+
+

Related Products

  • Blumira
    150 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • ManageEngine Log360
    168 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    210 Ratings
    Visit Website
  • Guardz
    118 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,305 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    521 Ratings
    Visit Website
  • Kognition
    2 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website

About

Security Onion is a comprehensive open source platform for intrusion detection, network security monitoring, and log management. It provides a set of powerful tools to help security professionals detect and respond to potential threats across an organization's network. Security Onion integrates various technologies, including Suricata, Zeek, and Elastic Stack, to collect, analyze, and visualize security data in real-time. Security Onion’s intuitive user interface allows for easy management and analysis of network traffic, security alerts, and system logs. It also includes built-in tools for threat hunting, alert triage, and forensic analysis, helping users identify potential security incidents quickly. Security Onion is designed for scalability, making it suitable for environments of all sizes, from small businesses to large enterprises.

About

Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security professionals and organizations looking for an open source, scalable solution for network security monitoring and threat detection

Audience

Anyone requiring an end-to-end security for APIs and cloud-native applications

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

Free
Free Version
Free Trial

Pricing

$0
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Security Onion
Founded: 2014
United States
securityonionsolutions.com

Company Information

Traceable
Founded: 2018
United States
www.traceable.ai

Alternatives

Alternatives

Resurface

Resurface

Resurface Labs
NymVPN

NymVPN

Nym Technologies
AppTrana

AppTrana

Indusface

Categories

Categories

Web Application Firewalls (WAF) Features

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
Dashboard
DDoS Protection
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Integrations

Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Azure Kubernetes Service (AKS)
Cloud Range
Descope
Docker
Elasticsearch
Envoy
Gigamon
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
NGINX
Suricata
Terraform
Zeek

Integrations

Amazon EKS
Amazon Elastic Container Service (Amazon ECS)
Azure Kubernetes Service (AKS)
Cloud Range
Descope
Docker
Elasticsearch
Envoy
Gigamon
Google Kubernetes Engine (GKE)
Helm
Istio
Kong Konnect
NGINX
Suricata
Terraform
Zeek
Claim Security Onion and update features and information
Claim Security Onion and update features and information
Claim Traceable and update features and information
Claim Traceable and update features and information