Audience

Organizations looking to strengthen security operations and compliance

About Arctic Wolf

Arctic Wolf® is a global leader in security operations, enabling customers to manage their cyber risk in the face of modern cyber attacks
via a premier cloud-native security operations platform. The Arctic Wolf Aurora Platform ingests and analyzes more than seven trillion
security events a week to help enable cyber defense at an unprecedented capacity and scale, empowering customers of virtually any size
across a wide range of industries to feel confident in their security posture, readiness, and long-term resilience. By delivering automated
threat protection, response, and remediation capabilities, Arctic Wolf delivers world-class security operations with the push of a button so
customers can defend their greatest assets at the speed of data.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Arctic Wolf Networks
Founded: 2012
United States
arcticwolf.com

Videos and Screen Captures

Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Phone Support
24/7 Live Support
Online

Arctic Wolf Frequently Asked Questions

Q: What kinds of users and organization types does Arctic Wolf work with?
Q: What languages does Arctic Wolf support in their product?
Q: What kind of support options does Arctic Wolf offer?
Q: What other applications or services does Arctic Wolf integrate with?
Q: What type of training does Arctic Wolf provide?

Arctic Wolf Product Features

Cloud Management

Supply Monitoring
Cost Management
Multi-Cloud Management
Access Control
Billing & Provisioning
Performance Analytics
Demand Monitoring
SLA Management
Workflow Approval
Capacity Analytics

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Vulnerability Scanning
Whitelisting / Blacklisting
Tokenization

Endpoint Protection

Activity Log
Behavioral Analytics
Device Management
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
Antivirus
Application Security
Encryption

IT Security

Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Anti Spam
Anti Virus
Spyware Removal
Two-Factor Authentication