Everything under control.

With Business LOG you keep track of your organization's potential cyber threats.

Check status of hosts and services

A Log Management suite allows you to monitor your enterprise infrastructure and notice any unusual behavior that might prove to be indications of danger.

Analysis of system problems

By means of a remote copy of the Log files, it is possible to analyze problems encountered on an IT infrastructure (even if the system becomes unavailable).

Prevent loss of company logs

A Log Management Suite makes it possible to never lose any Log, even following hardware or software failures, and to trace back the critical issues that generated the event.

Business LOG in action.

Discover how the Log Management Suite works through screenshots.

Screenshot di Business LOG - Configurazione Guidata Click to view full-screen.

Configuration Wizard

Getting started with Business LOG is quick and easy with the Initial Setup, which allows you to easily install the software and manage the main configurations of Business LOG.

Discover Business LOG
Click to view full-screen.

Dashboard

Business LOG is distinguished by a simple and intuitive graphical interface.
La Dashboard è la schermata iniziale dove vengono riportate le metriche chiave, selezionate direttamente dall'utente.

Discover Business LOG
Click to view full-screen.

Automatic Inventory

Business LOG automatically carries out the inventory of Software and Hardware in the organization's infrastructure.

  • Software Inventory
  • Hardware Inventory
  • Machine List
Discover Business LOG
Click to view full-screen.

Custom Alarms

In Business LOG, custom alarms can be set for specific machines, specific users or specific times.
The software automatically sends email notifications the moment alarm events are triggered.
The software also sends the End-of-Day Report, containing the collected logs divided by type, current DB size and failed access attempts.

Discover Business LOG
Click to view full-screen.

Log Consultation

In Business LOG, consulting logs is simple and straightforward: it is possible to filter the displayed logs by Origin, Date/Time, Type, Category, etc. and create dynamic filters via drag-and-drop function.

Discover Business LOG
Click to view full-screen.

Event Management

In Business LOG you can define and monitor events within the network, with the ability to create events customized to the specific needs of the organization.

Discover Business LOG
Click to view full-screen.

File Activity

Inside Business LOG there is a dedicated table to monitor the operations on the files (opening, deleting and copying) present in a certain network folder.

Discover Business LOG
Click to view full-screen.

USB Access Logs

With Business LOG you can monitor the access of USB devices and removable disks to detect potential fraudulent activities and prevent errors or critical issues within the organization.

Discover Business LOG
Click to view full-screen.

Syslog Access Logs

Business LOG ensures maximum compatibility even to non-Windows systems thanks to the Syslog Plugin that allows you to collect logs from all major operating systems and all compatible syslog equipment.

Discover Business LOG
Click to view full-screen.

Processes Logs

Business LOG allows to monitor, in a special grid and in agent-less mode, all the processes started by all users on the company network.

Discover Business LOG
Click to view full-screen.

Audit SQL Logs

Through SQL Log, Business LOG is able to record all the activities carried out in all SQL databases (events recorded at database or table level and events on individual records).

Discover Business LOG
Click to view full-screen.

Advanced Stats

In Business LOG you always have the situation under control thanks to advanced statistics. Statistics allow you to know, for example, the trend of the number of Login, Fails, machines with active alarms and operations on USB files and devices, broken down by user.

Discover Business LOG
Click to view full-screen.

Windows Update Patches and Hotfix

Controlled machines receive, in a special list, all Windows Update updates listed, downloaded and installed. In addition, all applied hotfixes will be written.

Discover Business LOG
New

Artificial Intelligence

Business LOG natively integrates advanced AI functions to improve the user experience of non-technical users.

In the Log Registry it is possible to query in depth every single Log through Artificial Intelligence.

The user will get an answer (in understandable language) containing the nature and details of the log.

Key benefits.
  • Possibility to read and consult the logs even for non-experts.
  • Reduction of analysis times also for professionals.
Click to view full-screen.
New

Machine Learning

A dedicated Machine Learning performs, on a daily basis, a training of the logs recorded in the archive to «learn» the information connected to the users' accesses.

