67 resultaten
Waarom Capterra gratis is
Cloud security with cloud partner ecosystem and multi-tenant architecture.
Cloud security with cloud partner ecosystem and multi-tenant architecture.
Cloud security with cloud partner ecosystem and multi-tenant architecture.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation.
Beyond the traditional SIEM solution, TraceAlert includes our Managed Security Operations Center that manages the SIEM 24/7/365. Only true threats will be reported to you for remediation.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Multi-platform logfile data management
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications
Multi-platform logfile data management - across Windows, UNIX/Linux, OpenVMS and IBM i as well as your layered applications

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Collects information from various sources, analyzes security events in real time, records incidents and alerts to them.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents and performs real-time incident reporting. Identifies virus epidemics and separate virus infections, attempts to get unauthorized access to confidential information, errors, and failures in information systems operation, credentials fraud, critical events during the security system operating.
Collects events from event logs of servers and workstations, network active equipment, access control, authentication, antiviruses and virtualization environments. Analyzes data, detects incidents...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.
Delivers actionable intelligence and integrations required for you to prioritize, investigate, and respond to threats.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Een uitgebreide beveiligingsbundel om je te helpen je bedrijf veilig te houden.
Een uitgebreide beveiligingsbundel om je te helpen je bedrijf veilig te houden. Bedreigingsbewaking, bedreigingsreactie, bescherming tegen DDoS-aanvallen en webtoepassing-firewall in één product. PROsecure is intern gebouwd door hun eigen beveiligingsexperts en combineert de nieuwste technologie met interne expertise om ervoor te zorgen dat bedreigingen worden geïdentificeerd, gediagnosticeerd en geneutraliseerd voordat ze een probleem voor je bedrijf worden.
Een uitgebreide beveiligingsbundel om je te helpen je bedrijf veilig te houden. Bedreigingsbewaking, bedreigingsreactie, bescherming tegen DDoS-aanvallen en webtoepassing-firewall in één product. PR...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Security information and event management tool that monitors logs from network hardware/software and detect threats.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends, detect threats, and enable organizations to investigate any alerts.
SureLog SIEM collects security data from network devices, servers, domain controllers, and more. SureLog SIEM stores, normalizes, aggregates, and applies analytics to that data to discover trends,...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Bekijk hoe Devo je kan helpen de workflow van je SOC, van detectie tot respons, op één platform te organiseren.
Devo Security Operations is de eerste oplossing die kritieke beveiligingsmogelijkheden combineert met automatische verrijking, bedreigingsinformatie, samenwerking binnen de gemeenschap, een centrale bewijsvergrendeling en een gestroomlijnde analistenworkflow, waardoor beveiligingsanalisten effectiever worden en het beveiligingscentrum wordt getransformeerd. Gebouwd op het Devo-platform, bieden analisten realtime toegang tot alle standaard en niet-standaard veiligheidsrelevante gegevens in de hele omgeving, sneller en goedkoper dan ooit tevoren.
Devo Security Operations is de eerste oplossing die kritieke beveiligingsmogelijkheden combineert met automatische verrijking, bedreigingsinformatie, samenwerking binnen de gemeenschap, een centrale...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
SIEM software solution with features such as log management, incident management, and threat detection response.
SIEM software solution with features such as log management, incident management, and threat detection response.
SIEM software solution with features such as log management, incident management, and threat detection response.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour
Huntsman Security¿s Next Gen SIEM is a cyber security analytics product with built-in threat intelligence and user entity behaviour

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Our vision is to turn the world's business data into information. Our mission is to become the market leader in observability.
Observe is a SaaS Observability product which enables SRE and DevOps teams to investigate modern distributed applications 10x faster. Observe ingests anything with a timestamp - logs, metrics, traces - and then structures that data to provide unique insights such as inventories of containers, pods, EC2 instances, S3 buckets etc as well as the relationships between them. This enables engineers to troubleshoot issues top down instead of immediately diving into logs and searching.
Observe is a SaaS Observability product which enables SRE and DevOps teams to investigate modern distributed applications 10x faster. Observe ingests anything with a timestamp - logs, metrics, traces...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
The future of Cyber Defense warfare. Easy to use localized console with toolkit for new and expert users.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential. Payment schedules are flexible.
S.O.A.R (SIEM Orchestration Automation Response) PURVEYOR (SasS) The Cyber Defense Console and Toolkit. Supported by Counterveils Managed and Unmanaged XDR Platform offers limitless potential. Payme...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Threat Intelligence and security automation solution.
Threat Intelligence and security automation solution.
Threat Intelligence and security automation solution.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM)
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Azure Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance.
Microsoft Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.
Integrated security platform designed to help businesses monitor threats, risks and vulnerabilities across apps, networks and more.

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC, 24/7 Cybersecurity with our Cyber Watch Portal
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC, GDPR,FFIEC & SIEM Only Cytellix monitors network security, analyzes network firewalls, cloud security and creates insights using automated behavioral analytics and artificial intelligence to protect, detect, respond and recover against cyber threats. Watching over every connection, user, action and device. In real time. In our 24/7 cybersecurity soc without fail.
Following cyber certification and compliance for: NIST 800-171, DFARS 7012, CMMC, GDPR,FFIEC & SIEM Only Cytellix monitors network security, analyzes network firewalls, cloud security and creates...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren
Tanzu Observability enables DevOps teams to troubleshoot and resolve application production issues quickly and cost-effectively.
Tanzu Observability is an enterprise observability platform that provides full-stack visibility for modern applications running on any cloud. It enables development, SRE and DevOps teams to quickly identify and troubleshoot performance issues by securely and reliably providing granular visibility into containerized applications and cloud infrastructure.
Tanzu Observability is an enterprise observability platform that provides full-stack visibility for modern applications running on any cloud. It enables development, SRE and DevOps teams to quickly...

Functies

  • Logboekbeheer
  • Gedragsanalyse
  • Realtime controle
  • Toepassingsbeveiliging
  • Dreigingsanalyse
  • Gebruikersactiviteit controleren