Activity MonitoringBased on 46 Graylog reviews and verified by the G2 Product R&D team. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | 86% (Based on 46 reviews) |
Asset ManagementBased on 40 Graylog reviews and verified by the G2 Product R&D team. Keeps records of each network asset and its activity. Discovers new assets accessing the network. | 74% (Based on 40 reviews) |
Log ManagementBased on 54 Graylog reviews and verified by the G2 Product R&D team. Provides security information and stores the data in a secure repository for reference. | 91% (Based on 54 reviews) |
Event ManagementBased on 48 Graylog reviews and verified by the G2 Product R&D team. Alerts users of incidents and allows users to intervene manually or triggers an automated response. | 84% (Based on 48 reviews) |
Automated ResponseBased on 42 Graylog reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | n/a |
Incident ReportingBased on 44 Graylog reviews and verified by the G2 Product R&D team. Documents cases of abnormal activity and compromised systems. | 79% (Based on 44 reviews) |
Threat IntelligenceBased on 44 Graylog reviews and verified by the G2 Product R&D team. Stores information related to common threats and how to resolve them once incidents occur. | 75% (Based on 44 reviews) |
Vulnerability AssessmentBased on 40 Graylog reviews and verified by the G2 Product R&D team. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | 75% (Based on 40 reviews) |
Advanced AnalyticsBased on 44 Graylog reviews and verified by the G2 Product R&D team. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources. | 76% (Based on 44 reviews) |
Data ExaminationBased on 47 Graylog reviews and verified by the G2 Product R&D team. Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents. | 83% (Based on 47 reviews) |
Data SourcesAutomatically collect logs from all your services, applications, and platforms | Not enough data available |
IndexingAutomate the indexing of machine data that's critical to your operations | Not enough data available |
Automated TaggingSee log data in context with automated tagging and correlation | Not enough data available |
Data BlendingMix and match data from apps, hosts, containers, services, networks, and more | Not enough data available |
Track TrendsAllows user to track log trends. | Not enough data available |
Detect AnomaliesIdentify and predict anomalies in real-time with outlier detection and uncover root-causes | Not enough data available |
Metric and Event DataAnalyze both metric and event data on the same platform regardless of source or structure | Not enough data available |
SearchSearch your logs for troubleshooting and open-ended exploration of your data | Not enough data available |
AlertsCreate alerts based on search patterns, thresholds for specific log metrics, or other conditions | Not enough data available |
Live TailSee your data, in real time, streaming into the system from multiple data sources | Not enough data available |
DashboardsVisualize log data on dashboards | Not enough data available |
Data DiscoveryDrill down and explore data to discover new insights | Not enough data available |
Performance Baselines | Not enough data available |
Performance Analysis | Not enough data available |
Performance Monitoring | Not enough data available |
AI/ML Assistance | Not enough data available |
Multi-System Monitoring | Not enough data available |
Dashboards and Visualization | Not enough data available |
Incident Alerting | Not enough data available |
Root Cause Analysis (RCA) | Not enough data available |