Log Sentry from eSentire collects, centralizes and correlates critical event log data from any network-attached asset. Threat analysts rely on Log Sentry to provide informed decision-making and intervention specific to active threats detected by Network Interceptor and Host Interceptor. In certain scenarios, Log Sentry provides primary detection. Log Sentry also provides configuration mechanisms and standard rules, allowing organizations to apply policy-based and compliance monitoring.