A refreshed experience is in progress. A few pages may be temporarily limited.

As a Service

Reach out to KIDAN for inquiries and support.

On-demand Consulting

Expert guidance for strategic technology decisions.

Toc

24/7 global technology operations center.

Implementation

Seamless enterprise technology solution deployment.

Training

Empower teams with expert-led technology programs.

Services

Enterprise services supporting critical IT infrastructure.

Solutions

Tailored IT solutions for operational excellence.

SOC

End-to-end security operations monitoring.

Support

Dedicated IT support for seamless operations.

Most visited page

Expert guidance for strategic technology decisions.

About Us

Learn more about KIDAN’s vision, values, and expertise.

Our Partners

Meet KIDAN’s partners working together to deliver technology solutions, support, and growth for businesses.
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
10 +
Leading enterprise IT management solutions
offered via KIDAN’s trusted partner ecosystem for scalable, secure operations.
110 +
Enterprise clients across industry sectors
trust KIDAN’s strategic partnerships and solutions to drive technology success.
950 +

ManageEngine Log360 for SIEM Solution and Log Management

Monitor, analyze, and respond to security incidents across your entire infrastructure with realtime threat detection, log correlation, and builtin compliance. 
Editor’s Choice

7th time in Gartner Magic Quadrant, 2024

2nd in Best Event Log Analysis tools, 2020

1st in Top 10 SIEM Solutions

2nd Time Champion, 2020

Expert’s Choice Great UX

Are you managing your Logs or They are Managing You?

The Challenge: A Fragmented Approach

Multiple tools, scattered logs, and slow investigations make it hard to see the full picture.

No Real-Time Threat Detection

Attacks go unnoticed due to lack of instant alerts and behaviour monitoring.

Difficult Compliance Management

Manual compliance efforts are time-consuming and error-prone.

Scattered and Unmanaged Logs

Logs are spread across systems, making monitoring and analysis difficult.

Slow Incident Investigation

Security teams struggle to trace attacks or user activity efficiently.

The Solution: A Unified Platform

Bring everything into one place for clearer visibility, faster detection, and smarter decisions.

Security, Simplified

Log360 provides instant alerts and threat intelligence to detect attacks as they happen

Your Security Command Center

Log360 automates compliance reports and ensures secure log retention.

Control the Chaos of Logs

Log360 centralizes and organizes logs from all sources in one dashboard

Accelerate Root Cause Analysis

Log360 enables fast root cause analysis with advanced correlation and audit trails.

All-In-One Log Management & Security Platform 

Monitor, analyze, and protect your IT environment with Log360. It centralizes log management, security analytics, and compliance reporting, giving you full control over your digital ecosystem. 

Collect

Analyze

Active Directory

Firewalls

Servers

Cloud platforms

Empower

Everyone

Security Analysts

IT Admins

Compliance Officers

Executives

Protect your

Data & Infrastructure 

On-Premises

Cloud Environments

Hybrid Networks 

Remote Workforce

Holistic Security Features of Log360 

A unified SIEM solution with integrated DLP and CASB capabilities for investigating, detecting, and responding to security threats.

Threat intelligence

Block malicious intruders using frequently updated threat feeds.

External threat mitigation

Leverage STIX/TAXII format threat feeds to discover malicious IPs, domains, and URLs through threat intelligence.

Threat hunting

Find malicious actors and potential hidden attacks that have slipped through your initial security defenses by leveraging advanced threat analytics.

Internal threat mitigation

Get alerted about and block malicious traffic to or from blacklisted IP addresses, domains, and URLs in real time, and get recommended options to remediate threats with predefined workflow rules.

Dark web monitoring

Uncover hidden threats and sensitive data exposed in the dark web before it impacts your business. With dark web intelligence, get early warnings of credential leaks, supply chain credential breaches, and financial fraud.

Rule-based: Real-time correlation

Detect security threats accurately by correlating suspicious events throughout your network with Log360’s event log correlation engine.

