-
System overview
Monitor the performance of Logmanager instances and system information in one place (e.g., database indexing speed, system load, CPU usage, events disk queue size, DNS response times).
-
User management
Manage user accounts and control permissions centrally with a robust role-based access control (RBAC) system. Expand your team effortlessly with no limitations on the number of users.
-
Unlimited log sources
Logmanager supports any text-based logs from endpoints, servers, networks, cloud workloads, operating systems, and other sources.
-
LDAP authentication
Use LDAP to authenticate users accessing Logmanager.
-
Role-based access control (RBAC)
Manage user permissions by assigning them system or database-based permissions, ensuring secure and streamlined access.
-
System backups
Back up your databases and configurations to ensure business continuity in case of an unexpected event.
-
Data retention
Logmanager is a hardened appliance that ensures the security and immutability of stored logs for investigation, auditing and other purposes.
Experience industry-leading log management platform
Make log collection, monitoring, and analytics easier and faster. Experience radical simplicity with Logmanager.
Frictionless deployment
Add sources in the blink of an eye and create your own parsing rules through a no-code graphical programming interface.
User-centric
Enjoy radical simplicity with intuitive UI, drill downs, easy administration, automated updates and other features.
Compliance readiness
Ensure compliance with regulations and standards, such as GDPR, NIS, NIS2, ISO 27001, and others.
Take the hassle out of log management
Logmanager delivers a unified approach to modern observability and security.
-
Centralized log
managementGain full visibility into your environment from centralized platform for collecting logs and machine data from various sources (services, applications, OS, platforms).
-
Security analytics
Learn moreHarness the power of advanced log analytics to detect malicious patterns, improve troubleshooting, and contain security threats.
-
IT compliance
Learn moreTake control over your data, ensure its protection, and meet auditing and reporting requirements of standards and regulations, such as GDPR, NIS2 and ISO27001.
-
Log analytics
Effortlessly search, filter, and analyze logs to speed up troubleshooting, increase cybersecurity and improve user experience.
-
Microsoft 365 and Office 365 monitoring
Collect, sort and analyze logs from any Microsoft 365 and Office 365 license to stay ahead of performance issues and security threats
-
Windows monitoring
Collect, store, and analyze all types of Windows log data with Logmanager. Drill down to specific problems. Streamline incident resolution across your Windows infrastructure.
-
Security information and event management (SIEM)
Experience a hassle-free SIEM platform that helps you to detect, investigate, and contain security threats.
- 10 Years of proven excellence
- 300+ Satisfied customers
- 25 Experienced team members
Features
-
System overview
Monitor the performance of Logmanager instances and system information in one place (e.g., database indexing speed, system load, CPU usage, events disk queue size, DNS response times).
-
User management
Manage user accounts and control permissions centrally with a robust role-based access control (RBAC) system. Expand your team effortlessly with no limitations on the number of users.
-
Unlimited log sources
Logmanager supports any text-based logs from endpoints, servers, networks, cloud workloads, operating systems, and other sources.
-
LDAP authentication
Use LDAP to authenticate users accessing Logmanager.
-
Role-based access control (RBAC)
Manage user permissions by assigning them system or database-based permissions, ensuring secure and streamlined access.
-
System backups
Back up your databases and configurations to ensure business continuity in case of an unexpected event.
-
Data retention
Logmanager is a hardened appliance that ensures the security and immutability of stored logs for investigation, auditing and other purposes.
-
Centralized log collection
Collect logs from multiple sources and access them from a unified interface.
-
Log tagging and enriching
Use tags to enhance log readability and searchability. Enrich logs with contextual information such as location, security/operations/compliance tags, device type, vendor, etc.
-
Out of the box parsers
Logmanager offers over 140 predefined parsing rules to ingest and normalize data from various sources.
-
Custom parsers
Create and validate custom parsing rules for proprietary data.
-
Log forwarding
Precise filtered log forwarding via syslog. Captured logs and events can be forwarded into third party systems, such as SIEM.
-
Windows monitoring
Manage, configure, and update all Windows agents remotely via Logmanager centralized user interface.
-
Microsoft 365 and Office 365 monitoring
Collect, sort and analyze logs from any Microsoft 365 and Office 365 licenses.
-
Predefined and custom dashboards
Use predefined views or easily create custom dashboards showing data based on input queries and filters.
