on-demand video modules that aim to build critical security awareness, fostering a proactive and security-conscious workforce to tackle evolving cyber threats … human-related risks, and strengthen the organization's overall security posture. Zinger delivers tailored, organization-specific …
Search Results
Listings (1,451-1,475 of 10,000)
Masking, a Thales product, aims to reduce the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making … simple to protect other sensitive data including Personally Identifiable Information (PII).
network access control that enhances the Fortinet Security Fabric, FortiNAC delivers visibility, control, and automated response for everything that connects … control to third-party network devices, and orchestrates automatic response to a wide range of network events. … FortiNAC is a…
provide intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. It also helps … loss through identifying and preventing risky or inappropriate sharing, transfer, or use of sensitive data on endpoints, apps, and …
student management applications including BehaviorWatch student event (e.g. grades) management application, the Teachers2Parents secure text and communication … the SchoolMoney payment or tuition processing app, and finally the modular task scheduling and management application SchoolPod. &he…
offers an advanced security operations center (ASOC) suite, providing SIEM functionality as well as vulnerability management, and preemptive advanced
combines log management, SIEM, and network behavior anomaly detection (NBAD), into a single integrated end-to-end network security management solution. The … Analytics (JSA) is a network security management platform that facilitates the comparison of data from the broadest set of devices and …
Huntsman Security, an Australian company offers the Huntsman Enterprise SIEM security platform, designed to provide a complete SIEM solution with a built-in
in Cambridge, provides big data analytics capabilities to machine data and security operations. … applications: Security Operations and Service Operations. The Security Operations application offers a cloud-based Security Incident and Event Management (SIEM) … license, multiple uses: M…
the Securonix Next-Generation SIEM deployment, combining log management as well as user and entity behavior analytics (UEBA), for a complete SOC solution
fix. Trellix Helix integrates disparate security tools and augments them with advanced SIEM, Orchestration, and threat intelligence capabilities to capture … Trellix Helix (formerly FireEye Helix) is a cloud-hosted security operations platform that allows organizations to take control of any …
Organizations can use Logsign to improve their security posture and ensure compliance with relevant regulations and standards. … Platform integrates SIEM, threat intelligence, UEBA, and SOAR, helping organizations to optimize and streamline their cybersecurity operations. In addition ……
thats help users search, analyze, visualize and act on data. The service can go live in as little as two days, and with an IT backend managed by Splunk experts … thats help users search, analyze, visualize and act on data. The service can go live in as little as two days, and with an IT backe…
SIEM delivers log management, retention, and analytics services in a simplified cloud form. It aims t o eliminate traditional deployment and administration … simple throughput-based licensing model, to make high-quality SIEM quick and easy to acquire without sacrificing capability or power. &…
A combined SIEM and SOAR, used to accelerate threat detection and response with holistic security analytics, native SOAR, and intelligent automation. … A combined SIEM and SOAR, used to accelerate threat detection and response with holistic security analytics, native SOAR, and intelligent aut…
Next-Generation SIEM platform. IT is built on Chronicle and GCP analytics engines and is designed to support on-premise and cloud environments.
Splunk Enterprise
software for searching, monitoring, and analyzing machine-generated big data, via a web-style interface. It captures, indexes and correlates real-time data in … repository from which it can generate graphs, reports, alerts, dashboards and visualizations. … find out what is happening in…
SIEM solution with integrated DLP and CASB capabilities that detects, prioritizes, investigates, and responds to security threats. … provides holistic security visibility across on-premises, cloud, and hybrid networks with its intuitive and advanced security analytics and monitoring capabilit…
It's goal is to ease the burden of alert fatigue, complexity of log management and lack of IT visibility. … Blumira’s cloud SIEM platform offers both automated threat detection and response, enabling organizations of any size to more defend against cybersecurity … response to contain a…
LogSentinel SIEM is a security information and event management (SIEM) system boasting simplicity, predictability, and innovation. By leveraging innovations … like blockchain and AI, it aims to help organizations to eliminate their blind spots and reduce the time and cost of incident detectio…
the pains of traditional SIEM with detections-as-code, structured security data, and scalability with zero overhead. … entire environment and dispatch helpful, contextual, and informative alerts. Monitor Logs and AWSSecure AWS environments with custom and out-of-the-box detections … No…
platform that offers a no-code intelligent detection experience to automate a security operation centers' detection engineering workflow. … Enterprise SOC teams to force multiply their ability to detect, investigate, and hunt.
multi-tenancy and RBAC, capabilities that are required to address the needs of large enterprises and service providers. DNIF is platform agnostic and can be deployed … ingest, enrich, store and correlate cybersecurity data at petabyte scales. It is designed to bring the benefits of a SIEM, UE…



