Request a quote   →

Business LOG Server

Log Management Suite for information security and compliance with GDPR, ISO 27001, NIS2 and the Privacy Guarantor's regulations for System Administrators and CSIRT.

Monitors and records corporate IT logs, facilitating regulatory compliance. It offers analysis, audits, advanced reporting, real-time monitoring, cloud backup and centralized management, improving transparency and data protection.

COMPLIANCE AND SECURITY

Thanks to Business LOG, everything is under control.

  • Hosts and services control

    A Log Management suite allows you to monitor your enterprise infrastructure and notice any unusual behavior that might prove to be indications of danger.
  • Analytics and reporting

    Business LOG provides comprehensive visibility into IT activities, helping to identify trends, anomalies, and make informed security management decisions.
  • Secured log collection

    A Log Management Suite makes it possible to never lose any logs, even following hardware or software failures, and to trace back the critical issues that generated the event.
  • Regulatory compliance

    Facilitates compliance with GDPR, ISO 27001 and NIS2 regulations and ensures that log management activities comply with data protection laws.

Discover the main functions of
Business LOG

Activity on files and folders

Monitor critical paths and activity on files/folders: opens, edits, deletions, and denied access, with centralized logs and alerts by user, device, and frequency.

  • Critical paths selected and managed by the user

  • Logs for open, edit, rename, delete

  • Notifications and reports by user/device

File Operations Alarms

Monitor selected paths and file/folder activities: reads, modifications, deletions and denied accesses, with notifications and aggregations per user, device and frequency.

  • Observation of user-defined paths

  • Read, modify, delete, denied access logs

  • Notifications and reports per user/device

Event Alerts with PowerShell

Reactive automation: when a selected event occurs, Business LOG uses an AI engine to generate and execute PowerShell commands in real time, following the rules set by the user.

  • PowerShell commands generated by AI

  • Real-time execution on selected events

  • Configurable rules and conditions

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Security Events Alarms

Select security events already present in the system and configure alarms via email, Telegram or PowerShell commands generated by AI. Filter by device, users and frequency.

    Pre-mapped security event catalog

  • Email/Telegram notifications + PowerShell AI

  • Filter by device, users and frequency

Software Alarms

Automatic software inventory and alerts when a program is installed, removed, or updated, with linked commands and notifications.

  • Software install/remove/update detection

  • Alarms and automations when versions change

  • Configurable notifications

Process Analysis

Send the process event to AI for clear and contextualized insight, useful for understanding behavior and impact.

  • AI analysis of individual process events

  • Technical explanations in clear language

  • Immediate operational context

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

EDR/XDR/Antivirus Audit

Collects events from EDR, XDR, and other endpoint protection systems: threats, remediation, updates. Everything is logged, versioned, and correlated by the AI engine.

    Integration with EDR/XDR/AV

  • Threats and corrective actions tracked

  • Logging and AI correlation

Audit Fail (Failed Access)

View dedicated to all FAIL accesses. AI proposes an in-depth analysis and actions to reduce the recurrence of the error.

  • Centralized list of failed attempts

  • AI analysis of the failed operation

  • Operational mitigation suggestions

SQL Audit

Collection of logs from databases for visibility and traceability of relevant SQL events.

  • Log ingestion from supported databases

  • Event and anomaly traceability

  • Searchable history

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Print Audit

View all prints, including file prints and PDF conversions, for control and traceability.

    Complete print log

  • Includes file/PDF saves

  • Quick checks and audits

USB Audit

Lists all accesses to removable devices (USB, external HDDs, SD, etc.) and allows alerts on insertion.

  • Detection of accesses to removable media

  • Alert on device insertion

  • Traceability by user and machine

Shares

Global view of shared folders by machine, with permission level (read, write, full control).

  • Centralized map of shares

  • Details of actual permissions

  • Control by host

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Syslog configuration with AI

Enter brand, model, and version: AI generates a printable document with instructions for activating the syslog client on the compatible device.

