Monitoring security activity, Mechanisms and applications.
Manage event log data for system reliability, security, availability and compliance.
Available only through GFI Unlimited*
Try now, for FREE
*This product is at end of engineering1 and is only available through GFI Unlimited.
Log data analysis for SIEM
Good security strategies include real-time event log monitoring for critical security incidents and periodic analysis of security-relevant logs. This enables you to detect suspicious activity and respond quickly. Monitor security-relevant policies, mechanisms (e.g., authentication, authorization, etc.), activity (e.g., privileged user activity) and applications (e.g., IDS, IPS, firewall, etc.) in real time.
Complete IT infrastructure monitoring and management
Unplanned system downtime ranges from a minor nuisance to a major catastrophe. Monitor the availability, functionality, performance and use of your IT assets – everything from network devices, workstations and servers to applications, business, infrastructure services and network protocols.
Log data consolidation for compliance
Most data security standards and regulations require that all relevant log data is managed, collected, consolidated and safely stored so that companies can prove accountability for the actions occurring in their workplace. GFI EventsManager provides three-layer log data consolidation accessible through two-factor authentication, forensic investigations capabilities and compliance reporting.
1: End of Engineering: No new releases, minor releases, defect logging or defect fixes for affected products. Customers can continue to use EoE products unencumbered and add/subtract user licenses as necessary. Customer Support will continue to respond to issues and use reasonable efforts to assist customers, but no new, tested corrections will be generated. Latest versions of software and fixes remain available for download.