Featured software

76 results
Datadog provides an easy-to-use cloud-native SIEM with out-of-the-box security integrations and customizable threat detection rules. Learn more about Datadog
Datadog Security Monitoring, a part of the Datadog Cloud Security Platform, provides robust threat detection for dynamic, cloud-scale environments. With Security Monitoring, you can analyze operationa l and security logs in real time—regardless of their volume—while utilizing curated, out-of-the-box integrations and rules to detect threats. Developers, security, and operations teams can also leverage detailed observability data to accelerate security investigations in a single, unified platform. Learn more about Datadog

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Versatile Log & Event Log Hybrid SIEM solution with Active Directory, Health & Inventory monitoring - supports NIST & CMMC.compliance. Learn more about EventSentry
Hybrid SIEM solution combining real-time (event) log monitoring with FIM, SW/HW inventory and more for an integrated approach to increase network security. Unique security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what's available from raw events. A dynamic release cycle constantly adds features for timely challenges like Ransomware. Learn more about EventSentry

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
EventLog Analyzer brings log management, security auditing, threat detection and mitigation, and compliance management in one console. Learn more about ManageEngine EventLog Analyzer
EventLog Analyzer goes beyond log management to bring together security auditing, threat detection and mitigation and compliance management in one console. With real-time security auditing and end-to-end incident management capabilities, EventLog Analyzer helps organizations to prioritize high-risk security threats and stop cyberattacks. The solution helps organizations overcome network security challenges and strengthen their cybersecurity posture. Learn more about ManageEngine EventLog Analyzer

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic
Sumo Logic is a cloud security analytics platform that provides security intelligence for your microservices, hybrid and multi-cloud environment. Sumo Logic can be your first cloud SIEM, replace your legacy SIEM, or co-exist with your existing SIEM solution. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides continuous intelligence. Learn more about Sumo Logic

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Firewall Analyzer, a log analytics and configuration management software for a complete visibility over entire network security. Learn more about ManageEngine Firewall Analyzer
Firewall Analyzer is an agent less log analytics and configuration management software, which analyzes logs from firewalls and generates real time alert notifications, security and bandwidth reports. The solution is a vendor-agnostic software and supports more than 50 plus firewall vendors. It also empowers administrators by providing comprehensive reports about the security events and in turn they can take steps to mitigate the security. Learn more about ManageEngine Firewall Analyzer

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Log360 is a comprehensive SIEM solution that helps you combat threats on premises, in the cloud, or in a hybrid environment. Learn more about ManageEngine Log360
Log360 is a SIEM solution that helps organizations of all sizes combat threats on premises, in the cloud, or in a hybrid environment. You can customize the solution for your unique use cases by using its threat intelligence, event correlation, file integrity monitoring, and user activity monitoring capabilities. You can monitor activities that occur in your Active Directory, network devices, employee workstations, file servers, Microsoft 365, cloud services and more. Learn more about ManageEngine Log360

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more. New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products. Learn more about Google Cloud

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
JumpCloud’s cloud directory enables internal IT departments, MSPs, VARs/distributors, and DevOps teams to securely and easily enable access to any IT resource, from anywhere. Get insight into activity log data for all of JumpCloud’s endpoints and easily ingest it into SIEM tools for auditing and compliance purposes. Track cross-OS system usage, RADIUS network authentications, LDAP access, SAML SSO usage, and changes made by admins to end-user identities and privileges. Learn more about JumpCloud Directory Platform

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Ingest data from multicloud/on-premises to detect threats with advanced security analytics, ML & threat intelligence.
Splunk SIEM is a comprehensive security analytics platform that gives businesses the insights needed to stay secure and protected. With data-driven insights, businesses can combat threats, protect data, and mitigate risk at scale with analytics they can act on. The platform breaks down data silos, allowing businesses to ingest data from multicloud and on-premises deployments and gather full visibility to quickly detect malicious threats. Learn more about Splunk Enterprise

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time. Learn more about Elastic Stack

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Logz.io is the leading open source-based cloud observability platform.
Logz.io is the leading cloud observability platform that enables engineers to use the best open source tools in the market without the complexity of operating, managing, and scaling them. Logz.io offers three products: Log Management built on ELK, Infrastructure Monitoring based on Grafana, and an ELK-based Cloud SIEM. These are offered as fully managed service designed to help engineers monitor, troubleshoot and secure their distributed cloud workloads more effectively. Learn more about Logz.io

