Alternatives to Mobileum
Compare Mobileum alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Mobileum in 2026. Compare features, ratings, user reviews, pricing, and more from Mobileum competitors and alternatives in order to make an informed decision for your business.
-
1
EventSentry
NETIKUS.NET ltd
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.Starting Price: $85.00/one-time -
2
Feedzai
Feedzai
Feedzai is an end-to-end AI-powered financial crime prevention platform covering the entire lifecycle from account opening to fraud detection and AML compliance. It uses behavioral analytics to establish trusted digital identities and detect abnormal events that indicate fraud. The platform provides real-time fraud detection and prevention across multiple payment types and channels. Feedzai serves retail banks, commercial banks, payment service providers, merchant acquirers, core banking systems, and government agencies. It helps reduce AML compliance costs while enhancing security and operational efficiency. Trusted globally, Feedzai protects over a billion consumers and secures trillions in payments every year. -
3
Resilinc
Resilinc
Resilinc is a leading supply chain risk management platform that uses agentic AI to monitor, detect, and solve supply chain risks proactively. It helps companies safeguard their operations and balance sheets by providing real-time visibility and actionable insights across multi-tier supplier networks. Resilinc’s AI agents continuously scan for disruptions, enabling rapid response and mitigation before issues escalate. The platform serves Fortune 500 companies and federal agencies, offering comprehensive risk mapping and event monitoring. Key products include the Agentic AI Suite, Multi-Tier Mapping, RiskShield, and EventWatch. Trusted by industry leaders such as Nvidia, IBM, and Honeywell, Resilinc empowers organizations to gain a competitive advantage by protecting their supply chains.Starting Price: $1,400 per month -
4
AB Handshake
AB Handshake
AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic. We validate each call using our advanced system of interaction between operators. This means 100% accuracy and no false positives. Every time a call is set up, the call details are sent to the Call Registry. The validation request arrives at the terminating network before the actual call. Cross-validation of call details from two networks allows detecting any manipulation. Call registries run on simple common use hardware, no additional investment needed. The solution is installed within the operator’s security perimeter and complies with security and personal data processing requirements. Practice occurring when someone gains access to a business's PBX phone system and generates profit from the international calls at the business's expense. -
5
Nova SensAI
EXFO
Instantly detect and automatically predict subscriber-impacting outages and impairments, most of which currently go unnoticed. Reveals event impact, origin, and root cause to prioritize and accelerate fault resolution and proactively optimize user experience. Dynamically predicts and detects outages and impairments in mobile and fixed, physical and virtual networks. Classifies, correlates and groups abnormal events affecting network performance and user experience. Isolates fault location and diagnoses root cause to drive efficient, coordinated, prescriptive action. Ingests and interprets data from multiple source systems to collapse siloes and extract integrated insight. Optimize latency, network utilization and service delivery with end-to-end, multi-layer anomaly detection and correlated analytics. Detect and troubleshoot transient degradations and periodic issues affecting performance to offer a differentiated experience. -
6
ProcessMAP
ProcessMAP
Streamline processes and manage associated risks with the most integrated suite of Health & Safety software solutions. With ProcessMAP, companies establish consistency and provides realtime insights to improve your Health & Safety performance and ROI. Streamline, standardize, and track processes essential to various regulations and compliance frameworks. Built-in alerts, robust CAPA management, and advanced reporting capabilities increase accountability, provide visibility across the organization, and keep you ready for audits and inspections. Reduce risk through the correlation of safety and claims experience data. Identify and mitigate unsafe activities and associated risk by analyzing the root cause of events and claims. Our platform helps reduce risk by stopping claims before they happen. Manage sustainability performance and metrics reporting with the industry's leading cloud platform. Streamline collection, verification, and analysis of company-wide KPIs. -
7
ArmorPoint
ArmorPoint
Quickly identify and mitigate network threats as they happen in real-time. Ensure the network is secure and at safe operating levels after any setback. Immediately catch and isolate events that could pose a serious threat to the business. Monitor IT performances of the entire network stack right down to the endpoint. Record, store, and organize event logs and usage data for any network component. Adjust and control every facet of your overall security efforts through a single pane of glass. ArmorPoint takes the analytics traditionally monitored in separate silos, NOC and SOC, and brings that data together for a more holistic view of the security and availability of the business. Rapid detection and remediation of security events. Security, performance, and compliance management. Event correlation spanning your entire attack surface, security automation and orchestration.Starting Price: $250 per month -
8
TeleLink
Equinox Information Systems
