Related Products
|
||||||
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
CISOs, SOC/IR Managers, Threat Hunters, Detections Engineers, SOC Analysts
|
Audience
IT teams looking for a cyber threat monitoring platform to bridge the gap between data and action
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationSOC Prime
Founded: 2015
United States
socprime.com
|
Company InformationSecurity On-Demand
Founded: 2001
United States
www.securityondemand.com/advanced-threat-log-analysis-service-2/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
||||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
|
||||||
Integrations
Amazon Athena
Apache Kafka
Chronicle SIEM
Devo
Elasticsearch
Filigran
Humio
IBM Security QRadar SIEM
Microsoft Defender for Endpoint
Microsoft Sentinel
|
Integrations
Amazon Athena
Apache Kafka
Chronicle SIEM
Devo
Elasticsearch
Filigran
Humio
IBM Security QRadar SIEM
Microsoft Defender for Endpoint
Microsoft Sentinel
|
|||||
|
|