Behavior-based: ML-based UEBA

Identify insider threats through user and entity behavior analytics, which leverages machine learning for accurate threat detection.

Signature-based: MITRE ATT&CK

Prioritize threats that occur earlier in the attack chain by using MITRE ATT&CK framework in Log360.

Simplify your defense against threats with Vigil IQ, Log360's advanced TDIR engine

Utilize the power of Vigil IQ, Log360’s robust threat detection, investigation, and response (TDIR) system, that provides immediate visibility into security threats with its real-time correlation, ML-based adaptive alerts, UEBA, MITRE ATT&CK framework adoption, intuitive security analytics, and SOAR.

eDiscovery

Locate, classify, and preserve electronic information that is required as evidence in litigation using Log360.

Content-aware protection

Monitor access to sensitive information stored in your network and ensure data protection.

Data risk assessment

Protect sensitive enterprise information, evaluate the locations where critical data is stored, and ensure data security.

File integrity monitoring

Track critical activities such as creation, deletion, access, modification, and renames on your files and folders, and get alerted to suspicious activity through file integrity monitoring.

Shadow IT monitoring

Discover shadow applications in your network, track users who request access to shadow applications, and gain insights on recently accessed shadow applications.

Cloud security monitoring

Safeguard cloud accounts from unauthorized access and ensure the protection of cloud-based data assets.

Web content filtering

Protect your organization’s network against web-based attacks by blocking access to malicious applications and websites.

Cloud data protection

Prevent data exfiltration attempts by monitoring unauthorized accesses and unauthorized data downloads.

Log and data management

Collect and analyze logs from various sources in your environment, including end-user devices, and get insights in the form of graphs and intuitive reports that help spot security threats.

Unified analytical console

Log360’s Incident Workbench integrates user analytics, process hunting, and advanced threat analytics into a single console. Utilize the Incident Workbench to gain contextual insights and to conduct hassle-free investigations, enabling faster threat resolution.

Real-time AD auditing

Track all security events in your AD environment including security group membership changes, unauthorized logon attempts, account lockouts, and OU permission changes.

Securing the remote workforce

Ensure a secure remote work environment by detecting cloud-, VPN-, and COVID-19-related security threats.

Incident response

Accelerate threat mitigation through real-time alert notifications and automated incident response workflows.

Incident management

Reduce the mean time to detect (MTTD) and the mean time to resolve (MTTR) an incident by quickly detecting, categorizing, analyzing, and resolving an incident accurately with a centralized console.

Automation

Automate responses to threats at every stage with prebuilt workflows and automatic ticket assignment.

Orchestration

Gain meaningful security context from collected log data to identify security events quickly and streamline incident management by integrating with external ticketing tools.

Audit-ready templates

Simplify security audit by meeting compliance requirements with 150+ ready-to-use reports.

Secured log archival

Tamper-proof log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits.

Incident timelines

Backtrack security incidents using incident timelines when a suspicious activity is recorded.

Forensic analysis

Reconstruct crime scenes and conduct root cause analysis using a wide range of features such as Advanced Threat Analytics, Correlation, Workflows, etc.

Behavior analytics

Detect suspicious activities from users and entities in your network by utilizing machine learning techniques.

Integrated risk management

Gain complete visibility into an organization’s security and risk posture.

Insider threat detection

Detect malicious insider activity and prevent unauthorized access or data exfiltration within your organization.

Data anomaly detection

Detect unusual activity across users, systems, and applications in real time. Log360 combines machine learning (ML), behavioral analytics, and entity risk scoring to reveal deviations, reduce false positives, and help security teams respond quickly to emerging threats.

Dynamic peer grouping

Detect anomalies on a granular level by grouping users in a network based on behavior exhibited by them and establishing a baseline for the group.

UEBA for threat detection

Detect anomalous behavior in your network and defend against unusual security threats with ease.

Anomaly detection

Uncover behavioral anomalies to detect malicious activities like data exfiltration, lateral movement, C2 attacks, and more.