Detailed usage data is the lifeblood of a service provider's business. Success is dependent on your ability to act on this data which often comes from multiple sources in multiple formats. TeleLink processes usage records from any source, normalizes them and enriches them with other key data sets including jurisdictions and trunk groups. By correlating and summarizing this data, carriers can gain valuable insight and immediate visibility to customer activity, market trends, traffic patterns, and network utilization. With access to individual event details, TeleLink makes it possible to troubleshoot, research, and generate detailed reports for further analysis, for initiating or defending billing disputes and for complying with regulatory reporting requirements. Correlate usage data with industry-standard or user-created reference data sets for more sophisticated, meaningful reporting. Group, filter, and sort based on user defined time span and increment.Starting Price: $16250 one-time payment -
9
FortiAIOps
Fortinet
FortiAIOps delivers proactive visibility and speeds IT operations, powered by AI. FortiAIOps is an artificial intelligence with machine learning (AI/ML) solution for Fortinet networks. This ensures quick data collection and identification of network anomalies. Fortinet network devices (FortiAPs, FortiSwitches, FortiGates, SD-WAN, FortiExtender) across the network feed the FortiAIOps dataset, enabling insights and event correlation for the network operations center (NOC). Enable visibility into your network across the full OSI stack. For example, get Layer 1 information, such as full RF spectrum analysis to understand interference on your Wi-Fi network. And, get Layer 7 application information that allows you to see what applications are traversing your Ethernet and your SD-WAN connections. Utilize a suite of troubleshooting tools to probe the network and understand diagnose issues. VLAN probing, cable verification, spectrum analysis, service assurance, and more. -
10
Ericsson Digital BSS
Ericsson
Ericsson telecom charging and billing solutions are flexible, business-focused software solutions deployed in over 300 operators around the world. They are already supporting more than a billion customers worldwide, meeting the needs of operators, service providers and users alike. Spanning all B2C, B2B and B2B2X revenue streams, these solutions can help you evolve to capture and secure money streams and take advantage of business opportunities from both traditional telecom services as well as digital services, 5G and IoT. Plus, you’ll enjoy a converged platform that lets you handle all your users and services, regardless of payment option or access. Improve customer experience with data mediation that ensures correct data is collected from the network. Cloud-based, personalized and contextualized customer experience across multiple digital touchpoints. -
11
StaffCop
Atom Security
StaffCop provides a unique, fully integrated solution that focuses on detection and response to insider threats through a combination of advanced behavioral analysis and context-rich logging of insider activity. Collect Collect all activity events at the end points for subsequent analysis, notifications and decision making. Analyze Automatic and statistical analysis of data to detect anomalies of user behavior, identify incidents, insiders and disloyal employees. Alert Automatic alerts about violations of security policies, dangerous and unproductive activities of employees. Report Pre-configured & self-made reports width periodic e-mail sending. You can easily create reports with a powerful constructor. Block Blocking access to "negative" sites, running applications and removable USB-storages to reduces the risk of malware infection and increase employee productivity. Review Search for all data for keywords and regular expressions, easy correlation & drilldownStarting Price: $69.00/one-time/user -
12
Presight
Presight
We connect to your existing business applications and automatically retrieve risk related information so that all elements that influence risk of major accidents, harm to people and the environment and downtime are visualized in one view. Finally, we are again able to meet in person. Presight would like to invite you to a networking event at our premises where we can discuss and learn from each other. The topic for the session is human factors that influence safe offshore operations and how to monitor them. A strong safety culture in place helps an organization to set a high level of standards for all safety processes. In this regard, Presight is developing a model to capture safety culture score in various organizations/operations. The model is currently being piloted in an oil and gas organization. Presight hires a PhD candidate to further develop the barrier monitor solution on monitoring human factors that can lead to major accidents. -
13
Providing a secure, cloud-based platform, longitudinal EHR data, and analytic tools to help providers and life sciences companies find new connections among previously siloed healthcare data. A set of SaaS applications designed to enable rapid population management, performance measurement, and effective engagement to patients and providers. Enables healthcare systems to collect, link, and combine data from hundreds of disparate sources across their enterprise and clinically integrated networks. Enables care and quality program designers to search and browse populations surrounding diagnoses, treatment, outcomes, costs and demographics. Quickly identifies target populations to help you make better decisions about risk-stratified care management. An integrated framework for correlating billions of clinical, operational and financial events into benchmarks and scorecards for comparison.
