51 results
Why Capterra is free
SOC Prime TDM is a cross-platform SaaS community offering threat detection content that is easily convertible to various SIEM formats. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that aggregates over 65,000 SIEM & EDR rules, parsers and search queries, Snort and YARA rules designed to work directly in the company¿s preferred SIEM environment, including Microsoft Azure Sentinel, Sumo Logic, Humio, the Elastic Stack, Splunk, ArcSight, QRadar, and more. TDM also delivers content using Sigma, a generic signature format, which can be used across various SIEM systems and streamed via an API on the fly. Learn more about Threat Detection Marketplace
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that aggregates over 65,000 SIEM & EDR rules, parsers and search queries, Snort and YARA rules designed to work directly in the ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Datadog can detect threats in real time and investigate security signals across your infrastructure, applications, and network. Learn more about Datadog Cloud Monitoring
Datadog Security Monitoring can detect threats in real time and investigate security signals across your infrastructure, applications, and network. Datadog provides out-of-the-box threat detection & security analytics solutions based on the full set of monitoring data from more than 400+ turn-key, vendor-supported integrations. Datadog analyzes all of your data without the cost of indexing and retaining everything, so you can detect threats across the full stream of ingested observability data. Learn more about Datadog Cloud Monitoring
Datadog Security Monitoring can detect threats in real time and investigate security signals across your infrastructure, applications, and network. Datadog provides out-of-the-box threat detection & se...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Real-Time Log & Event Log Hybrid SIEM monitoring solution with Active Directory, System Health, inventory & network monitoring. Learn more about EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & cor...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance. Learn more about Security Event Manager
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Security Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Learn more about Security Event Manager
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Security Event Manager automates and simplifies the comple...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
EventLog Analyzer is a network security tool that brings together threat detection and compliance management in one console. Learn more about EventLog Analyzer
EventLog Analyzer is a network security tool that brings together threat detection and compliance management in one console. It can correlate disparate events happening across your network. It has a built-in threat intelligence and incident management platform, offers predefined audit reports to track activity happening in databases, web servers, Windows devices, network perimeter devices, etc. It also assists in meeting compliance regulations such as the PCI DSS, SOX, HIPAA, FISMA, and GDPR. Learn more about EventLog Analyzer
EventLog Analyzer is a network security tool that brings together threat detection and compliance management in one console. It can correlate disparate events happening across your network. It has a bu...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
Sumo Logic is a cloud security analytics platform that provides security intelligence for your microservices, hybrid and multi-cloud environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
Sumo Logic is a cloud security analytics platform that provides security intelligence for your microservices, hybrid and multi-cloud environment. Sumo Logic can be your first cloud SIEM, replace your l...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Trusted by 92 of the fortune 100, Splunk helps you investigate, monitor, analyze, and act on all of your organizations data. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the data-to-everything platform that enables you to take action in real-time. With Splunk, you can predict and prevent IT problems, streamline your entire security stack, minimize unplanned downtime, and explore and visualize business processes for increased transparency all in one platform. Learn more about Splunk Enterprise
Trusted by 92 of the fortune 100, Splunk is a customizable data analytics platform that empowers you to investigate, monitor, analyze and act. From IT to security to business operations, Splunk is the ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. T...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
SaaS based solution that assists with data visualization through live presentations, KPIs, heatmaps, waffle charts and more.
Elasticsearch is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Beats make up the "Elastic Stack" developed by Elastic. Hosted Elasticsearch (Elastic Cloud) is also provided.
Elasticsearch is a distributed, RESTful search and analytics engine based on Apache Lucene, capable of storing data, and search it in near real time. Elasticsearch, Logstash, Kibana and Beats make up t...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages us...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Gain actionable security intelligence with greater visibility and aggregation of events across your entire network.
SIEM can help your organization reduce risk and improve operational efficiency by automating the steps required by various industry regulations and mandates. With our combined SIEM, log management, and SOC capabilities, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit-ready reports to help with PCI DSS, HIPAA, ISO 27001, NIST 800-171, DoD, RMF, GDPR, and other compliance requirements.
SIEM can help your organization reduce risk and improve operational efficiency by automating the steps required by various industry regulations and mandates. With our combined SIEM, log management, an...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Full featured, all-in-one SIEM solution for both on-premises and cloud businesses. Threat Intelligence built-in, cost effective SIEM.
Logsign is a Security Information and Event Management (SIEM) solution which provides security analyses and compliance to regulations on a single platform. Founded in 2010, Logsign believes that cyber security is a teamwork and that security products have to be much smarter. With this conviction, it focused its endeavours on Security Intelligence and SOC solutions. It actively provides services for more than 500 medium and large scale firms and governmental agencies.
Logsign is a Security Information and Event Management (SIEM) solution which provides security analyses and compliance to regulations on a single platform. Founded in 2010, Logsign believes that cyber ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Security management platform offering fully integrated security controls for threat detection and compliance management.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats.