Log360 for security professionals

Monitor all network devices, detect intrusions, and vulnerabilities through event correlation, behavioral monitoring, threat intelligence, and more. Get alerted to high-risk security events.

Optimize SOC metrics with Log360

Streamline and optimize security operations with visibility into key metrics like mean time to detect (MTTD), mean time to respond (MTTR), and more with Log360’s incident dashboard.

Zia Insights (AI-powered threat investigation)

Leverage contextual AI to transform alert triage and incident analysis. Zia Insights uses large language models to summarize security events, correlate behavior across entities, visualize attack timelines, map events with MITRE ATT&CK TTPs and recommend next steps. Zia Insights helps your SOC reduce investigation time and respond faster.

Log360 for compliance managers

Adhere to compliance regulations such as PCI-DSS, HIPAA, FISMA, SOX, as well as those recently enacted and enforced across the globe. Get notified of compliance violations in real time.

Machine Learning-enhanced adaptive threshold for alerts

Revolutionize your SOC with an advanced dual-layered approach, focusing on high-precision alerts to ensure attention is directed only towards significant threats.

Unified security platform

An extensible, API-driven platform unifies IT and security ecosystems through seamless integrations, marketplace extensions, and customizable widgets

Active Directory

Gain granular visibility into your AD infrastructure’s compliance to harden your risk posture, calculate your AD security score, and comply with industry regulations.

MS SQL server

Meet benchmark requirements set by the Center for Internet Security (CIS), calculate the risk percentage of your SQL servers, and obtain remedial measures and insights to ensure SQL server security.

Log360 – Now in Your Pocket 

Stay in control of your security, wherever you are. 

The Log360 mobile app brings the power of real-time security monitoring to your fingertips. Whether you’re away from your desk or managing multiple sites, the app keeps you connected to critical alerts and system activity.
Seamless performance and UI designed specifically for Android and iOS devices. 
Built-in authentication and encryption to ensure secure log access from mobile. 
Get instant alerts on mobile for critical security events. No need to check manually. 
Minimal load time and optimized resource usage to keep your device running smoothly. 

A unified SIEM with integrated DLP and CASB capabilities for
security operations

From alerts to actions: Automated TDIR

Vigil IQ—Log360’s automated threat detection, investigation, and response (TDIR) module—equips your security operations center (SOC) to proactively combat threats, improve efficiency, and maximize security posture. It addresses the core challenges faced by SOCs with:

Improved threat coverage

Deploy 2000+ cloud-delivered, MITRE-mapped detections instantly—including correlation rules, anomaly rules, and threat intel matches that adapt to emerging attack patterns

Expedited investigations

Consolidate security telemetry from critical sources like Active Directory, threat feeds, and other security tools within the central Incident Workbench for contextual investigation. Process lineage visuals for guided investigations to uncover hidden connections. You can also generate AI-automated user timelines and incident timelines. Explore Log360’s Incident Workbench.

Automated responses

Orchestrate complex workflows with pre-defined playbooks, enabling swift threat neutralization and minimizing damage.

1000+
Analytical Widgets.
30+
Audit-ready compliance templates
100+
Accurate threat detection use cases.

Deployment Options

On-Premises Deployment

Organizations with strict data control, security, or compliance requirements. Full control over data and configurations. No dependency on internet connectivity

Cloud Deployment

Organizations looking for scalability, easier maintenance, and remote accessibility. Easier setup and updates . Scalable storage and performance . Accessible from anywhere

Hybrid Deployment

Organizations operating in both local and cloud environments. Flexibility to manage both cloud and on-prem logs. Centralized view of hybrid infrastructure . Ideal for gradual cloud migration 

Why Log360 is your SOC's
trusted ally

Centralize data, streamline compliance, and scale effortlessly with a SIEM that is tailored to your needs.

Your central hub for
informed security decisions

Consolidate all your security data points into a single, intuitive console. Log360 acts as your security hub, streamlining threat investigations and delivering a seamless interface that empowers you to make data-driven security decisions with confidence, keeping your enterprise a step ahead of cyber threats.

