Categories:

#4

Log360 is ranked #4 in the SIEM Tools product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

Log360 Pricing

Based on our most recent analysis, Log360 pricing starts at $99 (Monthly).

Price
$
$
$
$
$
i
Starting From
$99
Pricing Model
Monthly
Free Trial
Yes, Request for Free

Training Resources

Log360 is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for Log360:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

Log360 Benefits and Insights

Why use Log360?

Key differentiators & advantages of Log360

  • Automate Threat Detection & Response: Save time by automatically compiling data from several platforms like SaaS, IaaS, PaaS, exchange servers, applications and on-premise network devices in a centralized console. Accelerate threat resolution by automating incident response using workflow options.
  • Maximize ROI: Reduce upfront costs with low-cost enterprise-grade services. Minimize investment by leveraging service providers for implementation and quick deployment.
  • Ensure Privileged User Monitoring:  Eliminate the risk of privileged users going rogue by continuously monitoring user activities. Prevent insider attacks with regular reports on suspicious behavior.
  • Strengthen Compliance:: Maintain compliance with regulatory mandates like PCI, GLBA, DSS, HIPAA, FISMA, SOX and ISO 27001. Access audit-related report templates and get alerts to avoid violation risks and fines.
  • Prevent Security Event Threats:  Detect and prevent advanced threats like brute force attacks, privilege escalation and misuse, and data breaches with signature-based MITRE ATT&CK technique, ML-based behavior analytics, and integrated CASB and DLP capabilities.
  • Enhanced Threat Detection: Log360 provides robust threat detection capabilities that enable organizations to identify and respond to security threats in real-time. This benefit ensures proactive security measures and minimizes the risk of breaches.
  • Real-Time Monitoring: Users appreciate Log360's ability to offer real-time monitoring of their IT environments. This ensures that any suspicious activities or anomalies are immediately detected, allowing for swift action.
  • Incident Response Automation: Log360 streamlines incident response through automation. This benefit reduces the response time to security incidents, minimizing potential damage and data breaches.
  • Centralized Log Management: Log360 simplifies log management by centralizing log data from various sources. This centralization offers a comprehensive view of an organization's IT environment, facilitating easier analysis and troubleshooting.
  • Comprehensive Compliance Reporting: Users value Log360's capability to generate compliance reports. This feature aids in meeting regulatory requirements and streamlining compliance processes, ensuring data security and integrity.

Industry Expertise

Caters to all types and sizes of industries, including IT, finance, healthcare, transportation and government agencies that deal with digital assets and online activities.

Log360 Reviews

Average customer reviews & user sentiment summary for Log360:

User satisfaction level icon: excellent

62 reviews

94%

of users would recommend this product

Synopsis of User Ratings and Reviews

Based on an aggregate of Log360 reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Effective Threat Detection: Log360 is highly praised for its robust threat detection capabilities, allowing users to proactively identify and respond to potential security threats in real-time.
  • Real-Time Monitoring: Users appreciate Log360's ability to provide real-time monitoring of their IT environments, enabling them to detect and respond to suspicious activities promptly.
  • Incident Response Automation: Log360 streamlines incident response through automation, reducing response times and minimizing the impact of security incidents.
  • Centralized Log Management: The product's centralized log management feature simplifies log data collection from various sources, offering a comprehensive view of the organization's IT environment for analysis and troubleshooting.
  • Comprehensive Compliance Reporting: Log360's ability to generate comprehensive compliance reports is highly valued, as it simplifies compliance processes and helps organizations meet regulatory requirements effectively.

Cons

  • Resource-Intensive: Some users find that Log360 can be resource-intensive, which can pose challenges, especially for smaller organizations with limited hardware and IT resources.
  • Complex for Small Businesses: Small businesses may struggle with the complexity of Log360, as the feature set and learning curve might be beyond their specific needs and budget constraints.
  • Steep Learning Curve: Implementing Log360 can present a significant learning curve, and users may require dedicated training and onboarding efforts to make the most of the product.
  • Integration Challenges: Some users report challenges when trying to integrate Log360 with specific third-party applications and systems, which can disrupt workflows and necessitate additional effort.
  • Pricing Considerations: Pricing may be a limitation for some organizations, particularly those with budget constraints. Users should carefully consider the investment required to implement Log360.