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the O...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms.
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms.
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Log360 is an integrated and cost-efficient SIEM solution for threat detection and compliance for on-premises and cloud environments.
Log360 is a comprehensive SIEM solution that helps enterprises of all sizes combat threats and mitigate attacks with its threat intelligence, event correlation, file integrity monitoring, network device auditing and user activity monitoring capabilities. On-premises, cloud, or both - Log360 has it covered. It is simple to deploy, has a centralized console to manage multiple environments, and licensed based on the pay only for what you use model.
Log360 is a comprehensive SIEM solution that helps enterprises of all sizes combat threats and mitigate attacks with its threat intelligence, event correlation, file integrity monitoring, network devic...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
SIEM tool that monitors logs, detect and prevent breaches with predefined corelations and alerts.
SureLog Security Information and Event Management (SIEM) platform analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog correlates and aggregates events into normalized alerts to spot cyber security threats and instantly notifies your IT & security teams. SureLog SIEM is available on premises and in a cloud environments
SureLog Security Information and Event Management (SIEM) platform analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog corr...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Sematext gives businesses full-stack visibility by exposing logs, metrics, real user & synthetic data and traces through a single Cloud
Sematext Cloud is an all-in-one observability solution for software-based companies that provides key insights into front-end and back-end performance. Sematext encompasses infrastructure, real user & synthetic monitoring, transaction tracing, and log management. Sematext Cloud also offers flexible app-scoped pricing based on plan, volume, and retention selection, where each App can have a different plan, volume, and retention, giving you lots of control over costs with no overage fees.
Sematext Cloud is an all-in-one observability solution for software-based companies that provides key insights into front-end and back-end performance. Sematext encompasses infrastructure, real user & ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
A horizontally scalable SIEM solution that lets you handle structured-unstructured logs, query faster and perform high speed analytics.
DNIF deploys pre-built SIEM rules to detect known attacks effortlessly. It learns from trend profiles to handle unknown attacks. It augments your existing SIEM with automation and capacity. It builds logic to detect any deviation in the wild and identifies cause using machine learning models designed to attribute risk. It can ingest logs from all types of devices. All components are designed to scale up and down seamlessly without breaking operations either by load balancing or by clustering.
DNIF deploys pre-built SIEM rules to detect known attacks effortlessly. It learns from trend profiles to handle unknown attacks. It augments your existing SIEM with automation and capacity. It builds l...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require.
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Events are translated into an easy-to-interpret format, and critical events are separated from the noise in real time. This enables security analysts to act quickly and decisively, even without specialized knowledge of every technology in your environment. A full audit trail makes it easy to meet compliance requirements.
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Events are translated into an easy-to-interpret format, and critical events ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Security management and operations platform with detection, analytics, and response capabilities.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smart...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collect...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
SIEM solution that helps businesses with performance, security, and availability monitoring to detect and remediate security threats.
SIEM solution that helps businesses with performance, security, and availability monitoring to detect and remediate security threats.
SIEM solution that helps businesses with performance, security, and availability monitoring to detect and remediate security threats....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Security Information and Event Management solution that helps security teams detect cyber threats and accelerate incident response.
Security Information and Event Management solution that helps security teams detect cyber threats and accelerate incident response.
Security Information and Event Management solution that helps security teams detect cyber threats and accelerate incident response....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, Threat Hunting and memory injection.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, Threat Hunting and memory injection detection. The goal is to provide the en...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
SIEM/FIM that collect, aggregates, indexes and analyzes security data, helping organizations detect intrusions and threats.
The WatchWave Platform conduct full analyzes and act as a focal point for data received from the WatchWave agents, processing events trough decoders and rules, and using next generation threat intelligence to look for latest released IOCs (Indicators Of Compromise) WatchWave provides a complete view of all the relevant data from the organization's systems, devices, and their interactions with real-time security insights for immediate action that scales the resources and reduces exposure to risk.
The WatchWave Platform conduct full analyzes and act as a focal point for data received from the WatchWave agents, processing events trough decoders and rules, and using next generation threat intellig...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Automate threat detection and response with Blumira's cloud SIEM. Get end-to-end detection & response in one easy-to-use platform.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It eases the burden of alert fatigue, complexity of log management and lack of IT visibility. Blumira's cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto &more.
Blumira's end-to-end platform offers both automated threat detection and response, enabling organizations of any size to more efficiently defend against cybersecurity threats in near real-time. It ease...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
LogPoint

