Manage your logs from on-premises or a cloud solution
The comparison matrix provided below shows and compares the features offered between the on-premises and cloud solution.
| Features | on premise | CLOUD |
|---|---|---|
| Log collection | ||
| Agent-less | For cloud log sources | |
| Agent-based | ||
| Auto-discovery of devices | ||
| Log filter | ||
| Supported log sources | See here | See here |
| Security Analytics | ||
| Customizable dashboard | ||
| Canned and custom reports | ||
| Scheduled reports | ||
| Near real-time alerting | ||
| Alert notification | Email and SMS | |
| Application log monitoring | ||
| File Integrity Monitoring | ||
| MITRE ATT&CK framework support | ||
| Log search | ||
| Advanced search | ||
| Formatted logs | ||
| Raw logs | ||
| Save search results | ||
| Rule-based attack detection | ||
| Event correlation | ||
| Predefined rules to detect brute-force, ransomware attacks and more. | ||
| Threat intelligence | ||
| Real-time alerts for global blacklisted IPs intruding the network. | ||
| Advanced threat analytics (add-on) | ||
| Incident Management | ||
| Dashboard | ||
| Associate workflow profiles to incidents | ||
| Support to raise a ticket for the incident in ITSM tools | ||
| Manage incidents within the product console | ||
| Compliance management | ||
| Out-of-the-box compliance reports | ||
| Predefined compliance alerts | ||
| Creating new compliance reports | ||
| Cloud Protection and Cloud App Monitoring | ||










