features, including real-time log collection, structured logging, reliable storage, rapid searches, multidimensional analysis and scheduled log shipping. The service also provides an extensive API and console for easy log management. CLS uses a scalable, distributed architecture that is highly elastic, allowing the simultaneous handling of massive quantities of logs. Users can process hundreds of millions of log files every day without the usual problems of resource provisioning. Logs are captured in real time and can be searched and analyzed as soon as they reach CLS. The powerful query engine can search hundreds of millions of files within a second, allowing vast quantity of log data to be analyzed and processed. CLS offers a variety of log aggregation methods, including the LogListener agent, API and SDK, enabling the easy collection and centralized management of logs. Initial deployment can be completed in just five minutes.
  • 42
    Google Cloud Logging
    Real-time log management and analysis at scale. Securely store, search, analyze, and alert on all of your log data and events. Ingest custom log data from any source. An exabyte-scale, fully managed service for your application and infrastructure logs. Analyze log data in real time. Supported across Google Cloud services and integrated with Cloud Monitoring, Error Reporting, and Cloud Trace so you can quickly troubleshoot issues across your infrastructure and applications. With sub-second ingestion latency, terabyte per-second ingestion rate, and exabytes of logs stored each month, you can securely store all of your logs from any source in one place with no management overhead. Combine the power of Cloud Logging with BigQuery for advanced analysis and use log-based metrics to build real-time Cloud Monitoring dashboards.
    Starting Price: $0.50 per GiB
  • 43
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational metrics across applications and infrastructure and gain actionable insights that help you scale with confidence while maintaining high availability. Fuel business decisions and better user experiences by collecting, transforming, and analyzing behavioral data and usage patterns from business systems. Don’t let new attack techniques catch you off guard. Detect and analyze threat patterns from multiple sources and automate threat prevention and remediation.
  • 44
    LOGalyze

    LOGalyze

    Zuriel

    LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network.
  • 45
    Shiftconnector
    Discover the interactive Shift Log. Shiftconnector® tracks and manages all important information that is needed at the time of the shift handover. Information is clearly compiled for supervisors. Reports can be accessed live at any time. Direct communication with the shift teams simplifies management. The data in Shiftconnector® can be analyzed to find optimization potential and sources of error, leading to improved business processes. Shiftconnector® GO connects field workers with board operators via the Shiftconnector platform for routine actions and compliance management. The app is available for iOS, Android and Windows, allowing workers to report activities directly from their mobile devices to a central location no matter where in the plant they are located. It offers a significant advantage to workers as they perform their daily inspection rounds about environment, safety and compliance activities in various locations throughout the plant.
  • 46
    Kloudfuse

    Kloudfuse

    Kloudfuse

    Kloudfuse is an AI‑powered unified observability platform that scales cost‑effectively, combining metrics, logs, traces, events, and digital experience monitoring into a single observability data lake. It integrates with over 700 sources, agent‑based or open source, without re‑instrumentation, and supports open query languages like PromQL, LogQL, TraceQL, GraphQL, and SQL while enabling custom workflows through webhooks and notifications. Organizations can deploy Kloudfuse within their VPC using a simple single‑command install and manage it centrally via a control plane. It automatically ingests and indexes telemetry data with intelligent facets, enabling fast search, context‑aware ML‑based alerts, and SLOs with reduced false positives. Users gain full‑stack visibility, from frontend RUM and session replays to backend profiling, traces, and metrics, allowing navigation from user experience down to code‑level issues.
  • 47
    Atatus

    Atatus

    NamLabs Technologies

    NamLabs Technologies is an Indian software company that publishes a software suite called Atatus. Atatus is a SaaS software & a full stack observability platform. It provides a wide range of monitoring capabilities including Application Performance Monitoring, Real-User Monitoring/ End User Monitoring/ Browser Monitoring, Synthetic Monitoring, Infrastructure Monitoring, Logs Monitoring, and API Analytics. Analyze the performance of your application for performance issues such as slow transactions, database queries, website availability, uptime, latency, response time, and throughput, much more. 24x7 customer support is guaranteed.
  • 48
    ServicePilot

    ServicePilot

    ServicePilot

    ServicePilot has a simple objective, to provide an accurate view of the IT and applications: security, availability and performance. Teams have a difficult problem, maintaining applications in perfect working order in a high-performance and secure way. This is not an easy task in this world of agile development, frequent changes, rapid evolution and ever-increasing complexity of information systems architecture. Since their introduction, a lot has changed in IT: Cloud computing has become the new standard, mobile devices have become more powerful, the Internet of Things is growing more and more, and micro-services and containers are changing the way applications are built. These changes are leading to new needs, and old tools will find it hard to adapt and will be insufficient. A new generation of monitoring tools has become necessary. However, the infrastructure, the network and the storage should not be neglected because applications would not work without them.
  • 49
    Logtail

    Logtail

    Logtail

    Logtail lets you query your logs the same way you query a database. Experience radically better SQL-compatible log management at an unbeatable price. Store your logs in a structured format and search them easily with SQL. Create actionable dashboards with hosted Grafana. Archive log fragments, collaborate with colleagues, and get automatic anomaly detection alerts.
  • 50
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.