Log Management9Log Management Tools (LM) manage potentially quite voluminous quantities of log messages, or computer-generated audit trails and event logs. The software automates log collection, aggregating and centralizing, and analysis, to ease the process of detecting errors or events of interest that happen during data and application processing.Splunk Enterprise1https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGLoggly2https://media.trustradius.com/vendor-logos/to/Kd/DXB2TUQPIR3A-180x180.PNGSumo Logic3https://media.trustradius.com/vendor-logos/iD/Ks/HOFFU00WSJLT-180x180.PNGSplunk Cloud4https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGSolarWinds Papertrail5https://media.trustradius.com/vendor-logos/to/Kd/DXB2TUQPIR3A-180x180.PNGSplunk Light6https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGLogstash7https://media.trustradius.com/vendor-logos/gx/Fj/6M4TOMX4SZVW.pngGraylog8https://media.trustradius.com/vendor-logos/li/bd/971TZIW79F2T-180x180.JPEGLogz.io9https://media.trustradius.com/vendor-logos/ox/0Y/LEG7VIFHNBV0-180x180.JPEGCheck Point Security Management10https://media.trustradius.com/product-logos/el/42/9FDDL8WR11WM.jpegLogger (formerly HPE Arcsight Logger)11https://media.trustradius.com/vendor-logos/Zm/IY/D5DAJSH3LPPI-180x180.GIFAlert Logic Log Correlation and Analysis12https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGLogDNA13https://media.trustradius.com/vendor-logos/ET/8Z/RUKSVJ2BGHCM-180x180.PNGTIBCO LogLogic14https://media.trustradius.com/product-logos/IS/TD/JRENU4UMHLPK.jpgLogentries15https://media.trustradius.com/product-logos/1x/Ak/S4PNSHTXOQJO.PNGEventLog Analyzer16https://media.trustradius.com/product-logos/Z9/3d/6G3TURN53SM5.JPEGEnterprise Fluentd17https://media.trustradius.com/product-logos/aG/Sh/ACAAA5QFVI60.JPEGRSA NetWitness Logs18https://media.trustradius.com/vendor-logos/VR/tQ/QQ1UVO3W5C25-180x180.JPEGCenturyLink Adaptive Network Security Services19https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Security Log Monitoring (SLM)20https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGCenturyLink Analytics and Threat Management21https://media.trustradius.com/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEGSnare22https://media.trustradius.com/product-logos/Gs/nZ/GJ87B1TFSTD5.JPEGSecuronix Security Data Lake23https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGHillstone Security Audit Platform (HSA)24https://media.trustradius.com/vendor-logos/8a/XH/8KXSWQW27BJ6-180x180.JPEGRapid7 InsightOps25https://media.trustradius.com/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEG

Log Management Tools

Log Management Tools Overview

What are Log Management Tools?

Log management tools help to manage the very large volume of log messages, or computer-generated audit trails and event logs generated by servers and other network devices. Managing this data involves defining what needs to be logged, how it should be logged and how long the log data should be kept.

Like the broader category of IT operations analytics, log management is a cousin of business intelligence (BI) but exclusively focused on the IT domain. Like BI software, log management software provides a comprehensive view of transactional data across the organization rather than multiple data silos.

There are two basic varieties of log management system. The first is centralized logging servers that collect and consolidate logs for later consumption, but do not actually analyze data. The second is security information and even monitoring (SIEM) software that provides event logging, but also aggregation, correlation, alerting and reporting services. These are more sophisticated tools more likely to be used by larger enterprises with complex IT topographies.

Log Management Features & Capabilities

  • Data collection and indexing
  • Search capability
  • Event correlation
  • Custom dashboards
  • Alerts and notifications

Log Management Products

Listings (1-25 of 28)

Splunk Enterprise

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
245 Ratings

Splunk is software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in a searchable repository from which it can generate graphs, reports, alerts, dashboards and visualizations.

Loggly

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
27 Ratings

Loggly is a cloud-based log management service provider. It does not require the use of proprietary software agents to collect log data. The service uses open source technologies, including ElasticSearch, Apache Lucene 4 and Apache Kafka.

We don't have enough ratings and reviews to provide an overall score.

LogLogic, now from TIBCO (since the 2012 acquisition), is security information and event management (SIEM) software.

We don't have enough ratings and reviews to provide an overall score.

EventLog Analyzer is a practical solution that is designed to collect and archive huge amounts of Syslogs and SNMP traps. This helps security admins in identifying security incidents, policy violations, and operational issues. Virtually every device in an organization’s network can generate logs ...

We don't have enough ratings and reviews to provide an overall score.

Used by Microsoft, Amazon, Google, and many more, Fluentd was invented by Treasure Data to easily collect, parse, and deliver massive amounts of data from applications, infrastructure, network devices, and log files. Enterprise Fluentd expands on that original vision and brings enterprise-grade s...

We don't have enough ratings and reviews to provide an overall score.

Snare is an IT security analytics suite of applications from Prophecy International headquartered in Adelaide, providing a complete log monitoring and management solution, as well as network threat intelligence.