    Step-by-step guide generated by AI

  • Printable output for the technician

  • Parameters by brand/model/version

Energy Consumption

Monitor consumption per machine, with overall time graph and average per host for operational assessments.

  • Consumption per individual device

  • Historical graph over time

  • Average per machine at a glance

Device Control with PowerShell

Programmable PowerShell sets: use ready-made commands or create new ones with the help of AI. Schedule and assign to one or more hosts.

  • Library of ready-to-use commands

  • AI-assisted creation

  • Scheduling and targeting by host

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

CVE Software

CVE list updated hourly by NIST. AI generates a report based on matches with software installed on networked machines.

    Hourly CVE feed from NIST

  • Matches with detected software

  • AI report on priorities

On-Demand Device Diagnostics

Performs diagnostics between server and client, highlighting communication issues and estimating log reading speed.

  • Check server-client connectivity

  • Estimate log reading speed

  • Highlight critical issues

Hardware Inventory

Hardware inventory with item/value details and latest detection for each machine.

  • List of detected hardware components

  • Updated values and status

  • Last scan timestamp

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Software Inventory

Inventory of software installed on Windows machines, with version history for each program.

    Software list by host

  • Version history by program

  • Visibility on changes and updates

Local Users

Grid of detected local users with account status and information on passwords and expiration dates.

  • List of local users by host

  • Password status and policy

  • Expiration dates under control

AI Syslog Parser

Define recognition patterns for syslog traces not present in the dataset, even for custom logs.

  • Custom patterns for syslog

  • Coverage of non-standard logs

  • Extension of the dataset

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Datacenter Control Customization

Modular dashboard with grids, graphs, and indicators to create customized views of your datacenter.

    Table, graph, and indicator widgets

  • Customized views by role

  • Focus on key indicators

SOC (Virtual SOC)

Dashboard with recent VirtualSOC alerts and an AI report on machine status and SOC considerations.

  • List of most recent alerts

  • AI report on host status

  • SOC operational notes

Statistics

Percentage charts of logs acquired from different perspectives for summary analysis.

  • Log acquisition percentages

  • Filters for multiple views

  • Quick insights

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Network Structure

Automatically generates a graphical representation of the network based on the list of machines and their roles.

    Topology generated from the host list

  • Machine roles considered

  • Immediate graphical view

Windows Update

RT module plugin with a list of updates managed by Windows Update and related details.

  • List of updates per machine

  • Status and version details

  • Compliance checks

Working LOG and AI – Advanced Analysis

With a dedicated license, build specific reports for collections or groups of logs with timely observations generated by AI.

  • Reports on collections/groups of logs

  • Timely observations with AI

  • Action-oriented insights

Discover the new versions of
Business LOG

New 2025

Business LOG One

Ideal for small businesses and professional firms.

The ideal solution for personal use, small studios and companies that want to monitor the security and access of individual PCs. Easy to install, includes IA, SOC dashboard, file control, USB, tracking and printing. Does not include remote scans, inventory, Powershell, RT, Azure and Syslog.

  • Easy and immediate installation

  • Artificial Intelligence and Security Operations Center (SOC)

  • Advanced alarms and monitoring on files, folders, USB and printers

Business LOG One
New 2025

Business LOG Auditor

Ideal for servers or small networks, expandable with RT Plugin and Syslog.

Designed for servers or small business networks, even without an Active Directory domain. Easy to install, it is ideal where you want to limit the configuration, using the RT agent. Includes AI, SOC dashboard, file control, USB, tracking, printing, Syslog and Azure support (licensed). Excludes remote scans and inventory.

  • Easy and immediate installation

  • Artificial Intelligence and Security Operations Center (SOC)

  • Advanced alarms and monitoring on files, folders, USB and printers

  • Acquisition from Syslog and Azure

Business LOG Auditor

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Discover the new Plugin of
Business LOG

New 2025

AI Plugin

The AI Plugin brings artificial intelligence to the center of your IT security. Analyze log groups with the AI 2.0 engine and discover in a few moments the real organizational impact and security criticalities. A powerful tool to anticipate risks, make informed decisions and strengthen your protection strategy.

