OpenText Security Log AnalyticsOpenText
|
||||||
Related Products
|
||||||
About
Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data.
Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.
|
About
OpenText™ Security Log Analytics is a scalable and user-friendly security operations platform designed to accelerate threat detection through comprehensive log management and big data analytics. It features a natural language-like querying interface that simplifies complex data searches, enabling security teams to visualize and analyze security events quickly and efficiently. The core columnar database ensures data immutability, enhancing trust and integrity in log management. This solution helps reduce analyst fatigue by streamlining threat hunting processes and automating repetitive remediation tasks. Integrated compliance reporting supports audit readiness for standards like GDPR, PCI, and FIPS 140-2. It also supports data ingestion from over 480 sources, providing a unified and normalized view for enhanced security visibility.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Data analysts
|
Audience
OpenText Security Log Analytics is ideal for security operations centers and IT teams in medium to large enterprises seeking scalable, efficient log management and accelerated threat detection with simplified compliance reporting
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationGravwell
USA
gravwell.io
|
Company InformationOpenText
Founded: 1991
Canada
www.opentext.com/products/security-log-analytics
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Big Data Features
Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Analysis Features
Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
||||||
|
|