Log Management9Log Management Tools (LM) manage potentially quite voluminous quantities of log messages, or computer-generated audit trails and event logs. The software automates log collection, aggregating and centralizing, and analysis, to ease the process of detecting errors or events of interest that happen during data and application processing.Splunk Enterprise1https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGSumo Logic2https://media.trustradius.com/vendor-logos/iD/Ks/HOFFU00WSJLT-180x180.PNGSolarWinds Papertrail3https://media.trustradius.com/vendor-logos/to/Kd/DXB2TUQPIR3A-180x180.PNGSplunk Light4https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGSplunk Cloud5https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGLogstash6https://media.trustradius.com/vendor-logos/gx/Fj/6M4TOMX4SZVW.pngGraylog7https://media.trustradius.com/vendor-logos/li/bd/971TZIW79F2T-180x180.JPEGLogz.io8https://media.trustradius.com/vendor-logos/ox/0Y/LEG7VIFHNBV0-180x180.JPEGCheck Point Security Management9https://media.trustradius.com/product-logos/el/42/9FDDL8WR11WM.jpegLogger (formerly HPE Arcsight Logger)10https://media.trustradius.com/vendor-logos/Zm/IY/D5DAJSH3LPPI-180x180.GIFAlert Logic Log Correlation and Analysis11https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGLogDNA12https://media.trustradius.com/vendor-logos/ET/8Z/RUKSVJ2BGHCM-180x180.PNGTIBCO LogLogic13https://media.trustradius.com/product-logos/IS/TD/JRENU4UMHLPK.jpgLogentries14https://media.trustradius.com/product-logos/1x/Ak/S4PNSHTXOQJO.PNGEventLog Analyzer15https://media.trustradius.com/product-logos/Z9/3d/6G3TURN53SM5.JPEGEnterprise Fluentd16https://media.trustradius.com/product-logos/aG/Sh/ACAAA5QFVI60.JPEGRSA NetWitness Logs17https://media.trustradius.com/vendor-logos/VR/tQ/QQ1UVO3W5C25-180x180.JPEGCenturyLink Adaptive Network Security Services18https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Security Log Monitoring (SLM)19https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Analytics and Threat Management20https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGSnare21https://media.trustradius.com/product-logos/Gs/nZ/GJ87B1TFSTD5.JPEGSecuronix Security Data Lake22https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGHillstone Security Audit Platform (HSA)23https://media.trustradius.com/vendor-logos/8a/XH/8KXSWQW27BJ6-180x180.JPEGRapid7 InsightOps24https://media.trustradius.com/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGXpoLog25https://media.trustradius.com/product-logos/UX/gU/0MVQSEDL85ET.jpg

Log Management Tools

Log Management Tools Overview

What are Log Management Tools?

Log management tools help to manage the very large volume of log messages, or computer-generated audit trails and event logs generated by servers and other network devices. Managing this data involves defining what needs to be logged, how it should be logged and how long the log data should be kept.

Like the broader category of IT operations analytics, log management is a cousin of business intelligence (BI) but exclusively focused on the IT domain. Like BI software, log management software provides a comprehensive view of transactional data across the organization rather than multiple data silos.

There are two basic varieties of log management system. The first is centralized logging servers that collect and consolidate logs for later consumption, but do not actually analyze data. The second is security information and even monitoring (SIEM) software that provides event logging, but also aggregation, correlation, alerting and reporting services. These are more sophisticated tools more likely to be used by larger enterprises with complex IT topographies.

Log Management Features & Capabilities

  • Data collection and indexing
  • Search capability
  • Event correlation
  • Custom dashboards
  • Alerts and notifications

Log Management Products

Listings (1-25 of 26)

Splunk Enterprise

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Top Rated
228 Ratings

Splunk is software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.

We don't have enough ratings and reviews to provide an overall score.

LogLogic, now from TIBCO (since the 2012 acquisition), is security information and event management (SIEM) software.

We don't have enough ratings and reviews to provide an overall score.

EventLog Analyzer is a practical solution that is designed to collect and archive huge amounts of Syslogs and SNMP traps. This helps security admins in identifying security incidents, policy violations, and operational issues. Virtually every device in an organization’s network can generate logs ...

We don't have enough ratings and reviews to provide an overall score.

Used by Microsoft, Amazon, Google, and many more, Fluentd was invented by Treasure Data to easily collect, parse, and deliver massive amounts of data from applications, infrastructure, network devices, and log files. Enterprise Fluentd expands on that original vision and brings enterprise-grade s...

We don't have enough ratings and reviews to provide an overall score.

Snare is an IT security analytics suite of applications from Prophecy International headquartered in Adelaide, providing a complete log monitoring and management solution, as well as network threat intelligence.

We don't have enough ratings and reviews to provide an overall score.

XpoLog is a log management and machine data analysis solution. This solution is designed to provide support in ITOA, Cyber Security, Compliance & Regulations, Cloud, IOT, and more. The vendor offers premium support to all of their customers.