-
Log analytics
Utilize filters, drill-downs, and contextual data to analyze patterns, trends, and events.
-
Log search, filtering, drill-down
Effortlessly search through log data using an intuitive interface, without the need for complex query language.
-
Reporting templates
Use predefined reports or create custom ones. You can also generate reports based on dashboard templates.
-
Role-based alerting logic (RBAC)
Assign roles to team members and enable them to receive alerts based on their roles, subsidiaries, job functions (e.g., security, operations, management), or a combination of these factors.
-
Event correlations
Correlate events across your IT environment to investigate patterns, anomalies, and malicious activities in context.
-
Blockly code designer
Use the visual programming editor, Blockly, to easily enhance Logmanager with custom rules without the need to write coding scripts.
-
Knowledge base, documentation
-
-
-
Centralized log collection
Collect logs from multiple sources and access them from a unified interface.
-
Log tagging and enriching
Use tags to enhance log readability and searchability. Enrich logs with contextual information such as location, security/operations/compliance tags, device type, vendor, etc.
-
Out of the box parsers
Logmanager offers over 140 predefined parsing rules to ingest and normalize data from various sources.
-
Custom parsers
Create and validate custom parsing rules for proprietary data.
-
Log forwarding
Precise filtered log forwarding via syslog. Captured logs and events can be forwarded into third party systems, such as SIEM.
-
Windows monitoring
Manage, configure, and update all Windows agents remotely via Logmanager centralized user interface.
-
Microsoft 365 and Office 365 monitoring
Collect, sort and analyze logs from any Microsoft 365 and Office 365 licenses.
-
-
-
Predefined and custom dashboards
Use predefined views or easily create custom dashboards showing data based on input queries and filters.
-
Log analytics
Utilize filters, drill-downs, and contextual data to analyze patterns, trends, and events.
-
Log search, filtering, drill-down
Effortlessly search through log data using an intuitive interface, without the need for complex query language.
-
Reporting templates
Use predefined reports or create custom ones. You can also generate reports based on dashboard templates.
-
Role-based alerting logic (RBAC)
Assign roles to team members and enable them to receive alerts based on their roles, subsidiaries, job functions (e.g., security, operations, management), or a combination of these factors.
-
Event correlations
Correlate events across your IT environment to investigate patterns, anomalies, and malicious activities in context.
-
-
-
Blockly code designer
Use the visual programming editor, Blockly, to easily enhance Logmanager with custom rules without the need to write coding scripts.
-
Knowledge base, documentation
-
See why your peers choose Logmanager
Let's get started
-
1
Contact
Contact
Book a demo, or reach out to us through the form or email.
-
2
Meet
Meet
Let’s meet and talk about your needs and pains.
-
3
PoC
PoC
We will run a PoC to make sure Logmanager fits your needs.
-
1
Contact
Book a demo, or reach out to us through the form or email.
-
2
Meet
Let’s meet and talk about your needs and pains.
-
3
PoC
We will run a PoC to make sure Logmanager fits your needs.
- Fast deployment and setup
- Expertise-infused technology
- No-code customization
- Top-rated support
Frequently asked questions (FAQ)
-
The best way is through our interactive demo, where you can explore the product and see all the features in action.
-
Logmanager can be deployed as either a hardware appliance or a virtual appliance, available for VMware and Hyper-V.
-
Yes, we offer a guided 7-day free trial. Visit the Trial Request page to get started.
-
Deployment typically takes tens of minutes. Once your logs are directed into Logmanager, you can immediately start using the pre-built dashboards and visualizations.
-
Logmanager is available in tiered T-Shirt-like sizes – S, M, L, and XL. Tiers differ in performance in EPS (Events Per Second) and database capacity (TB). For more information, see the Pricing page.
-
Logmanager supports all text-based logs, allowing you to ingest data from various sources such as servers, security solutions, databases, and applications. With 140 built-in parsers, the system natively supports commonly used IT technologies. If you have proprietary logs, you can easily create custom parsers using the visual programming editor, Blockly, and integrate Logmanager with nearly any solution that logs in a text format.
-
Logmanager is a hardened appliance that ensures the confidentiality and integrity of data. It prevents any manipulation, deletion, or alteration of logs (SSH is not running on the appliance, so access to the operating system is restricted). Additionally, Logmanager secures data during transfer, uses secure storage mechanisms, and provides role-based access control to enhance strict security measures.