+
+

Related Products

  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • Blumira
    131 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • ConnectWise SIEM
    186 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • c/side
    6 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    159 Ratings
    Visit Website
  • Criminal IP
    11 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • ThreatLocker
    468 Ratings
    Visit Website

About

Hunters, the first autonomous AI-powered next-gen SIEM & threat hunting solution, scales expert threat hunting techniques and finds cyberattacks that bypass existing security solutions. Hunters autonomously cross-correlates events, logs, and static data from every organizational data source and security control telemetry, revealing hidden cyber threats in the modern enterprise, at last. Leverage your existing data to find threats that bypass security controls, on all: cloud, network, endpoints. Hunters synthesizes terabytes of raw organizational data, cohesively analyzing and detecting attacks. Hunt threats at scale. Hunters extracts TTP-based threat signals and cross-correlates them using an AI correlation graph. Hunters’ threat research team continuously streams attack intelligence, enabling Hunters to constantly turn your data into attack knowledge. Respond to findings, not alerts. Hunters provides high fidelity attack detection stories, significantly reducing SOC response times.

About

We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security professionals searching for an advanced AI-powered SIEM

Audience

IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Hunters
Founded: 2018
Israel
www.hunters.security/

Company Information

Exabeam
Founded: 2012
United States
www.exabeam.com/platform/logrhythm-siem/

Alternatives

Alternatives

Alert Logic

Alert Logic

Fortra
CPTRAX for Windows

CPTRAX for Windows

Visual Click Software

Categories

Categories

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Integrations

ARIA SDS Packet Intelligence
Baits
Barracuda PST Enterprise
Box Shield
Check Point Infinity
DataOps.live
Dragos Platform
Filigran
GTB Technologies DLP
HackGuard
Kroll Cyber Risk
Multi-Domain Security Management
Ordr Platform
Powertech SIEM Agent for IBM i
SIRP
ScaleOps
Scuba Database Vulnerability Scanner
Trustwave DbProtect
Validato
Varonis Data Security Platform

Integrations

ARIA SDS Packet Intelligence
Baits
Barracuda PST Enterprise
Box Shield
Check Point Infinity
DataOps.live
Dragos Platform
Filigran
GTB Technologies DLP
HackGuard
Kroll Cyber Risk
Multi-Domain Security Management
Ordr Platform
Powertech SIEM Agent for IBM i
SIRP
ScaleOps
Scuba Database Vulnerability Scanner
Trustwave DbProtect
Validato
Varonis Data Security Platform
Claim Hunters and update features and information
Claim Hunters and update features and information
Claim LogRhythm SIEM and update features and information
Claim LogRhythm SIEM and update features and information