Everything under control.
With Business LOG you keep track of your organization's potential cyber threats.
Check status of hosts and services
A Log Management suite allows you to monitor your enterprise infrastructure and notice any unusual behavior that might prove to be indications of danger.
Analysis of system problems
By means of a remote copy of the Log files, it is possible to analyze problems encountered on an IT infrastructure (even if the system becomes unavailable).
Prevent loss of company logs
A Log Management Suite makes it possible to never lose any Log, even following hardware or software failures, and to trace back the critical issues that generated the event.
Business LOG in action.
Discover how the Log Management Suite works through screenshots.
Configuration Wizard
Getting started with Business LOG is quick and easy with the Initial Setup, which allows you to easily install the software and manage the main configurations of Business LOG.
Discover Business LOGDashboard
Business LOG is distinguished by a simple and intuitive graphical interface.
La Dashboard è la schermata iniziale dove vengono riportate le metriche chiave, selezionate direttamente dall'utente.
Automatic Inventory
Business LOG automatically carries out the inventory of Software and Hardware in the organization's infrastructure.
- Software Inventory
- Hardware Inventory
- Machine List
Custom Alarms
In Business LOG, custom alarms can be set for specific machines, specific users or specific times.
The software automatically sends email notifications the moment alarm events are triggered.
The software also sends the End-of-Day Report, containing the collected logs divided by type, current DB size and failed access attempts.
Log Consultation
In Business LOG, consulting logs is simple and straightforward: it is possible to filter the displayed logs by Origin, Date/Time, Type, Category, etc. and create dynamic filters via drag-and-drop function.
Discover Business LOGEvent Management
In Business LOG you can define and monitor events within the network, with the ability to create events customized to the specific needs of the organization.
Discover Business LOGFile Activity
Inside Business LOG there is a dedicated table to monitor the operations on the files (opening, deleting and copying) present in a certain network folder.
Discover Business LOGUSB Access Logs
With Business LOG you can monitor the access of USB devices and removable disks to detect potential fraudulent activities and prevent errors or critical issues within the organization.
Discover Business LOGSyslog Access Logs
Business LOG ensures maximum compatibility even to non-Windows systems thanks to the Syslog Plugin that allows you to collect logs from all major operating systems and all compatible syslog equipment.
Discover Business LOGProcesses Logs
Business LOG allows to monitor, in a special grid and in agent-less mode, all the processes started by all users on the company network.
Discover Business LOGAudit SQL Logs
Through SQL Log, Business LOG is able to record all the activities carried out in all SQL databases (events recorded at database or table level and events on individual records).
Discover Business LOGAdvanced Stats
In Business LOG you always have the situation under control thanks to advanced statistics. Statistics allow you to know, for example, the trend of the number of Login, Fails, machines with active alarms and operations on USB files and devices, broken down by user.
Discover Business LOGArtificial Intelligence
Business LOG natively integrates advanced AI functions to improve the user experience of non-technical users.
In the Log Registry it is possible to query in depth every single Log through Artificial Intelligence.
The user will get an answer (in understandable language) containing the nature and details of the log.
Key benefits.
- Possibility to read and consult the logs even for non-experts.
- Reduction of analysis times also for professionals.
Machine Learning
A dedicated Machine Learning performs, on a daily basis, a training of the logs recorded in the archive to «learn» the information connected to the users' accesses.
Business LOG applies the model generated by the analysis to highlight anomalies in user access compared to forecasts of the generated model of Machine Learning.
Machine Learning is locally on the machine and is taught with customer data, independently.
Key benefits.
- The system is continuously learning to improve the process of managing and monitoring the logs in the company.
- Machine Learning automates some repetitive operations in Business LOG to make technicians' work more efficient.
Request a quote right now
Get in touch with us now to request a quote.
Custom Alarms
In Business LOG it is possible to set one or more alarms that are triggered upon the occurrence of a predetermined event on files, folders, software, and custom events defined directly by the user.
File
Write, read, delete events or any of these operations.
Folders
Events on a File Folder (open, delete, write, etc.).
Custom Events
Custom events, on one or more machines and on one or more users, in a given time interval.
Software
Events in a specific Software (installation, uninstallation, upgrade, etc.).
Examples of customized alarms.
- RDP.
- User creation.
- GPO changes.
- Reset Password.
- Many others.
Request a quote right now
Get in touch with us now to request a quote.
Automatic Inventory
storicizzazione, esportazione e analisi specifiche delle dotazioni aziendali.
Machine List
Inventory of all machines in the network.
Hardware Inventory
Inventory of hardware components of all networked devices.
Software Inventory
Inventory of software in the network.
Card Machine
Information on networked machines available in Business LOG.
USB and Removable Disk Audits
In Business LOG you can monitor the accesses of USB devices and Removable Disks to detect fraudulent activity and prevent errors or critical issues within the organization.
Key benefits.
- Monitors any fraudulent activities within the organization.
- Prevent and correct any errors within the organization in time.
- Identifies the specific computers and users who perform operations on Removable Disks.
- The control cannot be evaded.
Do you have more questions?
Get in touch with us now.
Real Time Notifications on Telegram
Receive a real-time notification when any custom event is set by the user on the Telegram channel of the Business LOG bot.
