Related Products
|
||||||
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies looking for an advanced log management and log monitoring solution to improve security, compliance and audit
|
Audience
IT Security and Development departments looking for a solution for cloud log management and metrics monitoring
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$270.00 per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCastle Shield
Founded: 2019
United States
castle-shield.com/quiver/
|
Company InformationSumo Logic
Founded: 2009
United States
www.sumologic.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
|
|||||
|
||||||
Categories |
Categories |
|||||
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
|
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Application Performance Monitoring (APM) Features
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
DevOps Features
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
|
|||||
Integrations
Check Point IPS
Claroty
Cloudaware
Coalfire
Corelight
Dropzone AI
Fidelis Halo
IRONSCALES
Indent
Mandiant Digital Risk Protection
|
Integrations
Check Point IPS
Claroty
Cloudaware
Coalfire
Corelight
Dropzone AI
Fidelis Halo
IRONSCALES
Indent
Mandiant Digital Risk Protection
|
|||||
|
|