
Find out what your peers are saying about Splunk, Wazuh, Cribl and others in Log Management.
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 10 |
| Large Enterprise | 16 |
ArcSight Logger effectively manages vast log data volumes, streamlining complex query execution and data compression while supporting various devices to meet compliance needs.
ArcSight Logger, known for scalability, simplifies handling extensive log data and executes complex queries swiftly. Its data compression features, coupled with versatile device support, allow for smooth security analytics and log collection. Users appreciate its real-time network insights and intuitive interface. However, improvements are needed in indexing speed, user navigation simplification, enhanced system integration, advanced analytics, and comprehensive threat management. Companies leverage ArcSight Logger for on-premises log management, vital for IT asset event monitoring and compliance within telecom and enterprise sectors.
What are the key features?In industries like telecom and enterprise, ArcSight Logger facilitates on-premises deployments to manage logs, process queries, and integrate with security tools, essential for incident response. It aids in retaining logs, monitoring Windows events, overseeing communications, and is employed in fraud prevention and security monitoring involving syslog servers.
Further simplify security and compliance
A central view of potential threats with built-in workflows removes the complexity of threat protection. Be ready anytime for the audit with automated compliance.
Gain better visibility and valuable intelligence
Get greater transparency monitoring users, applications, networks and devices. Data correlated and enriched to deliver purposeful intelligence on the threat and how to mitigate.
Protect Against Advanced and Unknown Threats
Real-time threat identification and response powered by advanced threat intelligence reduces lead time to protect against threats such as phishing, insider threats, data exfiltration and Distributed Denial of Service (DDOS) attacks.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.