LogPoint

(0 reviews)
SIEM platform that helps businesses protect data from intrusions & respond/report on cyberattacks in compliance with regulatory norms.
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are displayed in easy to manage dashboards that can be configured based on the specific roles and responsibilities of each user.
The LogPoint SIEM solution intelligently extracts events and incidents from the billions of logs existing in any IT infrastructure of any size. Filtered and carefully correlated real-time results are d...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Snare

Snare

(0 reviews)
SIEM and log monitoring software suite with centralized log collection, real-time alerting, security and forensic analysis tools.
The Snare suite of security and compliance products range from small footprint, highly effective device and network logging and log-management tools through to advanced IT infrastructure threat protection solutions. Originally developed by former Australian defence IT personnel, the Snare advanced threat intelligence suite is used by thousands of organisations around the world for real-time monitoring of IT infrastructure.
The Snare suite of security and compliance products range from small footprint, highly effective device and network logging and log-management tools through to advanced IT infrastructure threat protect...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Network security solution that provides MSSPs with advanced vulnerability correlation and real-time attack visualization capabilities.
Network security solution that provides managed security service providers with advanced vulnerability correlation and real-time attack visualization capabilities.
Network security solution that provides managed security service providers with advanced vulnerability correlation and real-time attack visualization capabilities....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting.
Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting.
Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Makes it easier to identify and respond to suspicious activity by proactively correlating security events and managing logs.
Software-based solution suite that makes it easier to identify and respond to network attacks and suspicious activity by proactively correlating security events and managing logs.
Software-based solution suite that makes it easier to identify and respond to network attacks and suspicious activity by proactively correlating security events and managing logs....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Ropig

