Firewall Analyzer for Securepoint

Securepoint Firewall Log Analyzer

With a package of features, Firewall Analyzer's reporting capability for Securepoint firewall appliance fit like a glove enabling you to secure and strengthen Network security. Firewall Analyzer let's you to centrally collect, archive, analyze Securepoint's security device logs and generate forensic reports out of it.

Traffic and Bandwidth Monitoring Reports

Firewall Analyzer for Securepoint provides you an unique way to monitor the bandwidth usage of the network. Firewall Analyzer measures network bandwidth based on the analysis of logs received from Securepoint. Firewall logs are collected, archived, and analyzed to get granular details about bandwidth across Securepoint firewall. You need not deploy any hardware probes or collection agents to get these details on bandwidth.

  • Traffic and Bandwidth Monitoring Reports
  • Traffic and Bandwidth Monitoring Reports
  • Security Reports
  • Security Reports
  • Security Reports

Security Reports

Firewall Analyzer for Securepoint provides instant security reports on viruses, attacks and security breach in your network. These reports instantly show you the viruses active on the network, the hosts that have been affected, and more. With these reports it is easier for IT to do business risk assessment, detect problems and resolve them as soon as they are found.


Apart from exhaustive firewall reports with respect to network security, Firewall Analyzer offers comprehensive alarms and their notifications.

Alarms can be generated for an anomalous security criteria, bandwidth values, and any normal criteria of security interest.

Alarms can be notified via email and SMS. It can trigger a script to achieve various threat mitigation activities. Alarms are also displayed in the UI screen.


Securepoint supported versions

Company Firewall Version Other Log
Securepoint Securepoint UTM Firewalls Available

Why Choose Firewall Analyzer

Unlock the real value of your security devices

  • Supports an extensive array of perimeter security device logs which include firewalls, VPNs, IDS/IPS and proxy servers
  • Provides a wide range of reports for external threat monitoring, change management and regulatory compliance

Attractive TCO and rapid ROI

  • No additional hardware required, minimal entry cost and maintenance inclusive subscription model ensures a low TCO
  • Competitively priced. Quick deployment, instant results, reduced IT overhead ensures rapid ROI

Meet dynamic business needs quickly

  • Rapidly transforms perimeter security device logs into actionable information
  • Generates reports in user friendly formats like PDF and CSV formats

Productivity improvement for IT / MSSP

  • From product deployment to report generation in minutes!
  • Real-time alerts to security events enable IT to respond instantaneously to security threats
A single platter for comprehensive Network Security Device Management