2019-02-20T11:20:00Z

What is your primary use case for ArcSight Logger?

Miriam Tover - PeerSpot reviewer
  • 0
  • 94
PeerSpot user
17

17 Answers

Subhadip Pakrashi - PeerSpot reviewer
Real User
Top 5Leaderboard
2024-02-19T11:26:04Z
Feb 19, 2024

If deployed properly, the solution can collect logs well. The categories of logs are very high. It is very good. The solution is compatible with syslog servers. Our customers like the solution.

Search for a product comparison
Nagendra Nekkala. - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-12-01T10:11:12Z
Dec 1, 2023

The product helps me see all the event logs in one place. When I look into the application, I can see different levels of alerts and make the required decision.

Rikin Rathod - PeerSpot reviewer
Real User
Top 10
2023-10-24T12:12:06Z
Oct 24, 2023

We use the product for log management purposes at the moment.

Prischal Bahgoo - PeerSpot reviewer
Reseller
Top 5Leaderboard
2023-05-24T15:29:00Z
May 24, 2023

The tool helps us to collect, correlate and publish logs on our site.

MA
Real User
Top 5
2023-05-18T15:19:00Z
May 18, 2023

The solution is used for searching and test reports.

Olajide Olusegun - PeerSpot reviewer
MSP
Top 5Leaderboard
2023-02-07T16:52:00Z
Feb 7, 2023

Most of our clients need security devices that can monitor events such as authentication failures, incorrect logins, link, module, device, and switch failures, security events and alarms, vulnerability events, and threat logs. We are currently using ArcSight Logger and many other Syslog devices to monitor these security events and logs.

Find out what your peers are saying about OpenText, Splunk, Elastic and others in Log Management. Updated: March 2024.
765,234 professionals have used our research since 2012.
Ademayokun Daini - PeerSpot reviewer
Real User
Top 10
2022-09-21T03:21:30Z
Sep 21, 2022

Our primary use case for this solution is incident response, investigations and log management. For example, risky network communications, communications with risky countries, and VPN connections from outside the country. We deploy the solution on-premises.

SA
Real User
2021-07-16T11:27:43Z
Jul 16, 2021

Our primary use case was to catch malicious activity happening inside our organization.

PN
Real User
2021-02-18T16:55:00Z
Feb 18, 2021

We have just upgraded to Splunk, so we're currently in the process of converting everything over from ArcSight to Splunk.

SV
Real User
2020-02-17T07:42:26Z
Feb 17, 2020

ArcSight logger was used for storing your logs, long-term, in a structured way. You can search in it, you can structure your data in it, and you can generate simple reports.

it_user1141698 - PeerSpot reviewer
Reseller
2020-02-16T08:27:00Z
Feb 16, 2020

We focus mainly on the enterprise market where the customers have the requirement for log management and compliance. And most of the time we propose ESM along with the logger for SIEM requirements. We have multiple Logger customers here in Sri Lanka where we've implemented and maintained solutions for them.

MS
Real User
2020-02-09T08:17:00Z
Feb 9, 2020

We use this solution for archiving log feeds.

MA
Real User
2019-09-25T05:10:00Z
Sep 25, 2019

We use the on-premise deployment model. Our primary use case is for monitoring.

HF
Real User
2019-09-16T10:14:00Z
Sep 16, 2019

We primarily use the solution for monitoring all of our perimeter - from critical assets to less critical ones. It covers IT assets, networks, databases, servers, endpoints, etc.

it_user1052814 - PeerSpot reviewer
Real User
2019-08-18T07:52:00Z
Aug 18, 2019

We are a service provider and this solution is deployed on-premises for some of our customers. It is primarily used for firewall and Windows events.

AR
Consultant
2019-08-11T06:27:00Z
Aug 11, 2019

We use the on-premise version of ArcSight Logger.

it_user915744 - PeerSpot reviewer
Real User
2019-02-20T11:20:00Z
Feb 20, 2019

We have several uses for this solution like retention storage. We use Logger for some queries since we are in Talco industries. We use it for IT, MSISDN, and mobile phone. For the SM we have communication for the infrastructures including security. Plus, we use ESM for prevention and for a couple of cases we use it for fraud prevention and some for the VIP members check.

Log Management
A log is a file that is produced automatically when an event occurs in your system.
Download Log Management ReportRead more