Business LOG

Discover the main functions and versions of Business LOG, Log Management Suite for IT Security and Corporate Compliance.

Everything under control

With Business LOG, everything is under control.

FULL MONITORING OF HOST AND SERVICE STATUS

A suite of Log Management allows you to notice any unusual behavior that may prove to be signs of danger.

ANALYSIS OF PROBLEMS IN THE SYSTEM

With a remote copy of the Log files it is possible to analyze any problems encountered on a given system, even if the system is not available.

PREVENT DATA LOSS IN YOUR BUSINESS

A Log Management Suite allows you to never lose any Log, even after hardware failures or software failures and to trace the critical issues that generated the event.

The main features of Business LOG

Using all your data source

MAC OS

Business LOG is able to collect logs from machines with MacOS Operating System.

LINUX AND UNIX

Business LOG is able to collect logs from machines with Linux Operating System or with Unix Operating System.

MICROSOFT WINDOWS

Business LOG is able to collect logs from machines with Windows Operating System.

SYSLOG MACHINES

Business LOG is able to collect logs from all Syslog devices (Nas, network devices, switches, etc.).

Custom alarms

Logo

FILE

In Business LOG it is possible to set one or more alarms that are activated when operations are carried out on files present throughout the network. The operations on the files that trigger the alarm can be chosen between writing, reading, deletion or any of these operations.

FOLDERS

In Business LOG you can set alarms that are activated when a predetermined event occurs on a File Folder (opening, deleting, writing, etc.).

SOFTWARE

With Business LOG it is possible to set alarms that are activated when a specific event occurs in a specific software (installation, uninstallation, update, etc.).

CUSTOM EVENTS

In Business LOG it is possible to intuitively set one or more alarms that can be activated upon the occurrence of a specific event, on one or more (or all) machines, on one or more (or all) users, in a given time interval.
Example: Unattended RDP logins outside normal business hours and more.

Automatic Inventory

MACHINERY LIST

Business LOG automatically realizes the inventory of all the machines in the network.

SOFTWARE INVENTORY

Business LOG allows you to automatically inventory the software in the network, historicize it, export it and filter it for a careful analysis of business equipment on each PC.

HARDWARE INVENTORY

Business LOG allows you to automatically create the inventory of hardware components present in all devices on the network.

Formats available for export

EXCEL

Business LOG allows you to export log tables with the .xlsx to import them into Microsoft Excel.

PDF

Business LOG allows you to export log tables with the .pdf extension.

TEXT

Business LOG allows you to export log tables with the .txt extension.

NATIVE VIEWER

Business LOG includes a native viewer that can display exported data in all available formats.

REQUEST FREE QUOTE

Get now a free quote of Business LOG.

Available versions of Business LOG

Business LOG Cloud Edition

The Business Log Cloud Edition allows you to view logs through the Business LOG Client or in the centralized portal. The configurable nodes in the system do not have numerical limits, but require the installation of agents.

Overview of the key functions

  • Record Login/Logout and relevant Logins from Windows machines.
  • Builds automatic inventory of software and hardware.
  • Transfer data to a Datacenter Cloud (in the European territory) in total security through an encrypted

PLUG-IN:

Syslog Records Login / Logout and relevant accesses from Linux, Unix, Mac machines or from Syslog compatible devices, such as Router, Firewall, Nas, etc. ...

Business Log Server Edition

The Business Log Server Edition allows acquisition at the server level without the use of external agents or services on the machines to be monitored. The configurable nodes in the system do not require the installation of any agent.

Overview of the key functions

  • Built-in syslog for recording from Linux, Unix and Mac machines or Syslog-compatible devices such as Router, Firewall, Nas, etc.
  • Records from remote support applications (Teamviewer, Supremo, Anydesk, Nomachine and many others).
  • Records of access events on files.
  • Digital signature on each log, with consistency check.
  • Secondary storage on encrypted XML files.
  • Customizable alarms on Log, File or Software events.
  • Builds automatic inventory of software and hardware.

PLUG-IN:

Acquisition from AS400 machines

Acquisition from DB Filemaker

Acquisition from Deep Audit of SQL Server

Storage on the Cloud

To hybrid the Server Edition with the Cloud Version

Available Business LOG Server Edition configurations:

Business Log Plus
Installation on a 64bit server. Registers up to 80 machines/devices.

Business Log Enterprise 250
Installation on a 64bit server. Registers up to 250 machines/devices.

Business Log Enterprise 500
Installation on a 64bit server. Registers up to 500 machines/devices.

Business Log Enterprise 2000
Installation on a 64bit server. It records up to 2000 machines/devices.

Business Log Enterprise X
Install on a 64bit server Register infinite machines/devices. It includes all plugins.

SUITE OF LOG MANAGEMENT

BUSINESS LOG IS THE PERFECT SOFTWARE TO BE COMPLIANT WITH THE REGULATIONS REGARDING EUROPEAN PRIVACY - GDPR 2016/679 AND PSEUDONYMIZATION

Every day, the network generates records of events that can be used to reduce the exposure of the organization to intrusions, malware, damage, losses and legal liability. The system ensures that the records (access log) have the characteristics of completeness, inalterability and ability to verify their integrity.

With Business LOG you always have all the logs under control!

Find out on this page the main information of the software or request a free quote by filling out the form on the side.

REQUEST FREE QUOTE OF BUSINESS LOG

Get now a free quote of Business LOG.

Screenshots

Scroll to see the software in action.

REQUEST FREE QUOTE

Get now a free quote of Business LOG.

Minimum system requirements

Business LOG CLOUD

  • Windows 7 or more (32 or 64 bit)
  • 4 GB RAM
  • 10 GB empty space on hard disk
  • Internet connection with TCP port 1433 authorized on exit

Business LOG PLUS

  • Windows 7 or more (64 bit)
  • 8 GB RAM (12 if is in VM)
  • 25 GB empty space on hard disk
  • Internet connection (for setup and updates)

Business LOG ENTERPRISE

  • Windows Server 2012 or more 864 bit)
  • 12 GB RAM (16 if is in VM)
  • 50 GB empty space on hard disk
  • Internet connection (for setup and updates)

BUSINESS LOG SERVER EDITION

Business LOG Server Edition does not need agents installed on the machines to be monitored.
The software automatically queries all the Devices in the domain/working group and collects all the information. The collection takes place through a request between operating systems and no need for agents, limitations to firewalls or antivirus interruptions.

BUSINESS LOG CLOUD EDITION

In Business LOG a node is a single machine that is monitored. No distinction is made in the counting of the machines to be monitored between client, server and device.

The service collects logs in real time.

The registration agent is a service that does not provide a user interface, automatically started and able to collect in real time the logs of the machine.
The agent collects in real time the information about the machine and uploads to the data center.
The logs collected can be consulted through a viewer or via an HTTPS access (cloud.businesslog.it).

Is your computer infrastructure secure?

Find out.

Learn about Cyber Security services