For better implementation experience, and tailored solutions that's unique to your business.

Enrich your TDIR and
compliance management with
third-party integrations

Upgrade to a Fully Managed Security Posture

Introducing KIDAN’s Endpoint Management and Security as a Service powered by our 24/7 Swiss-led Technology Operations Center (TOC)

24/7 Proactive Security & Threat Mitigation

Our TOC operates around the clock to monitor your endpoints. We don’t just send you alerts; we actively investigate, validate, and remediate threats before they can impact your operations. This includes vulnerability management, patch deployment, and enforcing security configurations across your entire fleet of devices.

Expert Management & Optimization

Your Endpoint Central platform will be managed and optimized by certified engineers who live and breathe this technology. We handle all software deployments, policy configurations, and routine maintenance, ensuring the tool is always performing at its peak and aligned with the latest security best practices.

Strategic Reporting & Visibility

Move beyond raw data. We provide you with clear, executive-level monthly reports that translate technical activity into business-relevant insights. Understand your security posture, see the threats we’ve neutralized, and demonstrate compliance with ease.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

As your technology partner, we are committed to growing with you and tailoring the best model for your needs.

Brad Frerichs

Farmers Trust & Savings Bank

Farmers Trust & Savings Bank:

Log360 gathers a lot of information and puts it in a very easy-to-read format.

log360-LiveDemoForm

MM slash DD slash YYYY

Your Questions, Answered with Clarity.

Direct answers to the most common strategic, technical, and commercial questions
about Endpoint Central.

Log360 is a comprehensive SIEM solution that integrates log management and AD auditing components into a single dashboard. With this web-based solution you can,

  • Manage log data: Collect, monitor, analyze, correlate, and archive log data from sources across the network.

  • Monitor privileged users: Track all activities including logon and logoff activities of privileged users. Get detailed session monitoring reports as well.

  • Comply to IT mandates: Be 100% compliant to various regulatory mandates including PCI DSS, HIPAA, FISMA, GLBA, ISO 27001, SOX, and more.

  • Audit AD in real-time: Audit all critical changes to Active Directory objects and get notified via email or SMS in real-time.

  • Protect confidential data: Monitor and track critical changes including creation, deletion, modification, and more happening to sensitive information on files/folders.

  • Track GPO and OU changes: Audit critical changes to your AD GPOs and OUs in real-time and get instant alerts.

  • Perform database auditing: Monitor all database activities, database server logons and logoffs, database server account changes, and more.

Click the ? on the top-right corner in Log360 and click About to know which database is in use.

Hardware requirements

HardwareMinimum requirementsRecommended System
ProcessorDual Core8+ Core
RAM4 GB8+ GB
Disk Space40 GBDepends on the log flow rate

Software requirements

ManageEngine Log360 supports the following Microsoft Windows operating system versions:

  • Windows 2003
  • Windows 2008, 2008R2
  • Windows 2012, 2012R2
  • Windows XP
  • Windows Vista
  • Windows 7,8, and 10

 

Supported Browsers

ManageEngine Log360 requires one of the following browsers to be installed on the system to access the Log360 web client.

  • Internet Explorer 10 and above
  • Firefox
  • Chrome
  • Safari 5 and above

Your ADAudit Plus deployment would’ve simplified your Active Directory monitoring and auditing challenges. However, when it comes to securing the entire organization’s network, you need a complimentary solution that can manage, monitor, and audit other aspects of your network.

You need to go for Log360 as it brings both ADAudit Plus and the comprehensive log management solution viz., EventLog Analyzer together in a single console.

The EventLog Analyzer component complements the functionality of ADAudit Plus and also helps you to continuously monitor the entire network including network devices, Linux/Unix servers, IBM AS400 servers, applications, databases, Hyper Vs, and cloud environments such as Amazon AWS EC2 instances.

No, you need to update the individual components separately with their respective service packs.