New 2025

Energy 5.0 Plugin

With the Energy 5.0 Plugin you have full control over the power consumption of your devices. Thanks to the historical and real-time visualization, you can identify waste and optimize the use of resources. You can also activate smart controls to reduce energy impact, improve efficiency and contribute to business sustainability.

Request a quote now

Request a Business LOG quote parameterized to your organization's actual needs.

Integrations

Business LOG integrates seamlessly with leading software on the market.

Business LOG offers seamless integration with leading software on the market, providing seamless log management. This extended compatibility allows data from different platforms and applications to be collected, analyzed and monitored, improving the organization's operational efficiency and IT security.

Overview of
Business LOG Server

Business LOG Server enables server-level capture without the use of agents or external services on all machines in the corporate structure in the domain.

The configurable nodes in the system do not require the installation of any agents, facilitating the configuration and management of infrastructures of any size, from the smallest to enterprise-level architectures.

Log collection is centralized within a machine used as a Log Box (the machine chosen can be either physical or virtual).

Aggiornamenti Windows

Aggiornamenti Windows

Comandi Powershell

Comandi Powershell

Dasboard di Business LOG

Dasboard di Business LOG

Business LOG SOC

Business LOG SOC

Plugin Stampe

Plugin Stampe

Network Scan

Network Scan

Assistente IA di Business LOG

Assistente IA di Business LOG

Plugin SQL

Plugin SQL

Grafici e statistiche

Grafici e statistiche

Utenti in Business LOG

Utenti in Business LOG

Configurazione Cloud e Azure

Configurazione Cloud e Azure

Approfondimento informazioni macchina

Approfondimento informazioni macchina

Manuale di Business LOG

Manuale di Business LOG

Configurazione Cloud e Azure 2

Configurazione Cloud e Azure 2

Griglia Working Log

Griglia Working Log

Available versions of Business LOG Server

Discover all the available versions of Business LOG Server.

Available plugins of Business LOG Server

Learn about all available Business LOG Server plugins.

Minimum requirements

Find out the minimum requirements for Business LOG Server versions.

Business LOG One, Auditor and Plus

Up to 39 nodes.

  • Intel or AMD CPU of i5 class or higher (at least 4 vCore per VM).
  • 8 Gb of RAM (12 Gb recommended).
  • At least 100 GB of free space for databases and archives.
  • .net Framework 4.8 (included, however, in the setup).
  • It is required to use SSD or M2 disks or, in case of a Virtual Machine, the Paravirtual disk controller.
  • Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025.
Most popular

Business LOG Enterprise

Over 40 nodes.

  • Intel or AMD CPU of i7 class or higher (at least 6 vCore per VM).
  • 12 Gb of RAM (16 Gb recommended).
  • At least 100 GB of free space for databases and archives.
  • .net Framework 4.8 (included, however, in the setup).
  • It is required to use SSD or M2 disks or, in case of a Virtual Machine, the Paravirtual disk controller.
  • Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows Server 2025.

Find the right version of Business LOG

Find the correct version of Business LOG for your needs.

Feature comparison

Business LOG One

Record logs from 1 PC + Audit from the Fileserver.

Main functions

Managed nodes
1
Software inventory
Yes
Hardware inventory
Yes
Alarms with AI
Yes
Audit File
Yes
SOC
Yes
Syslog collection
No
Remote PowerShell
No

Available Plugins

RT Plugin
No
Azure Plugin
No
AI Plugin
Yes
Backup Log in Cloud Plugin
No
Energy 5.0 Plugin
No
SOC Stream Plugin
No
SQL Plugin
No
Printers Plugin
Yes
USB Plugin
Yes
Windows Updates Plugin
No
AS400 Plugin
No

Business LOG Auditor

Record logs from 1 PC + up to 20 nodes with RT agent.

