About Syslog-ng

We help you get log management and IAM right

You’ve got a job to do. And that job involves helping your organization achieve its mission and deliver on its promises securely and efficiently. At One Identity, our job — our mission — is to help you succeed in yours. That’s why we offer syslog-ng as well as a comprehensive family of identity and access management (IAM) solutions designed to solve today’s challenges, and address tomorrow’s as they arise. We help you get log management and IAM right.

We believe that security is much more than the practice of denial and restriction. That’s why One Identity’s design and integration philosophy is that our solutions must add agility and efficiency to an organization – regardless of size or market – as well as secure its digital assets.

One Identity now delivers log management as part of its recent acquisition of Balabit who has been leading the log management market since 1998. In addition One Identity offers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation. Let us help you get log management and IAM right.

syslog-ng at a glance

More than a million users worldwide trust syslog-ng to deliver log data from across their IT environments




Log management appliance

syslog-ng Store Box™ (SSB) is a high performance, high reliability log management appliance that builds on the strengths of syslog-ng Premium Edition.

With SSB, you can collect and index log data, perform complex searches, secure sensitive information with granular access policies, generate reports to demonstrate compliance, and forward log data to 3rd party analysis tools.

Key Features

  • High Performance
  • Web-based UI
  • Ultra fast search
  • Content-based alerts
  • Granular access control
  • AWS and Azure support


Log management software

syslog-ng Premium Edition delivers the log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, network traffic or any other type of log data, syslog-ng can collect and centralize it. You can remove data silos and gain full-stack visibility of your IT environment.

Key Features

  • Wide platform support
  • Windows client
  • World-class support
  • Secure log store
  • Extended data enrichment
  • Zero message loss


Open Source log management

With sysylog-ng, you can collect logs from any source, process them in real time and deliver them to a wide variety of destinations.

syslog-ng allows you to flexibly collect, parse, classify, and correlate logs from across your infrastructure and store or route them to log analysis tools.

Getting started is easy.

Key Features

  • Customizable and extensible
  • Extensive documenation
  • Continuous development
  • Active community support
  • Easy to learn syntax
  • Versatile



Optimizing SIEM

Security Information and Event Management (SIEM) solutions form the core of many enterprises’ IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance.

View the product page

Universal log collection and routing

Organizations using multiple analytic tools and storage solutions often use multiple log management tools. syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management.

View the product page

Big data ingestion

Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. syslog-ng can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.

Rapid search and troubleshooting

Whether you need to respond to a security incident, troubleshoot infrastructure issues, or debug applications, searching millions or billions of logs quickly is usually the first step. Having the right log data at the right time easily accessible is critical to your success. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs.

View the product page

Meeting compliance requirements

IT departments increasingly find themselves spending ever more resources on compliance as laws, regulations and industry standards mandate increasing security awareness and the protection of sensitive data. A secure log management solution can help meet compliance requirements. The syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance.

Watch Video

Secure data archive

Securely manage and archive your log data. Log data often contains sensitive information. Personally Identifiable Information (PII),user activity, transactions, and more.

The syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data.

View product page



  +36 1 769 6371



  • Better SIEM performance

Reducing the size and complexity of log data can dramatically improve search times. Using granular policies based on log file types and compliance requirements, retention and detection can be achieved easily and reliably.

  • Higher quality data

Tamper proof, secure logs in their raw format provide legally admissible evidence.

  • Increased confidence in analytics

Being certain that logs aren’t missing or haven’t been tampered with increases the confidence in the results of SIEM.

  • Reduced operating costs

Reducing the number of collection solutions makes log management deployments simpler and more stable reducing operations costs.

  • Lower deployment costs

Deploying syslog-ng as a single log collection and routing tool can eliminate the need for installing multiple collection tools and lengthy, costly integration projects completed by vendors’ professional services teams or external consultants.

  • Lower TCO of log analytics tools

Many log analysis tools license their products based on the amount of data processed. Reducing the amount of data sent to log analysis tools can lower deployment costs.

  • Improved performance

Reducing the size and complexity of log data can dramatically improve search times.