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Graylog is a leading centralized log management solution to capture, store and enable real-time analysis of terabytes of machine data.
Graylog is a leading centralized log management solution for capturing, storing and enabling analysis of petabytes of machine data. Purpose-built for modern log analytics, Graylog removes complexity from data exploration, compliance audits, and threat hunting so you can quickly and easily find meaning in data and take action faster. Select the right log management solution right option to fit your needs: - Graylog Enterprise - Graylog Cloud - Graylog Small Business - Graylog Open Learn more about Graylog

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Sematext gives businesses full-stack visibility by exposing logs, metrics, real user & synthetic data and traces through a single Cloud
Sematext Cloud is an all-in-one observability solution for software-based companies that provides key insights into front-end and back-end performance. Sematext encompasses infrastructure, real user & synthetic monitoring, transaction tracing, and log management. Sematext Cloud also offers flexible app-scoped pricing based on plan, volume, and retention selection, where each App can have a different plan, volume, and retention, giving you lots of control over costs with no overage fees. Learn more about Sematext Cloud

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Enable capabilities such as endpoint protection, SIEM, vulnerability management, threat hunting, and more all within one console.
EventTracker, our flagship managed security platform, is architected to scale with organizations of any size and any stage of maturity. Whether you need a targeted supplement to your existing capabilities and staff or a complete outsourced solution, the EventTracker platform is uniquely customizable to your needs. EventTracker's “snap-in” architecture lets you enable capabilities such as endpoint protection, SIEM, vulnerability management, threat hunting, and more all within one console. Learn more about Netsurion Managed Threat Protection

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms.
Intelligent solution that monitors your network in order to detect and prioritize threats through machine learning and AI algorithms. Learn more about IBM Security QRadar

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM tool that monitors logs, detect and prevent breaches with predefined corelations and alerts.
SureLog Security Information and Event Management (SIEM) platform analyzes log event data in real time to detect and prevent security attacks. By consolidating events from all log sources, SureLog correlates and aggregates events into normalized alerts to spot cyber security threats and instantly notifies your IT & security teams. SureLog SIEM is available on premises and in a cloud environments Learn more about Surelog

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Full featured, all-in-one SIEM solution for both on-premises and cloud businesses. Threat Intelligence built-in, cost effective SIEM.
Logsign is a Security Information and Event Management (SIEM) solution which provides security analyses and compliance to regulations on a single platform. Founded in 2010, Logsign believes that cyber security is a teamwork and that security products have to be much smarter. With this conviction, it focused its endeavours on Security Intelligence and SOC solutions. It actively provides services for more than 500 medium and large scale firms and governmental agencies. Learn more about Logsign

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Learn more about USM Anywhere

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of
Unify SIEM, endpoint security, and cloud security Elastic Security modernizes security operations — enabling analytics across years of data, automating key processes, and bringing native endpoint security to every host. Elastic Security equips teams to prevent, detect, and respond to threats at cloud speed and scale — securing business operations with a unified, open platform. Learn more about Elastic Security

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
A log data management solution that centrally records and manages logs of various IT systems with unique log translation technology.
The "ALog series", which has been installed with more than 5,100 contracts in Japan and overseas, is a log data management solution that centrally records and manages logs of various IT systems. With the motto "Make difficult security easy", there are many features that help log utilization, such as unique log translation technology, abundant report templates, and detection of internal fraud by AI. With these technologies, you can realize advanced log utilization without specialized knowledge. Learn more about ALog Series

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats. Learn more about ArcSight

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Blumira’s detection and response platform helps organizations of all sizes stop ransomware attacks and prevent data breaches.
Blumira’s detection and response platform helps organizations of all sizes quickly stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Blumira’s free edition allows you to gain visibility into your Microsoft 365 environment within minutes. Learn more about Blumira

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Logpoint's SIEM+SOAR & UEBA platform helps businesses protect their infrastructure from breaches & efficiently respond to cyberattacks
Logpoint is the creator of a reliable, innovative cybersecurity operations platform — empowering organizations to thrive in a world of evolving threats. By combining sophisticated technology and a profound understanding of customer challenges, Logpoint bolsters security teams’ capabilities while helping them combat current and future threats. Logpoint offers SIEM, UEBA, SOAR and SAP security technologies converged into a complete platform that efficiently detects and respond to threats. Learn more about LogPoint

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM solution that helps businesses with performance, security, and availability monitoring to detect and remediate security threats.
SIEM solution that helps businesses with performance, security, and availability monitoring to detect and remediate security threats. Learn more about FortiSIEM