Researcher's Summary:

User reviews of Log360 reveal a generally positive sentiment, highlighting its strengths in centralized log management, real-time threat detection, and ease of use. One user remarked, "Log360 has helped us centralize our logs from all our systems, giving us a complete picture of our security posture. This makes it much easier to identify and investigate potential threats." Another user appreciated the real-time threat detection capabilities, stating, "Log360 has helped us prevent several security incidents by detecting suspicious activity before it could become a major problem." However, some users also mention challenges related to the initial setup and learning curve. One user commented, "Setting up Log360 can be a bit complex for first-time users." Another user noted, "The interface can be a bit overwhelming at first, but there are plenty of resources available to help you get up to speed." Overall, users believe that Log360 offers a powerful and comprehensive SIEM solution at a competitive price. They appreciate its user-friendly interface, extensive features, and cloud-based deployment. One user compared Log360 to other SIEM solutions, saying, "We considered several SIEM solutions, but Log360 offered the best combination of features and price." Another user highlighted Log360's unique cloud-based approach, stating, "We were looking for a SIEM solution that was easy to deploy and maintain, and Log360's cloud-based platform was perfect for us." Based on the user reviews, Log360 is a compelling choice for businesses of all sizes looking for a powerful and user-friendly SIEM solution. Its strengths in centralized log management, real-time threat detection, and ease of use make it a valuable tool for enhancing security posture and mitigating potential risks.

Key Features

  • Incident Detection: Detect suspicious activities and malicious incidents with continuous log data monitoring, analysis and reporting. Get incident alerts with a real-time alert feature.
  • Security Analytics:  Spot network threats, intrusions and breaches by analyzing events from servers, network devices, Microsoft Office 365 platforms and exchange servers. Respond to anomalies with interactive dashboards and customized analytics reports.
  • Threat Intelligence: Stay on top of evolving threats with an integrated threat intelligence platform. Get updated information on the latest threats with a TAXII/STIX threat feed processor that retrieves global threat data and maintains a database of malicious IPs.
  • Incident Resolution: Automatically assign teams to security alerts and track the incident resolution progress. Automated workflows ensure the timely implementation of preventive measures against threats.
  • Cloud Monitoring: Continuously monitor and identify threats on cloud-based PaaS and IaaS platforms like Amazon web services, Microsoft Azure and SaaS solutions like Salesforce.
  • Data Security: Discover and prioritize personal and sensitive information throughout your Windows infrastructure with confidential data detection policies. Protect data from breach attempts with file integrity monitoring capabilities.
  • Forensic Analysis: Assess post-attack impact and identify attacking patterns to avoid future threats by analyzing event and log data. Automatically perform forensic analysis and mitigate the possibility of human error or oversight in drilling down data.
  • Event Correlation: Correlate information from various sources like endpoints, servers and intrusion prevention systems into a single console to get a comprehensive idea of the company’s security situation. Customize correlation rules and regulations with a custom rule builder and quickly detect and resolve security incidents.
  • User Entity and Behavior Analytics (UEBA): Identify anomalous activities in the network using analysis reports on even slight changes in user and entity behavioral patterns.

Approach to Common Challenges

  • Log Overload: Log360 leverages advanced filtering and correlation capabilities to identify and analyze relevant logs from massive data volumes, reducing noise and focusing on actionable events.
  • Limited Visibility: Log360 provides comprehensive log data collection and aggregation across various systems and platforms, offering a centralized view of security activity for enhanced situational awareness.
  • Threat Detection Gaps: Log360 utilizes machine learning and pre-built rules to detect known and unknown threats, identifying suspicious activities and potential breaches in real-time.
  • Incident Response Delays: Log360 facilitates rapid incident response with automated alerts, detailed forensic analysis, and seamless integration with security tools for faster investigation and remediation.
  • Compliance Requirements: Log360 supports various compliance regulations by providing audit trails, tamper-proof logs, and detailed reports, ensuring adherence to industry standards and legal mandates.
  • Resource Constraints: Log360 offers a scalable and cloud-based solution, eliminating the need for expensive on-premise infrastructure and minimizing IT resource allocation.

