+
+

Related Products

  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Graylog
    405 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • New Relic
    2,907 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website

About

Logsign is a global vendor that specializes in providing comprehensive cybersecurity solutions that enable organizations to enhance their cyber resilience, reduce risk, and streamline security processes while decreasing HR and operational chaos. Logsign consistently offers an efficient, user-friendly, and seamless platform and employs the latest technologies to establish secure, resilient, and compliant environments while providing organizations with comprehensive visibility into their IT infrastructure, enhancing threat detection capabilities, and streamlining response efforts. In today's complex threat landscape, Logsign ensures that businesses have a robust cybersecurity posture in place, proactively safeguarding their systems, data, and digital assets. With a presence on four continents and a customer base of over 600 enterprises and governmental institutions as mentioned by Gartner SIEM Magic Quadrant two years in a row, Logsign also has high ratings on Gartner Peer Insight.

About

We’re here to help you navigate your cybersecurity journey. Since 2001, we’ve ensured a strong cybersecurity posture for every client through threat resolution and security recommendations in the pursuit of zero cyber risk. When people, processes, and technology work together, we can better protect our digital way of life. Resolve and remediate cybersecurity threats through full-cycle management. Actionable intelligence provides valuable insight for improving your cybersecurity posture. A single platform to unify your entire security stack. Detection, investigation, and resolution of your security alerts. Team of cybersecurity experts that bolster your existing security team or supplement light IT staff. Support and monitoring of your firewall and overall security. Prevention and visibility to protect you from a breach. Evaluation of your infrastructure for vulnerabilities and security gaps.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Mid and Large Enterprises, MSSPs

Audience

Businesses, enterprises, and organizations seeking a solution to improve the deployment of managed security services

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Logsign
Founded: 2010
Netherlands
www.logsign.com

Company Information

VirtualArmour
Founded: 2001
United States
virtualarmour.com

Alternatives

Alternatives

Categories

Categories

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Integrations

IBM QRadar SIEM
Acronis Cyber Protect Cloud
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Enterprise IoT Security
F5 BIG-IP Advanced WAF
Forcepoint DLP
Fortinet Security Fabric
Gurucul
IBM Cloud
Ivanti vADC
Kaspersky EDR
Nessus
Palo Alto Networks Next-Generation Firewalls
Splunk Cloud Platform
Trend Micro Endpoint Encryption

Integrations

IBM QRadar SIEM
Acronis Cyber Protect Cloud
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Enterprise IoT Security
F5 BIG-IP Advanced WAF
Forcepoint DLP
Fortinet Security Fabric
Gurucul
IBM Cloud
Ivanti vADC
Kaspersky EDR
Nessus
Palo Alto Networks Next-Generation Firewalls
Splunk Cloud Platform
Trend Micro Endpoint Encryption
Claim Logsign and update features and information
Claim Logsign and update features and information
Claim VirtualArmour and update features and information
Claim VirtualArmour and update features and information