|
Comparing SRLM
Features |
SRLM |
NFR NID |
SWATCH |
LogWatch |
Snort |
SHADOW |
SAFEsuite SLM |
Echelog |
|
|
|
|
|
|
|
|
|
Client Utilities: |
|
|
|
|
|
|
|
|
Identify
Logs |
X |
X |
X |
X |
X |
|
X |
X |
Collect
Logs |
X |
X |
X |
|
|
X |
X |
X |
Public
Key |
X |
|
|
|
|
X |
X |
X |
Private
Key |
X |
|
|
|
|
|
X |
X |
Forward |
X |
X |
X |
|
|
X |
X |
X |
Daemon |
X |
X |
X |
|
X |
X |
|
X |
Additional
Hardware* |
|
X |
|
|
|
X |
|
|
Additional
Software* |
|
X |
|
|
|
X |
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Server Utilities: |
|
|
|
|
|
|
|
|
Collect
Logs |
X |
X |
|
|
|
X |
X |
X |
Authenticate |
X |
|
|
|
|
X |
X |
X |
Decrypt |
X |
|
|
|
|
X |
X |
X |
Analyze |
X |
X |
X |
X |
X |
X |
X |
|
Archive |
X |
X |
X |
|
|
X |
X |
X |
Additional
Hardware* |
|
|
|
|
|
|
|
|
Additional
Software* |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Analysis:* |
|
|
|
|
|
|
|
|
Full Log |
X |
X |
X |
X |
|
X |
X |
X |
Header
scan |
|
|
|
|
X |
|
|
|
|
|
|
|
|
|
|
|
|
| |
td>
| |
|
|
|
|
|
Alerts: |
|
|
|
|
|
|
|
|
Audio
Alert |
|
X |
X |
|
X |
|
X |
|
Visual
Message |
X |
X |
X |
X |
X |
X |
X |
|
Generated
Report |
|
X |
|
X |
|
X |
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Framework:* |
|
|
|
|
|
|
|
|
Dedicated
Server |
X |
X |
X |
|
|
X |
X |
X |
Remote
Access |
X |
X |
|
|
|
|
X |
|
Dynamic |
X |
|
|
X |
X |
X |
X |
|
User-defined
filters |
X |
X |
X |
X |
X |
X |
X |
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Compatibility: |
|
|
|
|
|
|
|
|
Win32 |
|
X |
|
|
X |
|
X |
|
Linux |
X |
|
X |
X |
X |
X |
|
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Commercial |
|
X |
|
|
|
|
X |
|
Open
Source |
X |
|
X |
X |
X |
X |
|
X |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Notes: |
|
|
|
|
|
|
|
|
Additional
Hardware is the necessity for some hardware, other than the original
Client/Server system, to perform |
|
Client-side/Server-side actions. |
|
|
|
|
|
Additional
Software (Client) is the necessity for some software, other than the Daemons
running in the background, |
|
to perform Client-side actions. |
|
|
|
|
|
Additional Software (Server) is the necessity for some software, other than the main
program, to execute any part of the |
|
Server-side actions in cryptology, analysis, or
archiving. |
|
|
|
If analysis
includes both Full Log reading and Header scanning, only Full Log is marked
(the header is part of the log). |
Framework
includes both the visual application for the administrator AND the related
network architecture. |
|
|
|
|
|
|
|
|
|
|
|