67 results
Filter Results (67)
Pricing Options
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
Australia
Brazil
Canada
Germany
United Kingdom
Ireland
India
Japan
Mexico
United States
Cloud security with cloud partner ecosystem and multi-tenant architecture.
Cloud security with cloud partner ecosystem and multi-tenant architecture.
Cloud security with cloud partner ecosystem and multi-tenant architecture.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Multi-platform logfile data management
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Collects information from various sources, analyzes security events in real time, records incidents and alerts to them.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents and performs real-time incident reporting. Identifies virus epidemics and separate virus infections, attempts to get unauthorized access to confidential information, errors, and failures in information systems operation, credentials fraud, critical events during the security system operating.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
A comprehensive security bundle to help you keep your business safe.
A comprehensive security bundle to help you keep your business safe.
Threat monitoring, threat response, DDoS attack protection and web application firewall (WAF) in one product.
Built in house by our security experts, PROsecure combines the latest technology with in-house expertise to ensure that threats are identified, diagnosed and neutralised before they become a problem for your business.
A comprehensive security bundle to help you keep your business safe.
Threat monitoring, threat response, DDoS attack protection and web application firewall (WAF) in one product.
Built in house by...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Security information and event management tool that monitors logs from network hardware/software and detect threats.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends,...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
See how Devo can help orchestrate the workflow of your SOC, from detection to response, in a single platform.
Devo Security Operations is the first solution to combine critical security capabilities with auto enrichment, threat intelligence, community collaboration, a central evidence locker, and a streamlined analyst workflow, making security analysts more effective and helping transform the SOC.
Built on the Devo Platform, provide analysts real-time access to all standard and non-standard security-relevant data across the entire environment quickly and more economically than ever before.
Devo Security Operations is the first solution to combine critical security capabilities with auto enrichment, threat intelligence, community collaboration, a central evidence locker, and a streamline...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
SIEM software solution with features such as log management, incident management, and threat detection response.
SIEM software solution with features such as log management, incident management, and threat detection response.
SIEM software solution with features such as log management, incident management, and threat detection response.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Observe
(0)
Our vision is to turn the world's business data into information. Our mission is to become the market leader in observability.
Observe is a SaaS Observability product which enables SRE and DevOps teams to investigate modern distributed applications 10x faster. Observe ingests anything with a timestamp - logs, metrics, traces - and then structures that data to provide unique insights such as inventories of containers, pods, EC2 instances, S3 buckets etc as well as the relationships between them. This enables engineers to troubleshoot issues top down instead of immediately diving into logs and searching.
Observe is a SaaS Observability product which enables SRE and DevOps teams to investigate modern distributed applications 10x faster. Observe ingests anything with a timestamp - logs, metrics, traces...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
S.O.A.R
(0)
The future of Cyber Defense warfare.
Easy to use localized console with toolkit for new and expert users.
S.O.A.R (SIEM Orchestration Automation Response)
PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential.
Payment schedules are flexible.
S.O.A.R (SIEM Orchestration Automation Response)
PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential.
Payme...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Evolve
(0)
Threat Intelligence and security automation solution.
Threat Intelligence and security automation solution.
Threat Intelligence and security automation solution.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM)
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance.
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
SIEM
(0)
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Cytellix
(0)
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC,
24/7 Cybersecurity with our Cyber Watch Portal
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC, GDPR,FFIEC & SIEM Only Cytellix monitors network security, analyzes network firewalls, cloud security and creates insights using automated behavioral analytics and artificial intelligence to protect, detect, respond and recover against cyber threats. Watching over every connection, user, action and device. In real time. In our 24/7 cybersecurity soc without fail.
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC, GDPR,FFIEC & SIEM Only Cytellix monitors network security, analyzes network firewalls, cloud security and creates...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring
Tanzu Observability enables DevOps teams to troubleshoot and resolve application production issues quickly and cost-effectively.
Tanzu Observability is an enterprise observability platform that provides full-stack visibility for modern applications running on any cloud. It enables development, SRE and DevOps teams to quickly identify and troubleshoot performance issues by securely and reliably providing granular visibility into containerized applications and cloud infrastructure.
Tanzu Observability is an enterprise observability platform that provides full-stack visibility for modern applications running on any cloud. It enables development, SRE and DevOps teams to quickly...
Features
- Log Management
- Behavioural Analytics
- Real Time Monitoring
- Application Security
- Threat Intelligence
- User Activity Monitoring