Ropig

(0 reviews)
For SaaS developers: stop being interrupted by alerts. Events are prioritized and filtered to your preferences.
For SaaS developers: stop being interrupted by alerts. Events are prioritized and filtered to your preferences.
For SaaS developers: stop being interrupted by alerts. Events are prioritized and filtered to your preferences....
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive f...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
The Control and Supervision Center managed by ITrust, aims to supervise all or part of an organisation's security.
The SOC set up and/or operated by ITrust makes it possible to optimize your cyber-protection while ensuring the availability of your services at the best possible cost, while respecting the regulatory framework in terms of compliance. Thus the graphical interface, clear and customizable, allows the user to have a precise vision of what is happening and to supervise all the security of servers, routers, applications, databases, websites....
The SOC set up and/or operated by ITrust makes it possible to optimize your cyber-protection while ensuring the availability of your services at the best possible cost, while respecting the regulatory ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
STORM powered by OTRS - designed for IT security teams so they can effectively respond to attacks and exchange security information.
STORM supports the work of CERTs, SOCs, Cyber Defense Centers and internal IT security teams. It allows them to handle, manage and evaluate security incidents by adding structure and process to incident communication. STORM offers sophisticated templates for security processes, such as security incident management, an engaged OTRS Cyber Security Community and a carefully compiled bundle of functions for security-critical workflows.
STORM supports the work of CERTs, SOCs, Cyber Defense Centers and internal IT security teams. It allows them to handle, manage and evaluate security incidents by adding structure and process to inciden...
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites
Security Scanner for Wordpress Installations to test vulnerabilities using custom technology to check Wordpress websites...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Manage security operations from end to end, never miss an alert and respond with speed and precision.
Siemplify, the leading independent security orchestration, automation and response (SOAR) provider, is redefining security operations for enterprises and MSSPs worldwide. The Siemplify platform is an intuitive workbench that enables security teams to manage their operations from end to end, respond to cyberthreats with speed and precision, and get smarter with every analyst interaction.
Siemplify, the leading independent security orchestration, automation and response (SOAR) provider, is redefining security operations for enterprises and MSSPs worldwide. The Siemplify platform is an i...
Securonix Next-Generation SIEM: Harness the Power of Big Data Using Machine Learning. (Next-Gen SIEM, UEBA and Security Data Lake)
Built on big data, Securonix Next-Generation SIEM combines log management, user and entity behavior analytics (UEBA), and security incident response into a complete, end-to-end security operations platform. It collects massive volumes of data in real-time, uses patented machine learning algorithms to detect advanced threats, and provides artificial intelligence-based security incident response capabilities for fast remediation.
Built on big data, Securonix Next-Generation SIEM combines log management, user and entity behavior analytics (UEBA), and security incident response into a complete, end-to-end security operations plat...
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation....
Multi-platform logfile data management
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Collects information from various sources, analyzes security events in real time, records incidents and alerts to them.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents and performs real-time incident reporting. Identifies virus epidemics and separate virus infections, attempts to get unauthorized access to confidential information, errors, and failures in information systems operation, credentials fraud, critical events during the security system operating.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents and ...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats....
A comprehensive security bundle to help you keep your business safe.
A comprehensive security bundle to help you keep your business safe. Threat monitoring, threat response, DDoS attack protection and web application firewall (WAF) in one product. Built in house by our security experts, PROsecure combines the latest technology with in-house expertise to ensure that threats are identified, diagnosed and neutralised before they become a problem for your business.
A comprehensive security bundle to help you keep your business safe. Threat monitoring, threat response, DDoS attack protection and web application firewall (WAF) in one product. Built in house by ou...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
Panther

Panther

(0 reviews)
Open-source, cloud-native SIEM to continuously detect threats with log data, improve cloud security posture, and power investigations.
Open-source, cloud-native SIEM to continuously detect threats with log data, improve cloud security posture, and power investigations.
Open-source, cloud-native SIEM to continuously detect threats with log data, improve cloud security posture, and power investigations....
Security information and event management tool that monitors logs from network hardware/software and detect threats.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, dete...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring
See how Devo can help orchestrate the workflow of your SOC, from detection to response, in a single platform.
Devo Security Operations is the first solution to combine critical security capabilities with auto enrichment, threat intelligence, community collaboration, a central evidence locker, and a streamlined analyst workflow, making security analysts more effective and helping transform the SOC. Built on the Devo Platform, provide analysts real-time access to all standard and non-standard security-relevant data across the entire environment quickly and more economically than ever before.
Devo Security Operations is the first solution to combine critical security capabilities with auto enrichment, threat intelligence, community collaboration, a central evidence locker, and a streamlined...
  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • User Activity Monitoring