Manage your logs from on-premises or a cloud solution
The comparison matrix provided below shows and compares the features offered between the on-premises and cloud solution.
Features | on premise | CLOUD |
---|---|---|
Log collection | ||
Agent-less | For cloud log sources | |
Agent-based | ||
Auto-discovery of devices | ||
Log filter | ||
Supported log sources | See here | See here |
Security Analytics | ||
Customizable dashboard | ||
Canned and custom reports | ||
Scheduled reports | ||
Near real-time alerting | ||
Alert notification | Email and SMS | |
Application log monitoring | ||
File Integrity Monitoring | ||
MITRE ATT&CK framework support | ||
Log search | ||
Advanced search | ||
Formatted logs | ||
Raw logs | ||
Save search results | ||
Rule-based attack detection | ||
Event correlation | ||
Predefined rules to detect brute-force, ransomware attacks and more. | ||
Threat intelligence | ||
Real-time alerts for global blacklisted IPs intruding the network. | ||
Advanced threat analytics (add-on) | ||
Incident Management | ||
Dashboard | ||
Associate workflow profiles to incidents | ||
Support to raise a ticket for the incident in ITSM tools | ||
Manage incidents within the product console | ||
Compliance management | ||
Out-of-the-box compliance reports | ||
Predefined compliance alerts | ||
Creating new compliance reports | ||
Cloud Protection and Cloud App Monitoring |