• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

Documents

Documents

Product Document  
Product Datasheet (PDF | 700 KB)  
Product Videos  
Screen Shots  
Quick Start Guide (PDF | 700 KB)  
Best Practices Document (PDF | 66 KB)  
Tuning Guide  
Architecture  
System Requirements  
Solution Briefs  
Privileged User Monitoring and Audit using EventLog Analyzer (PDF | 2 MB) This solution brief tell us the importance of monitoring and auditing Privileged users
Object Access Auditing Simplified using EventLog Analyzer (PDF | 2 MB) This solution brief tell us the importance of Object Access Auditing
White Paper  
SIEM White Paper | PDF Illustrates how SIEM objectives can be achieved using EventLog Analyzer.
SOX White Paper | PDF Illustrates how SOX compliance can be achieved using EventLog Analyzer.
Case Studies  
Outsourcing Services Institution | PDF Explains how an Outsourcing Services Institution achieved 20% reduction in overall IT Spending
Banking Institution | PDF Explains how a Banking institution stays Compliant with The Federal Deposit Insurance Corporation (FDIC) Audit Requirements
Government Civil Engineering Institution | PDF Explains how a Government Transportation company prevented the grant of Administrator privileges to unauthorized users in an ad hoc manner
Engineering Consulting and Construction Management | PDF Explains how a construction management company addressed the SOX compliance auditor's requirements
Financial Services Institution | PDF Explains how a financial service institution is able to comply with PCI-DSS regulation effectively.
Banking Institution | PDF Describes how a banking entity monitors its internal user activity, which cannot be ignored in securing the bank's data and money.
Media Marketing Research Company | PDF Illustrates how a media marketing research company is able to retain the ISO 27001 certification.
Help Documents  

Admin Server - User Guide
PDF | Zip | View Online

Helps users to understand the complete usage of the EventLog Analyzer Distributed Edition Admin Server

Managed Server - User Guide
PDF | Zip | View Online

Helps users to understand the complete usage of the EventLog Analyzer Distributed Edition Managed Server
FAQ Answers for your basic questions about EventLog Analyzer
Troubleshooting Tips Teaches you the tips and tricks of using the EventLog Analyzer application
Help Documents - EventLog Analyzer 7.2 Distributed Edition  

Admin Server - User Guide
PDF | Zip | View Online

Helps users to understand the complete usage of the EventLog Analyzer Distributed Edition Admin Server

Managed Server - User Guide
PDF | Zip | View Online

Helps users to understand the complete usage of the EventLog Analyzer Distributed Edition Managed Server
Customer Speaks
 
"Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application."
Jim Lloyd
Information Systems Manager
First Mountain Bank