-
14
Skylight Interceptor NDR
Accedian
The right response for when your network is being targeted. The Skylight Interceptor™ network detection & response solution can help you to shutdown impending threats, unify security & performance, and significantly reduce MTTR. You need to see the threats your perimeter security is missing. Skylight Interceptor provides deep visibility into your traffic. It does this by capturing and correlating metadata from both north-south and east-west. This helps you protect your entire network from zero-day attacks, whether in the cloud, on-prem, or at remote sites. You need a tool that helps simplify the complexity of keeping your organization secure. Gain comprehensive high-quality network traffic data for threat-hunting. Achieve the ability to search for forensic details in seconds. Receive correlation of events into incidents using AI/ML. Review alerts generated on only legitimate cyber threats. Preserve critical response time and valuable SOC resources. -
15
Evention
Evention
Evention is a leading edge software company focused on automating back-office processes. Evention takes pride in reinventing legacy manual processes with modern automation. Cash operations management carries cash into the digital age. Together, cash recycling, cash reconciliation, and courier management enable complete cash control for the back office. Manual gratuity management is time-consuming and error-prone. Ensure error-free and efficient gratuity distribution with Evention's Tips & Gratuities and Self-Service Tip Out solutions. Spreadsheets and manual tracking complicate credit card settlements. Credit Card Reconciliation by Evention removes the hassle by automating the reconciliation between the POS, the processor, and the bank. Consolidating the scattered, extensive, and complex components associated with billing group contracts, Group Billing by Evention simplifies group contract accounting and reconciliation. -
16
Quest IT Security Search
Quest
Seeing the un-seeable can be a challenge for IT. With billions of events to collect and review from a variety of sources, both on premises and in the cloud, it’s difficult to find relevant data and make sense of it. And in the event of a security breach, either internal or external, the ability to locate where the breach originated and what was accessed can make a world of difference. IT Security Search is a Google-like, IT search engine that enables IT administrators and security teams to quickly respond to security incidents and analyze event forensics. The tool’s web-based interface correlates disparate IT data from many Quest security and compliance solutions into a single console and makes it easier than ever to reduce the complexity of searching, analyzing and maintaining critical IT data scattered across information silos. Configure role-based access, enabling auditors, help desk staff, IT managers and other stakeholders to get exactly the reports they need and nothing more. -
17
OpenText™ Managed Extended Detection and Response (MxDR) is built around a 100% remote, cloud-based virtual security Operations Center (V-SOC) supported by machine learning and MITRE ATT&CK framework. Using artificial intelligence and advanced workflows, develop correlations between computer, network and device logs. BrightCloud® Threat Intelligence Services is integrated directly to help businesses understand the scope and impact of any security event for immediate threat validation to known malware. OpenText MxDR experts will identify, investigate and prioritize alerts, saving you time and effort and allowing internal teams to focus on business operations.