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Managed security platform that includes monitoring and management of security infrastructure around the clock.
SilverSky Managed Security Services monitors and manages your UTM devices, servers and endpoints around the clock giving you peace of mind that your devices are continually updated and patched and your organization is monitored by our expert Security Operations Center analysts. SilverSky is uniquely qualified to help small and mid-sized businesses in regulated industries meet their security and compliance needs. Learn more about SilverSky Managed Security Services

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Security Information & Event Management (SIEM) designed exclusively for MSSPs. Complete SIEM, 24/7 SOC and multi-tenancy set up.
Vijilan is a security monitoring company that alerts IT organizations and Managed Services Providers (MSPs) when a potential security breach taking place in their organization or customers environment . Vijilan's continuous monitoring operates in Aventura, Florida and includes threat detection and response in near real-time. Vijilan delivers the technologies, processes, and people as a service primarily through Managed Service Providers (MSPs). SIEM-SOC-IRT as one product. Learn more about Vijilan

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more.
Cybersecurity management tool that helps businesses detect & overcome cyber threats through machine-based analytics, UEBA & more. Learn more about LogRhythm Log Management

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Full-functioned, yet affordable, SIEM virtual appliance for real-time log management, operational troubleshooting and compliance.
Delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-deploy virtual appliance. Security Event Manager automates and simplifies the complex task of security management, operational troubleshooting, and continuous compliance, enabling IT pros to immediately identify and re-mediate threats and vital network issues before critical systems and data can be exploited. SIEM software has never been easier to use or more affordable to own! Learn more about Security Event Manager

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Software that provides a unified view of service delivery, availability, performance and security of IT applications.
ServicePilot monitoring software enables faster resolution of IT incidents. This intelligent observability platform collects and analyzes metrics, traces and logs to improve application performance and prevent IT failures. It also unifies monitoring and breaks down silos to ensure continuity of services and IT infrastructure. Learn more about ServicePilot

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Behavioural analysis tool to detect weak signals & anomalies in information systems using forensics & extensive research algorithms.
SaaS on-premise behavioural analysis engine to detect weak signals & anomalies in information systems using forensics & extensive research algorithms. Learn more about Reveelium

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
GorillaStack helps to automate real-time security remediation, managing backup lifecycles, and optimize cloud bills.
GorillaStack is a SIEM software to get real time alerts and automate remediation for security. With automation, you can achieve compliance and governance across AWS and Azure Cloud easily. GorillaStac k can also help to reduce your cloud bills and manage backups reliably. Learn more about GorillaStack

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
JupiterOne is a cloud-native security platform providing visibility security and governance to your entire cyber asset environment.
With JupiterOne, teams discover, monitor, understand, and act to secure their entire digital environment. Cloud resources, ephemeral devices, identities, ownerships, access, code, pull requests, and much more are collected, graphed, and analyzed automatically by JupiterOne. JupiterOne creates a contextual knowledge-base using graphs and relationships as the single source of truth for an organization’s security and infrastructure operations. Learn more about JupiterOne

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM solution that helps businesses send and receive real-time information regarding malicious hosts across networks.
SIEM solution that helps businesses send and receive real-time information regarding malicious hosts across networks. Learn more about AlienVault OSSIM

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
A horizontally scalable SIEM solution that lets you handle structured-unstructured logs, query faster and perform high speed analytics.
DNIF deploys pre-built SIEM rules to detect known attacks effortlessly. It learns from trend profiles to handle unknown attacks. It augments your existing SIEM with automation and capacity. It builds logic to detect any deviation in the wild and identifies cause using machine learning models designed to attribute risk. It can ingest logs from all types of devices. All components are designed to scale up and down seamlessly without breaking operations either by load balancing or by clustering. Learn more about DNIF HYPERCLOUD

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure.
Enginsight uses leading-edge IT architecture to provide an innovative, autonomous IT security & monitoring solution for the entire IT infrastructure. It covers the entire process from network analysis and vulnerability testing to automated penetration testing and concrete action for the admin. All data is monitored LIVE, supported by neural networks (AI), so that the admin always has control over the security of the entire system with a minimum of time. Learn more about Enginsight

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Self-learning Platform to Defend Against Cyber Attacks
MixMode is a no-rules-required Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. MixMode delivers a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses. This is accomplished in real-time, across any cloud or on-premise data stream. Learn more about MixMode

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SOC Prime TDM is a cross-platform SaaS community offering threat detection content that is easily convertible to various SIEM formats.
SOC Prime Threat Detection Marketplace® (TDM) is a SaaS content platform that aggregates over 65,000 SIEM & EDR rules, parsers and search queries, Snort and YARA rules designed to work directly in the company¿s preferred SIEM environment, including Microsoft Azure Sentinel, Sumo Logic, Humio, the Elastic Stack, Splunk, ArcSight, QRadar, and more. TDM also delivers content using Sigma, a generic signature format, which can be used across various SIEM systems and streamed via an API on the fly. Learn more about Threat Detection Marketplace

