Assuria Log Manager - Cloud Ready SIEM

Assuria Log Manager (ALM) delivers an enterprise wide view of IT system activity, from almost any system, application or device within the IT infrastructure. This IT security intelligence (which is essential for Security Operation Centres - SOC) is delivered with strong forensic readiness as a key objective.

Assuria Log Manager Datasheet Assuria Log Manager Datasheet

Vendor's claims about log data sources - learn more here!

ALM provides automated collection and management of audit logs from across the whole enterprise, as well as security event analysis, alerting and reporting. ALM is fully scalable to meet the needs of organisations from SME’s right through to major global enterprises. ALM is designed to automate the collection and management of logs from almost any IP based system or device, including MS Windows, Unix and Linux servers, workstations, databases, applications, security devices, network devices, firewalls, routers, physical access control systems and much more.

Assuria products are available in a range of deployment options;





Assuria software installations are highly scalable Assuria offer a range of hardened appliances Assuria Managed Security Service
Assuria provide key solutions for Security Operation Centres SOC
Assuria is traditionally delivered as a software solution to sit on your preferred hardware platform or on a virtual server.  Assuria software installs are highly scalable. Assuria offer a range of 'plug-and-play' appliances that are sized for your requirement.  We offer 24x7 support on all software and hardware deployments and a range of licensing options that are flexible to meet our customers requirements. Assuria can be provided as a managed service 'in the cloud' whether you require an In-premise installation and external management or a totally hosted solution Assuria provide key solutions for Protective Monitoring at Secure Operations Centres and offer a secure multi-tenant version for service providers to white label.


Unlike many SIEM solutions available today, most of which rely on crude methods of collecting log and event data, such as syslog forwarding (download our White Paper on the limitations of syslog) and pay little or no attention to the integrity of the log data, ALM is designed to efficiently interact directly with the system creating log data, whether an operating system, security device or other system. Wherever possible, ALM employs software agents using specially written log data sources (plug-ins) to reliably manage this interaction in true enterprise fashion. For more information on this subject, please go to: ALM Log Sources.

ALM agents are available for most Windows, Unix and Linux systems to provide the highest levels of forensic integrity and log management automation. Through its own built-in Syslog server and TCL scripted plug-ins, ALM is capable of collecting logs from just about any source. Out of the box, ALM supports most commonly used log sources and formats with a library of standard reports, such as for PCI-DSS or GPG13 compliance. A powerful analysis and anomaly detection engine, log data interactive log data viewing features and a highly flexible report generator allows easy generation of highly customised views of security event and log data.


Role based access control (RBAC) provides privilege control. Multiple users can log into the ALM Console to manage agents, agent policies, collection policies, syslog forwarding (where ALM agents are not in use) and security policies, as well as to create archives, generate reports and many other processes.

CESG-CCTM-Assuria-Log-Manager-ICD Assuria Datasheet CESG-CCTM-Assuria-Log-Manager-TRS Assuria Datasheet
assuria litd - tech support and software
© Copyright 2015  Assuria Limited.  All rights reserved worldwide.