-
18
Radware Cloud Native Protector
Radware
Running workloads in the public cloud exposes them to cloud-native threats that differ from threats facing on-premise environments. Detect and stop malicious activity within your cloud environment. Radware provides comprehensive Cloud Threat Detection and Response (CTDR) capabilities so organizations not only detect suspicious activities in their cloud environments but also correlate them into streamlined attack storylines by displaying the step-by-step progression of attack activities so they can be stopped before they develop into a full data breach. Radware detects suspicious activity in your cloud environment using dedicated Malicious Behavior Indicators (MBIs) which are custom-tailored to the threats facing cloud environments. Moreover, Radware not only detects but correlates individual events across time, threat surfaces, and resources into unified attack storylines. It displays the step-by-step progression of attacks so they can be stopped before they develop into a breach. -
19
Imperium
Imperium
The Imperium platform is an integrated risk platform designed for operational risk and compliance functions. Organize different types of risk and control assessments on a single platform to remove duplication in effort, thereby improving business engagement. Manual processes and complex system stacks are expensive. A streamlined operational risk platform can remove much of the inefficiency and therefore significantly reduce cost. Operational risk has a ‘tick box’ brand problem. Designing highly engaging/initiative tools can change this mindset. Simplify the data model to drive efficient insightful reporting across all three lines of defense. Data is a critical issue for operational risk functions. Due to the broad nature of the risks involved: data capture, data maintenance, data governance and data analysis are extremely complex to manage efficiently. Imperium uses best-in-class tools to manage this data in the implementation of the platform. -
20
HCL IntelliOps Event Management
HCLSoftware
HCL IntelliOps Event Management is a part of Intelligent Full Stack Observability offering under HCLSoftware Intelligent Operations ecosystem. It is a cutting edge AI-powered IT event management product which empowers organizations with industry leading capabilities such as real-time topology-based alert correlation, ML-based alert correlation and efficient noise reduction. The product offers seamless integration with an organization's existing element monitoring and ITSM tools providing seamless integration with GenAI powered AEX to foster efficient and quick resolution. -
21
Stable
Stable
Match & manage your physical risk using thousands of relevant, targeted & local indexes. We reference the index you select to create a simple contract with minimal basis risk, backed by a rated reinsurers. Stable offers a safe harbor for businesses exposed to volatile prices. We do this by hosting thousands of 3rd party indexes that are local, or tightly correlated to the physical risks our clients are facing. From financial controllers to farmers, Stable has democratised hedging for businesses of every size and sector to create the financial stability they need to invest in the future with confidence. -
22
Centraleyezer
Sandline
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companiesStarting Price: $599 per month -
23
Gisual
Gisual
Gisual provides outage intelligence for telecoms and service providers. No more manually diagnosing and correlating commercial power outages with complaining customers or off-network issues with down circuits. Subscribe to Gisual’s outage intelligence to receive proactive notifications when 3rd party outages are affecting your equipment and customers. Diagnose and correlate outages in seconds. Stop digging for intel to diagnose root cause analysis. Get situational awareness in seconds. View any 3rd party outages on a universal map or integrate our outage feed with your current systems. Connect directly with the partners and NOCs that you rely on. Access real-time outage intelligence with continuous updates including restoration times, location of outage, root cause, impacted area and exact customers affected. Get Gisual's data into your organization simply and easily. Our average integration takes 1 hour.Starting Price: $75 per user per month -
24
Seamless OS
Telness Tech
Seamless OS is a cloud-native BSS/OSS telecom platform from Telness Tech that eliminates traditional telecom complexity by combining core billing, customer operations, service activation, and network-agnostic management into a single, fully automated stack designed for fast, digital-first mobile service delivery. It enables companies to launch their own branded mobile operators by supporting prepaid and postpaid plans, eSIM and travel eSIM products, mobile apps, checkout and payments, regulatory billing and taxation, and complete subscriber lifecycle management with modular APIs and webhook integrations. Built-in AI and agentic capabilities automate workflows, customer support, and operational tasks to reduce overhead and future-proof services for the AI era, while the platform’s flexible, modular architecture lets operators configure, bundle, and upsell products such as data packs, devices, and value-added services.Starting Price: Free -
25
Protect business service-level agreements with dashboards to monitor service health, troubleshoot alerts and perform root cause analysis. Reduce MTTR with real-time event correlation, automated incident prioritization and integrations with ITSM and orchestration tools. Use advanced analytics like anomaly detection, adaptive thresholding and predictive health scores to monitor KPI data and prevent issues 30 minutes in advance. Monitor performance the way the business operates with pre-built dashboards that track service health and visually correlate services to underlying infrastructure. Use side-by-side displays of multiple services and correlate metrics over time to identify root causes. Predict future incidents using machine learning algorithms and historical service health scores. Use adaptive thresholding and anomaly detection to automatically update rules based on observed and historical behavior, so your alerts never become stale.
