tacLOM
Complete Log Management
tacLOM
Complete Log Management
tacLOM uses synergies from log management, log compression and storage as well as monitoring. This combination provides an efficient solution to manage and monitor your logs.
One tool for all involved
On clearly laid out visualizations and individual dashboards, operating teams, CISOs or management can quickly inform themselves about the condition of the IT infrastructure. In the process, each person only sees what he or she is allowed to see.
Central event console
The event console shows log and monitoring events and provides a quick overview.
- Errors can be quickly identified and analyzed
- Intelligent drilldowns provide the necessary detailed information immediately
- Send alerts via email, text message or other channels
Log Management through centralized log data collection
tacLOM collects all system logs and error messages (syslog, SNMP Trap, Mail to Log etc.). It stores them for a defined period of time and makes the data available for interactive search and trend analysis. Relevant messages can be correlated and alarmed.
- Log data collected and stored by multiple instances can be correlated and analyzed together in the central GUI.
- Specific events, event sequences or the absence of expected events are warned about in alerts.
- Thanks to the supplied event packs for various products, you will benefit from many existing event definitions.
- The integration of threat feeds increases the detection rate of security incidents strikingly.
System Monitoring
tacLOM actively monitors your infrastructure through easy-to-configure scanner types (ping, URL, SNMP, etc.).
SLA analyses check whether defined availabilities are reached.
Through tagging, it is possible to group monitored systems individually, and the view can be defined or alternatively limited per user.
SLA analyses check whether defined availabilities are reached.
Through tagging, it is possible to group monitored systems individually, and the view can be defined or alternatively limited per user.
Individual analysis
Personal views, reports and dashboards make it possible for each user to configure their own solution that meets their needs for monitoring.
Modulare architecture
Thanks to the modular design, the solution scales for any company size. Additional probes cover different needs.
- Several systems can be integrated.
- Log data remains at its location.
- There are fewer firewall rules and a lower network load due to local monitoring of the target systems.
Factsheet