+
+

Related Products

  • ManageEngine Log360
    73 Ratings
    Visit Website
  • ConnectWise SIEM
    181 Ratings
    Visit Website
  • Blumira
    130 Ratings
    Visit Website
  • Heimdal Endpoint Detection and Response (EDR)
    54 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    144 Ratings
    Visit Website
  • ConnectWise Cybersecurity Management
    155 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    382 Ratings
    Visit Website
  • Netwrix Auditor
    294 Ratings
    Visit Website
  • New Relic
    2,480 Ratings
    Visit Website
  • Guardz
    49 Ratings
    Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Mid and Large Enterprises, MSSPs

Audience

IT teams looking for a cyber threat monitoring platform to bridge the gap between data and action

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Logsign
Founded: 2010
Netherlands
www.logsign.com

Company Information

Security On-Demand
Founded: 2001
United States
www.securityondemand.com/advanced-threat-log-analysis-service-2/

Alternatives

Splunk SOAR

Splunk SOAR

Splunk

Alternatives

Smart SOAR

Smart SOAR

D3 Security Management Systems
SentryXDR

SentryXDR

Logically
NetWitness

NetWitness

RSA Security
BIMA

BIMA

Peris.ai

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM Security QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks NGFW
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption
Trustwave

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM Security QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks NGFW
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption
Trustwave
Claim Logsign and update features and information
Claim Logsign and update features and information
Claim ThreatWatch Detection & Analytics and update features and information
Claim ThreatWatch Detection & Analytics and update features and information