Being the Swiss partner of ManageEngine, Kidan is responsible for aiding with professional services, such as installing, implementing, configuring, training, and supporting the company to ensure an effective on-boarding of Log360.To make it even better, Kidan even provides advice on top of it all!Get in touch with us to know more.

1 Minute Guided Tour of the
Log360 

Deployment Options

On-Premises Deployment

Organizations with strict data control, security, or compliance requirements. Full control over data and configurations. No dependency on internet connectivity

Cloud Deployment

Organizations looking for scalability, easier maintenance, and remote accessibility. Easier setup and updates . Scalable storage and performance . Accessible from anywhere

Hybrid Deployment

Organizations operating in both local and cloud environments. Flexibility to manage both cloud and on-prem logs. Centralized view of hybrid infrastructure . Ideal for gradual cloud migration 

For better implementation experience, and tailored solutions that's unique to your business.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

Brad Frerichs

Farmers Trust & Savings Bank

Farmers Trust & Savings Bank:

Log360 gathers a lot of information and puts it in a very easy-to-read format.

log360-LiveDemoForm

MM slash DD slash YYYY

Holistic Security Features of Log360 

A unified SIEM solution with integrated DLP and CASB capabilities for investigating, detecting, and responding to security threats.

Threat intelligence

Block malicious intruders using frequently updated threat feeds.

External threat mitigation

Leverage STIX/TAXII format threat feeds to discover malicious IPs, domains, and URLs through threat intelligence.

Threat hunting

Find malicious actors and potential hidden attacks that have slipped through your initial security defenses by leveraging advanced threat analytics.

Internal threat mitigation

Get alerted about and block malicious traffic to or from blacklisted IP addresses, domains, and URLs in real time, and get recommended options to remediate threats with predefined workflow rules.

Dark web monitoring

Uncover hidden threats and sensitive data exposed in the dark web before it impacts your business. With dark web intelligence, get early warnings of credential leaks, supply chain credential breaches, and financial fraud.

Rule-based: Real-time correlation

Detect security threats accurately by correlating suspicious events throughout your network with Log360’s event log correlation engine.

Behavior-based: ML-based UEBA

Identify insider threats through user and entity behavior analytics, which leverages machine learning for accurate threat detection.

Signature-based: MITRE ATT&CK

Prioritize threats that occur earlier in the attack chain by using MITRE ATT&CK framework in Log360.

Simplify your defense against threats with Vigil IQ, Log360's advanced TDIR engine

Utilize the power of Vigil IQ, Log360’s robust threat detection, investigation, and response (TDIR) system, that provides immediate visibility into security threats with its real-time correlation, ML-based adaptive alerts, UEBA, MITRE ATT&CK framework adoption, intuitive security analytics, and SOAR.

eDiscovery

Locate, classify, and preserve electronic information that is required as evidence in litigation using Log360.

Content-aware protection

Monitor access to sensitive information stored in your network and ensure data protection.

Data risk assessment

Protect sensitive enterprise information, evaluate the locations where critical data is stored, and ensure data security.

File integrity monitoring

Track critical activities such as creation, deletion, access, modification, and renames on your files and folders, and get alerted to suspicious activity through file integrity monitoring.

Shadow IT monitoring

Discover shadow applications in your network, track users who request access to shadow applications, and gain insights on recently accessed shadow applications.

Cloud security monitoring

Safeguard cloud accounts from unauthorized access and ensure the protection of cloud-based data assets.

Web content filtering

Protect your organization’s network against web-based attacks by blocking access to malicious applications and websites.

Cloud data protection

Prevent data exfiltration attempts by monitoring unauthorized accesses and unauthorized data downloads.

Log and data management

Collect and analyze logs from various sources in your environment, including end-user devices, and get insights in the form of graphs and intuitive reports that help spot security threats.

Unified analytical console

Log360’s Incident Workbench integrates user analytics, process hunting, and advanced threat analytics into a single console. Utilize the Incident Workbench to gain contextual insights and to conduct hassle-free investigations, enabling faster threat resolution.

