- Developer
- Dataland Software
Web analytics without constraints
- Drill-down all the way to individual hits
- Interactively change filters
- Browse through reports
- Optional Hybrid analysis for even more information
- See technical details not available in JavaScript analytics
- Investigate hackers and malicious scripts
- You own the data, no third-party collection
Analyze web server log files like never before!
Web Log Analytics to the next level
Web Log Storming is an
interactive web server log file analyzer (
IIS,
Apache and
Nginx) for Windows that
fills the gap between JavaScript web analytics and old-school log analyzers. This makes it an
ideal solution that gives you an insight about both,
marketing and technical aspects of web statistics.
Who is it for?
JavaScript based analytics solutions give you almost
solely marketing information. Web Log Storming is perfect (single or additional) tool for those who are interested in more. It adds a value for
web administrators,
tech and security specialists,
web developers and
small business owners responsible for multiple areas of operations, including server maintenance.
Hybrid analysis (optional)
Enjoy
benefits from both worlds by including HTML tags for
combined log files and JavaScript statistics. Script and data are kept on
your server only - no third-party collecting.
Interactively change filters
Quickly focus on
specific groups of visitors, based on almost any data available in log files (
view screenshot)
Drill-down into details
See
individual visitor's details and the list of visited pages and files (
view screenshot)
Browse through reports
Use it simply by
clicking report items, as easy as browsing a web (
view video demonstration)
Using Cookies and JavaScript not mandatory
It's up to you if you wish to use advanced JavaScript capabilities, allowing you to
comply with privacy laws.
See everything
If it hits your server, it's there: visitors with
disabled JavaScript and blocked
third-party analytics, file
downloads,
errors,
problems,
spiders,
bots,
bandwidth wasters,
hackers and other attackers.