GFI EventsManager 2013

License: Free Trial ‎File size: 60.19 MB
‎Users Rating: 3.8/5 - ‎9 ‎votes

ABOUT GFI EventsManager

GFI EventsManager is an award-winning log data analysis and IT monitoring solution, used by thousands of customers. It supports collecting, analyzing, normalizing and consolidating billions of log entries that are generated by servers, network devices, workstations, applications and services in various logging formats such as evt(x), Syslog, SNMP traps, W3C, textbased logs and SQL Server/Oracle audits. At the same time, it actively monitors the availability, functionality, usage and performance of network protocols, servers, workstations, network devices, services and applications using a real-time check-based monitoring engine. Extended log data analysis capabilities help protect against threats by detecting suspicious activity, monitoring security policies, security relevant mechanisms (such as encryption, authentication and authorization), and applications (such as antivirus or firewall) as well as privileged user activity. Log data comes in high volumes and is cryptic by nature but, at the same time, it contains loads of useful information about what is going on in the IT environment. GFI EventsManager interprets and translates log data, delivering operational intelligence and bringing visibility and insight into business operations. Providing support for devices from the top 20 manufacturers in the world as well as custom devices, GFI EventsManager allows administrators to monitor an extended range of hardware and software products, report on the health and operational status of each one and collect data for analysis. It depicts employee activity on the network such as changes made to their PCs, files accessed during the day and other related activities. GFI EventsManager also tracks and reports SQL and Oracle server activity such as alteration of DB tables and attempts to access data without necessary privileges. GFI EventsManager uses advanced event processing and filtering technologies to identify key log entries out-of-the-box.