-
26
boothX
boothX
boothX provides platform to measure ROI for events or tradeshows. IT has lead retrieval app supported in both iOS and Android. It allows the users to capture leads by scanning business cards or scanning QR code. It track expenses associated with tradeshows or events and allows the sales or marketing team at the event to upload bills or invoices immediately on the portal through the same mobile app. It also allows organization to go Green for tradeshows or events by not taking the print materials. The same can be sent to the users or individuals coming to booth through email immediately. It provides a rich dashboard for Senior Management to measure the performance of events or tradeshows. -
27
OpenText Enterprise Security Manager
OpenText
OpenText™ Enterprise Security Manager (ESM) is a robust Security Information and Event Management (SIEM) solution designed to provide comprehensive real-time threat detection and automated response. It features an industry-leading correlation engine that alerts analysts instantly to threat-correlated events, dramatically reducing the time required to detect and respond to cyber threats. ESM integrates native Security Orchestration, Automation, and Response (SOAR) capabilities, enabling organizations to streamline their security operations and lower total cost of ownership. With the ability to analyze over 100,000 events per second and support more than 450 event sources, it delivers enterprise-wide event visibility and enhanced threat intelligence. The platform’s scalable architecture supports customization through rulesets, dashboards, and reports tailored to unique security needs. It also offers multi-tenancy capabilities for centralized management across distributed business units. -
28
FastTrack
Fast Track
For over 30 years Fast Track has specialized in risk based quality and compliance management software for medium to large organizations. Proven in companies such as Motorola and Serco; Australian Department of Defence and Australian Quarantine Inspection Service; and in medical laboratories at Alfred Hospital and Victoria Infectious Diseases Control Laboratories, you can be confident of your regulatory compliance with FastTrack. As a Microsoft Certified Partner, Fast Track supplies industry leading "On Premise" solutions that give you control over your data sovereignty, integrity, and secure. Utilizing Microsoft’s .Net and SQL Server platforms Fast Track supports clients around Australia and around the world from its head office in Queensland.Starting Price: $100 per user per month -
29
Auditrunner
Auditrunner
The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000+ business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.Starting Price: $850/month -
30
Analytic Solver
Frontline Systems
Analytic Solver Optimization - 100% upward compatible from the Excel Solver - handles every type and size of the conventional optimization problem (without uncertainty). Unlike other optimization software, it algebraically analyzes your model structure and maximally exploits multiple cores in your PC. You can solve nonlinear models 10 times larger, and linear models 40 times larger than the Excel Solver, get solutions much faster – and plug-in Solver Engines to handle up to millions of variables! Analytic Solver Simulation gives you easy-to-use, powerful Monte Carlo simulation and risk analysis, decision trees, and simulation optimization using Frontline’s advanced Evolutionary Solver. With 60 probability distributions plus compound distributions, automatic distribution fitting, rank-order and copula-based correlation, 80 statistics, risk measures and Six Sigma functions, multiple parameterized simulations and more. -
31
ThreatSync
WatchGuard
From distributed enterprises with 10 branch offices to small and midsize businesses (SMBs) with employees working outside of the network, it can be a struggle to manage security consistently and cohesively across your organization. It is critical for SMBs and distributed enterprise organizations to not only have visibility into both their network and endpoint event data, but to be able to quickly and efficiently leverage actionable insight to remove threats. ThreatSync, a critical component of TDR, collects event data from the WatchGuard Firebox, Host Sensor and enterprise-grade threat intelligence feeds, analyzes this data using a proprietary algorithm, and assigns a comprehensive threat score and rank. This powerful correlation engine enables cloud-based threat prioritization to empower IT team to quickly and confidently respond to threats. Collects and correlates threat event data from the Firebox and Host Sensor. -
32
MC FLO
MC FLOsim
Monte Carlo simulations make decisions easier - whether in the launch of a product, in the context of corporate planning, project controlling, the management of the portfolio, risk identification and more. Simulations reveal which results are more likely and where you should pay attention to maximize success. Built-in estimators, time series, automated forecasting and correlations in a visual fashion make simulations with MC FLO an easy task. MC FLO is fully integrated into Microsoft Excel for Windows and compatible with existing Excel workbooks. Easy to use, rapid model development and maximum transparency is our commitment. -
33
StrataVision
StrataVision
