Cyberoo

Cyberoo

CYBEROO
+
+

Related Products

  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Google Cloud Platform
    60,526 Ratings
    Visit Website
  • HCSS
    364 Ratings
    Visit Website
  • Paladin POS
    24 Ratings
    Visit Website
  • Cloudflare
    1,948 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • EasyDMARC
    188 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website

About

We Are We are CYBEROO. We are Disruptive. We are Expert. We are Trusty. We are the 4 watchtowers that surround your business to protect your information. From our ramparts, we put your business at the center of our mission: simplify your complexity. Cyber Security A new multi-layer security model to defend your business perimeter at 360°. A competent and specialized I-SOC, active 24/7/365. A simple and clear service. Smart monitoring We use artificial intelligence in order to automate the detection of anomalies and to identify their cause. We prevent the inefficiencies in your infrastructure, your services and applications. We reduce the management cost of the above mentioned. Managed Services We offer a vast selection of managed services, in order to let our clients compose their personal offer, based on the needs of their IT infrastructure. We manage and simplify your complexity, 24/7/365.

About

Logsign is a global vendor that specializes in providing comprehensive cybersecurity solutions that enable organizations to enhance their cyber resilience, reduce risk, and streamline security processes while decreasing HR and operational chaos. Logsign consistently offers an efficient, user-friendly, and seamless platform and employs the latest technologies to establish secure, resilient, and compliant environments while providing organizations with comprehensive visibility into their IT infrastructure, enhancing threat detection capabilities, and streamlining response efforts. In today's complex threat landscape, Logsign ensures that businesses have a robust cybersecurity posture in place, proactively safeguarding their systems, data, and digital assets. With a presence on four continents and a customer base of over 600 enterprises and governmental institutions as mentioned by Gartner SIEM Magic Quadrant two years in a row, Logsign also has high ratings on Gartner Peer Insight.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies that need an AI software to detect and repair anomalies in applications and services

Audience

Mid and Large Enterprises, MSSPs

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CYBEROO
Founded: 2008
Italy
cyberoo.com

Company Information

Logsign
Founded: 2010
Netherlands
www.logsign.com

Alternatives

SentryXDR

SentryXDR

Logically

Alternatives

RocketCyber

RocketCyber

Kaseya

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Trend Micro Endpoint Encryption
Trustwave

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Trend Micro Endpoint Encryption
Trustwave
Claim Cyberoo and update features and information
Claim Cyberoo and update features and information
Claim Logsign and update features and information
Claim Logsign and update features and information