Type your search criteria

explore zorp
the number one multi-purpose proxy gateway
use case

premium edition

Enterprise class log management software
syslog-ng Premium Edition delivers the log data critical to understanding what is happening in your IT environment. Whether it's user activity, performance metrics, network traffic or any other type of log data, syslog-ng can collect and centralize it. You can remove data silos and gain full-stack visibility of your IT environment.

Why do you need api securiy?

request PRICE
use case


contact sales
granular protocol control
Full interpretation and validaton of 20+ network protocols
Connection handling on application layer
Control of protocol channels ( e.g. file transfer, port forward)
comprehensive encryption support
control of SSL / TLS-encrypted protocols
TLS 1.3 cryptography support
use case

use cases

contact sales
Optimizing SIEM

Security Information and Event Management (SIEM) solutions form the core of many enterprises’ IT security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance.syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM.

big data ingestion

Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. syslog-ng can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.

universal log collection and routing

Organizations using multiple analytic tools and storage solutions often use multiple log management tools. syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management.

rapid search and troubleshooting

Whether you need to respond to a security incident, troubleshoot infrastructure issues, or debug applications, searching millions or billions of logs quickly is usually the first step. Having the right log data at the right time easily accessible is critical to your success. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs.

meeting compliance requirements

IT departments increasingly find themselves spending ever more resources on compliance as laws, regulations and industry standards mandate increasing security awareness and the protection of sensitive data. A secure log management solution can help meet compliance requirements. The syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance.

secure data archive

Log data often contains sensitive information - Personally Identifiable Information (PII), user activity, transactions, and more.syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage and granular access controls to protect log data. You can securely manage and archive your log data for long term. The largest appliance can store up to 10TB of raw logs.

use case


download datasheet
secure transfer and storage
Have confidence in the data underlying your analytics, forensics and compliance efforts 

Using local disk buffering, client-side failover and application layer acknowledgement, syslog-ng can transfer logs with zero message loss. Encrypted transfer and storage ensure logs cannot be tampered with, preserving the digital chain of custody.
scalable architecture
Scale up your log management capabilities

Depending on its configuration, one syslog-ng server can collect more than half a million log messages per second from thousands of log sources.

A single central server can collect log messages from more than 5,000 log source hosts. When deployed in a client relay configuration, a single syslog-ng log server can collect logs from tens of thousands of log sources.
flexible log routing
Reduce maintenance and deployment costs with universal collection

syslog-ng can be deployed as an agent on a wide variety of hosts and flexibly route logs to multiple analytic tools or databases, eliminating the need to deploy multiple agents on servers.

Tested binary files for the syslog-ng Premium Edition are available for more than 50 server platforms, reducing the time required for installation and maintenance.
real time transformation
Optimize your tools with distributed processing

With powerful filtering, parsing, re-writing and classification options, syslog-ng can transform logs on remote hosts, reducing the amount and complexity of log data forwarded to analytic tools like SIEM or APM, reducing their total cost of ownership.

The flexible configuration language allows users to construct powerful, complex log processing systems on remote hosts with simple rules.


Benefits of ZORP GPL product

- Comprehensive traffic inspection
- Encrypted channel control
- Content filtering and modification (optional)
- Modular, highly flexible configuration
- Free license and active community support
- Free solution to many unique network security problems

core features

responsive core

Granular configuration options enable
administrators to fully implement
corporate security policies.

open source

Granular configuration options enable
administrators to fully implement
corporate security policies.

high-end protection

Granular configuration options enable
administrators to fully implement
corporate security policies.
use case

iot security

IoT elements are exposed to be attacked permanently, so they need
solid security tools which can cut risks back to as little as possible.
In a world where everything joins networks, even networks too, you
need a tool to make these increased connections organized.
Button Text