Cost Of Ownership

Frequently asked questions regarding Log360 pricing include:

  • Q: What is the price range for Log360?
    A: Log360 offers a subscription-based pricing model with different tiers based on log volume and features required. The price range typically falls between $99/100GB of log storage per month and a custom quote for larger deployments. This flexible pricing allows businesses to scale their investment based on their specific needs.
  • Q: Are there any additional costs associated with Log360?
    A: Beyond the subscription fee, potential additional costs include implementation and training services, which vary depending on the complexity of the deployment and the level of support required. Additionally, certain advanced features like log archiving and compliance reporting may incur additional charges.
  • Q: How does Log360 compare to other SIEM solutions in terms of cost?
    A: Log360 is generally considered competitively priced compared to other SIEM solutions, especially for small and medium-sized businesses. Its flexible pricing and cloud-based model eliminate upfront infrastructure costs and offer a lower entry point than many on-premise solutions. However, the exact cost comparison depends on the specific features and log volume required.

Demo Resources

Resources that provide Log360 demo insights include:

  • Product Website: Explore interactive dashboards and features through guided product tours, gaining a firsthand experience with the platform's functionalities.
  • On-Demand Webinars: Access recorded sessions hosted by Log360 experts, focusing on specific use cases and demonstrating real-time scenarios.
  • Interactive Case Studies: Discover how companies across various industries utilize Log360 to enhance their security posture, showcasing the product's effectiveness in real-world deployments.
  • Product Documentation and Datasheets: Dive deeper into technical specifications and detailed feature descriptions, gaining comprehensive understanding of the solution's capabilities.
  • Free Trial: Experience Log360 firsthand with a 14-day free trial, allowing you to test drive the platform and evaluate its suitability for your specific needs.

Limitations

Notable product limitations include:

  • Resource-Intensive: Log360 can be resource-intensive, especially for smaller organizations with limited hardware and IT resources.
  • Complex for Small Businesses: Small businesses may find Log360's feature set and complexity beyond their specific needs and budget constraints.
  • Steep Learning Curve: Users have reported a significant learning curve when initially implementing Log360, which may require dedicated training and onboarding efforts.
  • Integration Challenges: Some users have faced integration challenges when trying to connect Log360 with specific third-party applications and systems, which can disrupt workflows.
  • Pricing Considerations: Pricing may pose a limitation for some organizations, particularly those on a tight budget. Users may need to carefully consider the investment required.

Suite Support

mail_outlineEmail: [email protected]. A live chat option is also available.
phonePhone: (844) 649 7766.
schoolTraining: Interactive virtual workshops and personalized web demos.
local_offerTickets: Request technical support by filling out a form in the support section.

FAQ

Frequently asked questions regarding Log360 include:

  • Q: How does Log360 integrate with existing security tools?
    A: Log360 offers extensive integration capabilities through pre-built connectors and APIs, allowing seamless integration with SIEM, EDR, and other security tools. This facilitates centralized log management, consolidated security posture, and streamlined incident response.
  • Q: What level of customization does Log360 offer?
    A: Log360 provides a high degree of customization through customizable dashboards, reporting templates, and user-defined alerts. This allows businesses to tailor the solution to their specific needs and security priorities, enhancing visibility and focusing on the most relevant information.
  • Q: How does Log360 ensure data security and compliance?
    A: Log360 employs robust security measures, including data encryption, user authentication, and access controls, to protect sensitive information. Additionally, Log360 adheres to various industry regulations and compliance standards, ensuring data security and regulatory compliance.
  • Q: What level of support does Log360 provide for its users?
    A: Log360 offers comprehensive customer support services, including online documentation, knowledge base, technical support phone lines, and dedicated account managers. Additionally, Log360 provides various training programs and workshops to help users maximize their use of the software.
  • Q: How does Log360 stand out from other SIEM solutions?
    A: Log360 differentiates itself through its user-friendly interface, comprehensive features, scalability, and competitive pricing. Its cloud-based deployment eliminates infrastructure costs and simplifies maintenance, making it accessible to businesses of all sizes. Additionally, Log360's focus on user experience and ongoing innovation ensures it remains a competitive force in the SIEM market.

Customers

  • Cisco Software Tools
  • IBM Software Tools
  • Symantec Software Tools
  • Northrop Grumman Software Tools
Compare products
Comparison Report
Just drag this link to the bookmark bar.
?
Table settings

Compare SIEM Tools

These are the top products most often compared.

Testimonials

Log360 has made my job a cinch. The real-time reports and alerts make sure I don't have to spend a lot of time worrying about threats

Log360 is a complete solution for all of the needs in events auditing! Subcomponents like EventLog Analyzer and ADAuditPlus are really helpful during reviews and audits.

Your review has been submitted
and should be visible within 24 hours.
Your review

Rate the product