Business LOG applies the model generated by the analysis to highlight anomalies in user access compared to forecasts of the generated model of Machine Learning.

Machine Learning is locally on the machine and is taught with customer data, independently.

Key benefits.
  • The system is continuously learning to improve the process of managing and monitoring the logs in the company.
  • Machine Learning automates some repetitive operations in Business LOG to make technicians' work more efficient.
Click to view full-screen.

Request a quote right now

Get in touch with us now to request a quote.

Maximum compatibility

Business LOG can collect logs from all major operating systems and compatible syslog devices.

  • MacOS

  • Linux and Unix

  • Microsoft Windows

  • Syslog Devices

Click to view full-screen.

Custom Alarms

In Business LOG it is possible to set one or more alarms that are triggered upon the occurrence of a predetermined event on files, folders, software, and custom events defined directly by the user.

  • File

    Write, read, delete events or any of these operations.

  • Folders

    Events on a File Folder (open, delete, write, etc.).

  • Custom Events

    Custom events, on one or more machines and on one or more users, in a given time interval.

  • Software

    Events in a specific Software (installation, uninstallation, upgrade, etc.).

Examples of customized alarms.
  • RDP.
  • User creation.
  • GPO changes.
  • Reset Password.
  • Many others.
Click to view full-screen.

Request a quote right now

Get in touch with us now to request a quote.

Automatic Inventory

storicizzazione, esportazione e analisi specifiche delle dotazioni aziendali.

  • Machine List

    Inventory of all machines in the network.

  • Hardware Inventory

    Inventory of hardware components of all networked devices.

  • Software Inventory

    Inventory of software in the network.

  • Card Machine

    Information on networked machines available in Business LOG.

Click to view full-screen.

USB and Removable Disk Audits

In Business LOG you can monitor the accesses of USB devices and Removable Disks to detect fraudulent activity and prevent errors or critical issues within the organization.

Key benefits.
  • Monitors any fraudulent activities within the organization.
  • Prevent and correct any errors within the organization in time.
  • Identifies the specific computers and users who perform operations on Removable Disks.
  • The control cannot be evaded.
Screenshot of USB and Removable Disk Audits Click to view full-screen.

Do you have more questions?

Get in touch with us now.

integrationintegrationintegrationintegration

Business LOG integrates seamlessly with the leading software on the market.

integrationintegrationintegrationintegration
Icona Telegram
Real Time Notifications on Telegram

Receive a real-time notification when any custom event is set by the user on the Telegram channel of the Business LOG bot.

Integration is quick and easy to configure directly from the Business LOG Dashboard.

Automatic Notifications
Icona Teamviewer
Software of Remote Assistance

Business LOG collects logs from the main tele assistance software (remote work), such as Teamviewer, Anydesk, Supremo, Webex di Cisco, etc.

It is also possible to set custom alarms on events connected to the aforementioned software.

Log Gathering
Screenshot of Business LOG Server

Business LOG Server

Business LOG Server enables the Server-level acquisition without the use of agents or external services on all machines in the enterprise structure in the domain.

The configurable nodes in the system do not require the installation of any agents, facilitating the configuration and management of infrastructures of any size, from the smallest to enterprise-level architectures.

Log collection is centralized within a machine used as a Log Box (the machine chosen can be either physical or virtual).

Built-in Syslog for maximum compatibility

Built-in Syslog for logging from Linux, Unix and Mac machines or Syslog-compatible devices such as Routers, Firewalls, Nas, etc.

Log from remote assistance applications

Records from remote assistance applications, such as TeamViewer, Supremo, AnyDesk, NoMachine, and many others.

Recording events file access

In a dedicated table, it is possible to track who opens, deletes or copies files in a given network folder.

Digital Signature on each Log with consistency check

At the time of log collection, a technical signature of consistency is affixed automatically and in real time to each log.