Main functions

Managed nodes
1 + max 20 with RT
Software inventory
Yes
Hardware inventory
Yes
Alarms with AI
Yes
Audit File
Yes
SOC
Yes
Syslog collection
Yes
Remote PowerShell
No

Available Plugins

RT Plugin
Yes
Azure Plugin
Yes
AI Plugin
Yes
Backup Log in Cloud Plugin
Yes
Energy 5.0 Plugin
No
SOC Stream Plugin
No
SQL Plugin
No
Printers Plugin
Yes
USB Plugin
Yes
Windows Updates Plugin
Yes
AS400 Plugin
No

Business LOG Plus

Records from 1 to 39 nodes (machines/devices).

Main functions

Managed nodes
1 - 39
Software inventory
Yes
Hardware inventory
Yes
Alarms with AI
Yes
Audit File
Yes
SOC
Yes
Syslog collection
Yes
Remote PowerShell
Yes

Available Plugins

RT Plugin
Yes
Azure Plugin
Yes
AI Plugin
Yes
Backup Log in Cloud Plugin
Yes
Energy 5.0 Plugin
Yes
SOC Stream Plugin
Yes
SQL Plugin
Yes
Printers Plugin
Yes
USB Plugin
Yes
Windows Updates Plugin
Yes
AS400 Plugin
Yes

Business LOG Enterprise

Records from 40 to 5,000 nodes (machines/devices).

Main functions

Managed nodes
40 - 5.000
Software inventory
Yes
Hardware inventory
Yes
Alarms with AI
Yes
Audit File
Yes
SOC
Yes
Syslog collection
Yes
Remote PowerShell
Yes

Available Plugins

RT Plugin
Yes
Azure Plugin
Yes
AI Plugin
Yes
Backup Log in Cloud Plugin
Yes
Energy 5.0 Plugin
Yes
SOC Stream Plugin
Yes
SQL Plugin
Yes
Printers Plugin
Yes
USB Plugin
Yes
Windows Updates Plugin
Yes
AS400 Plugin
Yes
Business LOG has already been chosen by thousands of companies worldwide.
 logo
 logo
 logo
 logo
 logo
 logo
 logo
 logo

Frequently asked questions

Find out all the key answers about Business LOG Server.

License sizing.

In Business LOG a node is a single machine being monitored. No distinction is made in the count of machines to be monitored between client, server, and device.

In Business LOG a machine is considered a machine (indifferently from real or virtual) and must be counted to identify the correct version to be subscribed to in business.
Technical aspects.

Business LOG Server does not need agents installed on the machines to be monitored. The software automatically queries all Devices in the domain/workgroup and collects all information. The collection is done through a request between operating systems and does not need agents, Firewall limitations or antivirus interruptions.

In Business LOG, logs are saved in our Datacenter and on DB in Microsoft Azure. The recorded logs remain locally at your systems. There is an option to redundant this data on our systems through the Backup Log in Cloud Plugin, which allows logs to be exported to private cloud storage (searchable via web or dedicated application).
Pricing and versions.

To receive a Business LOG quote you must request it through the contact form on the “Request Quote” page.

In the event that there is an overrun of nodes compared to the bracket provided by the version held by Business LOG, simply upgrade to the next version by paying only the economic difference between the versions.

There is no free trial of Business LOG. This is a choice we have made so as not to risk confusing the potential customer due to the technical nature of the software. We prefer to accompany the client with direct presentations of the software so as to be sure that the full potential of the software is understood.
Support.

With the purchase of the license you will be entitled to access the Business LOG Help Center, the suite's official support portal for viewing guides and tutorials, opening and managing support tickets or requesting telephone support.

Request a Business LOG Quote

Are you interested in the Suite? Request a Business LOG quote now to evaluate the opportunity for your organization