Real-time AD auditing

Track all security events in your AD environment including security group membership changes, unauthorized logon attempts, account lockouts, and OU permission changes.

Securing the remote workforce

Ensure a secure remote work environment by detecting cloud-, VPN-, and COVID-19-related security threats.

Incident response

Accelerate threat mitigation through real-time alert notifications and automated incident response workflows.

Incident management

Reduce the mean time to detect (MTTD) and the mean time to resolve (MTTR) an incident by quickly detecting, categorizing, analyzing, and resolving an incident accurately with a centralized console.

Automation

Automate responses to threats at every stage with prebuilt workflows and automatic ticket assignment.

Orchestration

Gain meaningful security context from collected log data to identify security events quickly and streamline incident management by integrating with external ticketing tools.

Audit-ready templates

Simplify security audit by meeting compliance requirements with 150+ ready-to-use reports.

Secured log archival

Tamper-proof log archive files to ensure the log data is secured for future forensic analysis, compliance and internal audits.

Incident timelines

Backtrack security incidents using incident timelines when a suspicious activity is recorded.

Forensic analysis

Reconstruct crime scenes and conduct root cause analysis using a wide range of features such as Advanced Threat Analytics, Correlation, Workflows, etc.

Behavior analytics

Detect suspicious activities from users and entities in your network by utilizing machine learning techniques.

Integrated risk management

Gain complete visibility into an organization’s security and risk posture.

Insider threat detection

Detect malicious insider activity and prevent unauthorized access or data exfiltration within your organization.

Data anomaly detection

Detect unusual activity across users, systems, and applications in real time. Log360 combines machine learning (ML), behavioral analytics, and entity risk scoring to reveal deviations, reduce false positives, and help security teams respond quickly to emerging threats.

Dynamic peer grouping

Detect anomalies on a granular level by grouping users in a network based on behavior exhibited by them and establishing a baseline for the group.

UEBA for threat detection

Detect anomalous behavior in your network and defend against unusual security threats with ease.

Anomaly detection

Uncover behavioral anomalies to detect malicious activities like data exfiltration, lateral movement, C2 attacks, and more.

Log360 for security professionals

Monitor all network devices, detect intrusions, and vulnerabilities through event correlation, behavioral monitoring, threat intelligence, and more. Get alerted to high-risk security events.

Optimize SOC metrics with Log360

Streamline and optimize security operations with visibility into key metrics like mean time to detect (MTTD), mean time to respond (MTTR), and more with Log360’s incident dashboard.

Zia Insights (AI-powered threat investigation)

Leverage contextual AI to transform alert triage and incident analysis. Zia Insights uses large language models to summarize security events, correlate behavior across entities, visualize attack timelines, map events with MITRE ATT&CK TTPs and recommend next steps. Zia Insights helps your SOC reduce investigation time and respond faster.

Log360 for compliance managers

Adhere to compliance regulations such as PCI-DSS, HIPAA, FISMA, SOX, as well as those recently enacted and enforced across the globe. Get notified of compliance violations in real time.

Machine Learning-enhanced adaptive threshold for alerts

Revolutionize your SOC with an advanced dual-layered approach, focusing on high-precision alerts to ensure attention is directed only towards significant threats.

Unified security platform

An extensible, API-driven platform unifies IT and security ecosystems through seamless integrations, marketplace extensions, and customizable widgets

Active Directory

Gain granular visibility into your AD infrastructure’s compliance to harden your risk posture, calculate your AD security score, and comply with industry regulations.

MS SQL server

Meet benchmark requirements set by the Center for Internet Security (CIS), calculate the risk percentage of your SQL servers, and obtain remedial measures and insights to ensure SQL server security.

Log360 – Now in Your Pocket 

Stay in control of your security, wherever you are. 

