A suite of Log Management allows you to notice any unusual behavior that may prove to be signs of danger.
With a remote copy of the Log files it is possible to analyze any problems encountered on a given system, even if the system is not available.
A Log Management Suite allows you to never lose any Log, even after hardware failures or software failures and to trace the critical issues that generated the event.
Business LOG is able to collect logs from machines with MacOS Operating System.
Business LOG is able to collect logs from machines with Linux Operating System or with Unix Operating System.
Business LOG is able to collect logs from machines with Windows Operating System.
Business LOG is able to collect logs from all Syslog devices (Nas, network devices, switches, etc.).
In Business LOG it is possible to set one or more alarms that are activated when operations are carried out on files present throughout the network. The operations on the files that trigger the alarm can be chosen between writing, reading, deletion or any of these operations.
In Business LOG you can set alarms that are activated when a predetermined event occurs on a File Folder (opening, deleting, writing, etc.).
With Business LOG it is possible to set alarms that are activated when a specific event occurs in a specific software (installation, uninstallation, update, etc.).
In Business LOG it is possible to intuitively set one or more alarms that can be activated upon the occurrence of a specific event, on one or more (or all) machines, on one or more (or all) users, in a given time interval.
Example : Unattended RDP logins outside normal business hours and more.
Business LOG automatically realizes the inventory of all the machines in the network.
Business LOG allows you to automatically inventory the software in the network, historicize it, export it and filter it for a careful analysis of business equipment on each PC.
Business LOG allows you to automatically create the inventory of hardware components present in all devices on the network.
Business LOG allows you to export log tables with the .xlsx to import them into Microsoft Excel.
Business LOG allows you to export log tables with the .pdf extension.
Business LOG allows you to export log tables with the .txt extension.
Business LOG includes a native viewer that can display exported data in all available formats.
The Business Log Cloud Edition allows you to view logs through the Business LOG Client or in the centralized portal. The configurable nodes in the system do not have numerical limits, but require the installation of agents.
Syslog Records Login / Logout and relevant accesses from Linux, Unix, Mac machines or from Syslog compatible devices, such as Router, Firewall, Nas, etc. ...
The Business Log Server Edition allows acquisition at the server level without the use of external agents or services on the machines to be monitored. The configurable nodes in the system do not require the installation of any agent.
Acquisition from AS400 machines
Acquisition from DB Filemaker
Acquisition from Deep Audit of SQL Server
Storage on the Cloud
To hybrid the Server Edition with the Cloud Version
Business Log Plus
Installation on a 64bit server. Registers up to 80 machines/devices.
Business Log Enterprise 250
Installation on a 64bit server. Registers up to 250 machines/devices.
Business Log Enterprise 500
Installation on a 64bit server. Registers up to 500 machines/devices.
Business Log Enterprise 2000
Installation on a 64bit server. It records up to 2000 machines/devices.
Business Log Enterprise X
Install on a 64bit server Register infinite machines/devices. It includes all plugins.
Every day, the network generates records of events that can be used to reduce the exposure of the organization to intrusions, malware, damage, losses and legal liability. The system ensures that the records (access log) have the characteristics of completeness, inalterability and ability to verify their integrity.
With Business LOG you always have all the logs under control!
Find out on this page the main information of the software or request a free quote by filling out the form on the side.
Get now a free quote of Business LOG.
Business LOG Server Edition does not need agents installed on the machines to be monitored.
The software automatically queries all the Devices in the domain/working group and collects all the information. The collection takes place through a request between operating systems and no need for agents, limitations to firewalls or antivirus interruptions.
In Business LOG a node is a single machine that is monitored. No distinction is made in the counting of the machines to be monitored between client, server and device.
The service collects logs in real time.
The registration agent is a service that does not provide a user interface, automatically started and able to collect in real time the logs of the machine.
The agent collects in real time the information about the machine and uploads to the data center.
The logs collected can be consulted through a viewer or via an HTTPS access (cloud.businesslog.it).