Using StrataVision's AI and Computer Vision platform, shopping centers are now able to maximize tenant leasing, improve operational intelligence and utilize more effective, targeted marketing strategies, transforming the center into a lifestyle destination filled with great customer experiences. Observe, analyze, and act on traffic patterns in the mall, identify ‘hot spots’ and correlate occupancy with external data such as current weather, public holidays and events. Successful strategies based on footfall circulation ensure maximum coverage for all tenants. Access tenant data to understand shopper activity as it relates to capture rates and merchandising categories - and, ultimately predict the success of each individual tenant. Detect popular synergies between tenants in order to optimize store placement and cross-tenant promotions within the shopping center. Ensure that marketing events reach the highest-possible return on investment with historical data and predictive analytics. -
34
WatchKeeper
WatchKeeper International
Visualize, track and protect critical operations. A unified platform to map your assets, visualize risk events, be alerted in real-time and take action to protect your operations. WatchKeeper allows organizations and government agencies to proactively identify risks before they threaten critical operations. Corporate Security. Global awareness of risk events in relation to assets and employees. Carry out duty of care and gain a competitive advantage. Government. Anticipate, identify and contextualise threats to expatriates, strategic business interests and tourist hotspots. Minimize disruption to critical national infrastructure, business investments and prevent loss of life. Smart Cities. Synchronize IoT sensors and devices into a single operating system to monitor transportation systems, utilities and public safety authorities. Logistics & Supply Chain. -
35
Sophisticated log ingestion, monitoring, and event correlation with a powerful data analysis engine and SOC monitoring for rapid threat insights. It is not enough to collect logs and alerts on possible breaches. Security Log Monitoring tracks incidents in real time, applies advanced analytics, categorizes them, and sends them to experts for review. We then investigate and prioritize leads and events for deeper analysis or immediate action. We help you achieve a deeper understanding of your security posture by applying a more strategic approach to threats and focusing on the most critical issues. The solution easily integrates with existing infrastructure including existing SIEM and log management devices using automation, so we can monitor all your devices, endpoints, systems, and networks. Whether you want the service to fit into your existing security environment alongside alternative assessment tools or a stand-alone service, Lumen can accommodate you.
-
36
Google Cloud Inference API
Google
Time-series analysis is essential for the day-to-day operation of many companies. Most popular use cases include analyzing foot traffic and conversion for retailers, detecting data anomalies, identifying correlations in real-time over sensor data, or generating high-quality recommendations. With Cloud Inference API Alpha, you can gather insights in real-time from your typed time-series datasets. Get everything you need to understand your API queries results, such as groups of events that were examined, the number of groups of events, and the background probability of each returned event. Stream data in real-time, making it possible to compute correlations for real-time events. Rely on Google Cloud’s end-to-end infrastructure and defense-in-depth approach to security that’s been innovated on for over 15 years through consumer apps. At its core, Cloud Inference API is fully integrated with other Google Cloud Storage services. -
37
SearchInform SIEM
SearchInform
SearchInform SIEM is a system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The system accumulates information from various sources, analyzes it, records incidents and alerts the designated staff. How the system works: •Collects events from various software and hardware sources: network equipment, third-party software, security tools, OS. •Analyses events and generates incidents in accordance with the rules, detects threats by identifying relationships (correlations, including cross-correlations) of events and/or incidents. •Automatically notifies employees in charge when incidents occur. •Normalises and details incidents for further investigation: determines the type and source of the incident, when integrated with AD – identifies the user. The solution provides 300+ ready-made rules – security policies. What's more, users can edit and customize existing rules and create their own policies. -
38
Gutsy
Gutsy
Understand how your security people, processes, and technologies really work and what outcomes they deliver. Gutsy applies process mining to cyber for the first time, giving you a continuous, automatic, data-driven understanding of how all the pieces work together as part of processes. With Gutsy, you know it, so you can answer hard questions and make good decisions. Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data. Gutsy enables you to look at security not as individual settings and detections, but as interconnected systems and events that deliver outcomes. You don't just see the results, you see how you got them and why. Gutsy connects to all the systems you're already using, continuously mines data about every process execution, and automatically correlates activities across complex security workflows. -