The Log360 mobile app brings the power of real-time security monitoring to your fingertips. Whether you’re away from your desk or managing multiple sites, the app keeps you connected to critical alerts and system activity.
Seamless performance and UI designed specifically for Android and iOS devices. 
Built-in authentication and encryption to ensure secure log access from mobile. 
Get instant alerts on mobile for critical security events. No need to check manually. 
Minimal load time and optimized resource usage to keep your device running smoothly. 

A unified SIEM with integrated DLP and CASB capabilities for
security operations

From alerts to actions: Automated TDIR

Vigil IQ—Log360’s automated threat detection, investigation, and response (TDIR) module—equips your security operations center (SOC) to proactively combat threats, improve efficiency, and maximize security posture. It addresses the core challenges faced by SOCs with:

Improved threat coverage

Deploy 2000+ cloud-delivered, MITRE-mapped detections instantly—including correlation rules, anomaly rules, and threat intel matches that adapt to emerging attack patterns

Expedited investigations

Consolidate security telemetry from critical sources like Active Directory, threat feeds, and other security tools within the central Incident Workbench for contextual investigation. Process lineage visuals for guided investigations to uncover hidden connections. You can also generate AI-automated user timelines and incident timelines. Explore Log360’s Incident Workbench.

Automated responses

Orchestrate complex workflows with pre-defined playbooks, enabling swift threat neutralization and minimizing damage.

For better implementation experience, and tailored solutions that's unique to your business.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

As your technology partner, we are committed to growing with you and tailoring the best model for your needs.

Brad Frerichs

Farmers Trust & Savings Bank

Farmers Trust & Savings Bank:

Log360 gathers a lot of information and puts it in a very easy-to-read format.

log360-LiveDemoForm

MM slash DD slash YYYY

LOG360 Pricings

For better implementation experience, and tailored solutions that's unique to your business.

We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.
We’ve been redefining IT for enterprises, excellence in every solution.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

As your technology partner, we are committed to growing with you and tailoring the best model for your needs.

Brad Frerichs

Farmers Trust & Savings Bank

Farmers Trust & Savings Bank:

Log360 gathers a lot of information and puts it in a very easy-to-read format.

log360-LiveDemoForm

MM slash DD slash YYYY

Available Editions of Log360 Analyzer

AD Auditing
Data SecurityFree EditionProfessional Edition
ReportsExisting reports onlyReal-time reports
Log360 Cloud Edition

For better implementation experience, and tailored solutions that's unique to your business.

How KIDAN Works with You

Choose the Model That Fits You Best 

We don’t just provide software we partner with you to ensure it delivers real, lasting value. Whether you’re looking for light-touch guidance or full-scale operational support, we offer flexible service models tailored to your needs. 

License + Expert Guidance

Start with the right license and unlock full value.
Already have the tool or just getting started? We’ll help you provision the right licenses and guide you to unlock the full potential of your investment. Think of us as your strategic advisor always available, never intrusive.

Implementation & Onboarding

We’ll help you set up, onboard, and train your team.

We’ll help you set up, onboard, and train your team.Need help getting up and running? We’re with you every step of the way from setup and configuration to onboarding and training. Our experts ensure your team is confident, capable, and ready to go.

Fully Managed Service

We manage everything so you don’t have to. 

Prefer to stay hands-off? Let us run the tool for you. We’ll handle everything monitoring, maintenance, updates, and optimization so you can focus on what matters most: your
business.

As your technology partner, we are committed to growing with you and tailoring the best model for your needs.

Brad Frerichs

Farmers Trust & Savings Bank

Farmers Trust & Savings Bank:

Log360 gathers a lot of information and puts it in a very easy-to-read format.

log360-LiveDemoForm

MM slash DD slash YYYY

Handbook

GDPR Compliance Handbook

Guide

LOG360 Installation Guide

Broschuere

CASB Brochure

Flyer

LOG360 Flyer

DATENBLATT

LOG360 Datenblatt

Solution Book

GDPR Solution Book

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Join 100+ IT Leaders at KIDANVerse

Be part of the first edition.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details For Pricing

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.

Quick details before your demo

Almost there – a few quick details first.