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM)
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance. Learn more about Microsoft Sentinel

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools.
Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products. Out-of-the-box use case coverage repeatedly delivers successful outcomes. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find. Learn more about Exabeam

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches.
InsightIDR is your threat detection & response solution. Find & respond to all of the top attack vectors behind breaches: phishing, malware, and the use of stolen passwords. InsightIDR natively collects data from your endpoints, security logs, & cloud services. Apply user and attacker behavior analytics to your data to find intruder activity at each step of the attack chain. Unify your security data. Detect before things get critical. Respond 20x faster with visual investigations & automation. Learn more about InsightIDR

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require.
Event Manager is a cybersecurity insight and response platform that ensures critical events get the attention they require. Events are translated into an easy-to-interpret format, and critical events are separated from the noise in real time. This enables security analysts to act quickly and decisively, even without specialized knowledge of every technology in your environment. A full audit trail makes it easy to meet compliance requirements. Learn more about Event Manager

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats. Learn more about McAfee SIEM

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Panther Labs provides a highly scalable and refreshingly practical platform for threat detection and response.
Panther Labs was founded by a team of veteran security practitioners who faced the challenges of security operations at scale and set out to build a platform to solve them. The result is Panther, a refreshingly practical platform for threat detection and response powered by a highly scalable security data lake and detection-as-code. Panther gives security teams the power to detect any breach, anywhere and is trusted by customers like Snowflake, Dropbox, Zapier, and more. Learn more about Panther

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM solution that helps organizations identify, investigate and resolve threats.
SIEM solution that helps organizations identify, investigate and resolve threats. Learn more about Enterprise Security Manager

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations.
EDR solution that enables your to monitor and record activity across your endpoints to accelerate incident response and investigations. Learn more about NetWitness

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
CybrHawk SIEM ZTR provides all the critical tools: IDS, machine learning, Multi Cloud, MDR, EDR, and Threat Hunting.
CybrHawk SIEM ZTR provides all the critical tools: IDS, intelligence risk, behavior, machine learning, cloud info, MDR, EDR, and Threat Hunting. The goal is to provide the entire enterprise with full and total control systems and is the only SIEM in the market that offers Memory Injection in its platform. On the first day, the organization inherits ready-to-use tracking software. Advanced Visibility. Learn more about Cybrhawk SIEM ZTR

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
SIEM/FIM that collect, aggregates, indexes and analyzes security data, helping organizations detect intrusions and threats.
The WatchWave Platform conduct full analyzes and act as a focal point for data received from the WatchWave agents, processing events trough decoders and rules, and using next generation threat intelligence to look for latest released IOCs (Indicators Of Compromise) WatchWave provides a complete view of all the relevant data from the organization's systems, devices, and their interactions with real-time security insights for immediate action that scales the resources and reduces exposure to risk. Learn more about WatchWave

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
All-in-one unified threat management platform that aims to simplify cybersecurity and reduce its cost.
UTMStack provides complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated and report to a central database: 1. Log Management (SIEM) 2. Vulnerability Management 3. Access Rights Auditor 4. Incident Response 5. HIPS/NIPS, Endpoint Protection 6. Dark Web Monitoring You can monitor almost any cloud environment or SaaS application with ready to use Integrations. UTMStack is currently integrated with Azure, AWS, etc. Learn more about UTMStack

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
A security-as-a-service platform that manages, detects, and responds to threats using technology monitored by SECNAP's 24x7 SOC.
CloudJacketX managed security-as-a-service platform combines ongoing network security assessments with managed detection and response (MDR) services, an advanced SIEM solution, and a patented intrusion detection and prevention system (IDS/IPS), all supported by real-time response from 24/7 security operations centers (SOCs). Learn more about CloudJacketX

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs
Best-in-class bot and fraud management solutions for organizations that require rapid deployment and strict privacy compliance.
hCaptcha offers unparalleled machine learning-powered bot and fraud management solutions to protect online properties from sophisticated, automated attacks. hCaptcha maintains broad privacy and security compliance for its customers and their end-users while leveraging a rapidly deployable, modern, and scalable architecture to deliver security with minimal friction. Learn more about hCaptcha

Features

  • Log Management
  • Behavioural Analytics
  • Real Time Monitoring
  • Application Security
  • Threat Intelligence
  • Endpoint Management
  • Event Logs