Secondary storage on encrypted XML files

In addition to the DB in Business LOG, it is possible to automatically create a backup of all the information collected in a Path of your choice (nas, server, cloud storage).

Custom Alerts on Events, Files, and Software

Receive an alarm to a specific email and/or issue a command via Power Shell when the previously set alarm occurs.

Monitors mass storage devices

Conveniently view all operations done on external devices ( insertions, writes, copies, deletions on external devices.

Software and hardware automatic inventory

Business LOG inventories and historizes all operations throughout the network regarding software and hardware.

Hybridization with Cloud Version

View the logs present in the automatic backup in Azure through a convenient viewer or through multitenant HTTPS web access.

Available plugins

Discover all available plugins of Business LOG Server.

Minimum requirements

Find out the minimum requirements of the different versions of Business LOG Server.

Business LOG Server

Business LOG Plus

  • Intel or AMD CPU of i5 class or higher (at least 2 vCore per VM)
  • 8 Gb of Ram (12 Gb recommended)
  • At least 100 Gb of free space for databases and archives
  • .net Framework 4.8 (included, by the way, in the setup)
  • It is advisable to use SSD or M2 disks or, in the case of a Virtual Machine, to use the Paravirtual disk controller
  • Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Business LOG Server

Business LOG Enterprise

  • Intel or AMD CPU of i7 class or higher (at least 6 vCore per VM)
  • 12 Gb of Ram (16 Gb recommended)
  • At least 100 Gb of free space for databases and archives
  • .net Framework 4.8 (included, by the way, in the setup)
  • It is advisable to use SSD or M2 disks or, in the case of a Virtual Machine, to use the Paravirtual disk controller
  • Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022

Frequent Asked Questions

Find out all the top questions about Business LOG Server.

What does it mean that Business LOG Server is agent-less?

Business LOG Server does not need agents installed on the machines to be monitored. The software, automatically, queries all Devices in the domain/workgroup and collects all information. The collection is done through a request between operating systems and does not need agents, Firewall limitations or antivirus interruptions.

How are virtual machines considered?

In Business LOG a machine is considered a machine (indifferently from real or virtual) and must be counted to identify the correct version to be subscribed to in business.

What happens if I exceed the number of nodes in the version?

In the event that there is an overrun of nodes compared to the bracket provided by the version held by Business LOG, simply upgrade to the next version by paying only the economic difference between the versions.

Is there a free trial of Business LOG?

There is no free trial of Business LOG. This is a choice we have made so as not to risk confusing the potential customer due to the technical nature of the software. We prefer to accompany the client with direct presentations of the software so as to be sure that the full potential of the software is understood.

Request a quote right now

Get in touch with us now to request a quote.

Business LOG Cloud

Business LOG Cloud

The Business LOG Cloud version allows logs to be viewed through Business LOG Client or in the centralized portal.

The nodes that can be configured in the system have no numerical limit; they simply require the installation of an agent on each machine to be monitored, like a normal antivirus.

the service starts automatically and requires no intervention from either the user or the administrator.

The upload to the data center of the collected information is accessible through a viewer or via HTTPS access. The data center where the logs are stored is in Microsoft Azure.

Compliance with regulations and safe

The service stores corporate access-logs in the Cloud (2 data centers located in 2 European countries) and retains them in the manner and terms prescribed by law.

Simple and robust installation for SMEs

The ease of installation and robustness of the cloud database make it the ideal access-log solution for SMEs.

Log Viewer available in Cloud

View the logs present in the automatic backup in Azure through a convenient viewer or through multitenant HTTPS web access.

Available versions

Scopri tutte le versioni disponibili di Business LOG Cloud.

Minimum requirements

Find out the minimum requirements of the different versions of Business LOG Cloud.

Business LOG Cloud

Business LOG Cloud

  • 4 Gb of Ram
  • At least 10 Gb of free space for databases and archives
  • Internet connection with authorized outgoing TCP port 1433
  • Operating Systems: Windows 7 or higher (32 or 64 bit).