Integration is quick and easy to configure directly from the Business LOG Dashboard.
Software of Remote Assistance
Business LOG collects logs from the main tele assistance software (remote work), such as Teamviewer, Anydesk, Supremo, Webex di Cisco, etc.
It is also possible to set custom alarms on events connected to the aforementioned software.
Business LOG Server
Business LOG Server enables the Server-level acquisition without the use of agents or external services on all machines in the enterprise structure in the domain.
The configurable nodes in the system do not require the installation of any agents, facilitating the configuration and management of infrastructures of any size, from the smallest to enterprise-level architectures.
Log collection is centralized within a machine used as a Log Box (the machine chosen can be either physical or virtual).
Built-in Syslog for maximum compatibility
Built-in Syslog for logging from Linux, Unix and Mac machines or Syslog-compatible devices such as Routers, Firewalls, Nas, etc.
Log from remote assistance applications
Records from remote assistance applications, such as TeamViewer, Supremo, AnyDesk, NoMachine, and many others.
Recording events file access
In a dedicated table, it is possible to track who opens, deletes or copies files in a given network folder.
Digital Signature on each Log with consistency check
At the time of log collection, a technical signature of consistency is affixed automatically and in real time to each log.
Secondary storage on encrypted XML files
In addition to the DB in Business LOG, it is possible to automatically create a backup of all the information collected in a Path of your choice (nas, server, cloud storage).
Custom Alerts on Events, Files, and Software
Receive an alarm to a specific email and/or issue a command via Power Shell when the previously set alarm occurs.
Monitors mass storage devices
Conveniently view all operations done on external devices ( insertions, writes, copies, deletions on external devices.
Software and hardware automatic inventory
Business LOG inventories and historizes all operations throughout the network regarding software and hardware.
Hybridization with Cloud Version
View the logs present in the automatic backup in Azure through a convenient viewer or through multitenant HTTPS web access.
Available versions
Discover all available versions of Business LOG Server.
Available plugins
Discover all available plugins of Business LOG Server.
Minimum requirements
Find out the minimum requirements of the different versions of Business LOG Server.
Business LOG Plus
- Intel or AMD CPU of i5 class or higher (at least 2 vCore per VM)
- 8 Gb of Ram (12 Gb recommended)
- At least 100 Gb of free space for databases and archives
- .net Framework 4.8 (included, by the way, in the setup)
- It is advisable to use SSD or M2 disks or, in the case of a Virtual Machine, to use the Paravirtual disk controller
- Operating Systems: Windows 10, Windows 11, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
Business LOG Enterprise
- Intel or AMD CPU of i5 class or higher (at least 4 vCore per VM)
- 12 Gb of Ram (16 Gb recommended)
- At least 100 Gb of free space for databases and archives
- .net Framework 4.8 (included, by the way, in the setup)
- It is advisable to use SSD or M2 disks or, in the case of a Virtual Machine, to use the Paravirtual disk controller
- Operating Systems: Windows 10, Windows 11, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
Frequent Asked Questions
Find out all the top questions about Business LOG Server.
What does it mean that Business LOG Server is agent-less?
Business LOG Server does not need agents installed on the machines to be monitored. The software, automatically, queries all Devices in the domain/workgroup and collects all information. The collection is done through a request between operating systems and does not need agents, Firewall limitations or antivirus interruptions.
How are virtual machines considered?
In Business LOG a machine is considered a machine (indifferently from real or virtual) and must be counted to identify the correct version to be subscribed to in business.
What happens if I exceed the number of nodes in the version?
In the event that there is an overrun of nodes compared to the bracket provided by the version held by Business LOG, simply upgrade to the next version by paying only the economic difference between the versions.
Is there a free trial of Business LOG?
There is no free trial of Business LOG. This is a choice we have made so as not to risk confusing the potential customer due to the technical nature of the software. We prefer to accompany the client with direct presentations of the software so as to be sure that the full potential of the software is understood.
Request a quote right now
Get in touch with us now to request a quote.
Business LOG Cloud
The Business LOG Cloud version allows logs to be viewed through Business LOG Client or in the centralized portal.
The nodes that can be configured in the system have no numerical limit; they simply require the installation of an agent on each machine to be monitored, like a normal antivirus.
the service starts automatically and requires no intervention from either the user or the administrator.
The upload to the data center of the collected information is accessible through a viewer or via HTTPS access. The data center where the logs are stored is in Microsoft Azure.
Compliance with regulations and safe
The service stores corporate access-logs in the Cloud (2 data centers located in 2 European countries) and retains them in the manner and terms prescribed by law.
Simple and robust installation for SMEs
The ease of installation and robustness of the cloud database make it the ideal access-log solution for SMEs.
Log Viewer available in Cloud
View the logs present in the automatic backup in Azure through a convenient viewer or through multitenant HTTPS web access.
Available versions
Scopri tutte le versioni disponibili di Business LOG Cloud.
Minimum requirements
Find out the minimum requirements of the different versions of Business LOG Cloud.
Business LOG Cloud
- 4 Gb of Ram
- At least 10 Gb of free space for databases and archives
- Internet connection with authorized outgoing TCP port 1433
- Operating Systems: Windows 7 or higher (32 or 64 bit).