39
ThreatStryker
Deepfence
Runtime attack analysis, threat assessment, and targeted protection for your infrastructure and applications. Stay ahead of attackers and neutralize zero-day attacks. Observe attack behavior. ThreatStryker observes, correlates, learns and acts to protect your applications and keep you one step ahead of attackers. Deepfence ThreatStryker discovers all running containers, processes, and online hosts, and presents a live and interactive color-coded view of the topology. It audits containers and hosts to detect vulnerable components and interrogates configuration to identify file system, process, and network-related misconfigurations. ThreatStryker assesses compliance using industry and community standard benchmarks. ThreatStryker performs deep inspection of network traffic, system, and application behavior, and accumulates suspicious events over time. Events are classified and correlated against known vulnerabilities and suspicious patterns of behavior. -
40
CENX Service Assurance
Ericsson
CENX Service Assurance allows you to see service topology, inventory, fault, and performance from all your disparate systems, correlated into a single view. With this insight, operators can optimize hybrid communications networks and achieve closed-loop automation. Thus operators can deliver next-generation services quickly, launch new business models and support new technologies – such as Network Functions Virtualization (NFV), Software-Defined Networking (SDN), Self-organizing Networks (SON), and 5G and IoT, cost-effectively. The CENX Service Assurance fundamentally changes the way service providers work with their networks by providing actionable visibility of the entire network in near real-time, generating closed loop triggers, performing inventory and fault correlation augmented with TCA (Threshold Crossover Alert) analysis on performance data from disparate systems. It opens up a whole new set of leading-edge enterprise use cases in the 5G domain. -
41
Hunters
Hunters
Hunters, the first autonomous AI-powered next-gen SIEM & threat hunting solution, scales expert threat hunting techniques and finds cyberattacks that bypass existing security solutions. Hunters autonomously cross-correlates events, logs, and static data from every organizational data source and security control telemetry, revealing hidden cyber threats in the modern enterprise, at last. Leverage your existing data to find threats that bypass security controls, on all: cloud, network, endpoints. Hunters synthesizes terabytes of raw organizational data, cohesively analyzing and detecting attacks. Hunt threats at scale. Hunters extracts TTP-based threat signals and cross-correlates them using an AI correlation graph. Hunters’ threat research team continuously streams attack intelligence, enabling Hunters to constantly turn your data into attack knowledge. Respond to findings, not alerts. Hunters provides high fidelity attack detection stories, significantly reducing SOC response times. -
42
BCS (Business Coordination Software)
Projektron GmbH
BCS (Business Coordination Software) is an ERP solution for service providers, built on a powerful project management core. It enables you to plan, execute, control, and invoice projects while seamlessly integrating all related business processes in one system. All relevant data—such as time, services, resources, and costs—is captured directly within the project context. This provides full transparency over project status, budgets, and utilization at any time, and allows you to monitor progress and generate reliable forecasts based on real-time data. Beyond project management, BCS connects key business functions such as resource management, CRM, and billing, ensuring consistent data and efficient, end-to-end processes. Its modular structure allows you to adapt the system flexibly to your specific requirements. BCS can be operated as a SaaS solution or on-premises, depending on your needs. BCS is available in multiple languages and is used by more than 850 customers.Starting Price: $20/user -
43
NVIDIA NetQ
NVIDIA Networking
NVIDIA NetQ™ is a highly scalable, modern network operations toolset that provides visibility, troubleshooting, and validation of your Cumulus and SONiC fabrics in real time. NetQ utilizes telemetry and delivers actionable insights about the health of your data center network, integrating the fabric into your DevOps ecosystem. NetQ natively supports NVIDIA® What Just Happened® (WJH) through the Spectrum® ASIC for hardware-accelerated detection and reporting of data plane anomalies and intermittent network issues. NetQ is also available as a secure cloud service, making it even easier to install, deploy, and scale your network. Leveraging a cloud-based deployment of NetQ offers instant upgrades, zero maintenance, and minimal appliance management efforts. Correlate configuration and operational status, and instantly identify and track state changes for your entire data center. -
44
Risk Monitor
SearchInform
SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices. -
45
Cognitive Search and Discovery
Attivio
Attivio is unique in its ability to unify and analyze all types of enterprise information from a single platform. Gone is the necessity and challenge of integrating separate search, text mining, and BI tools. Correlating facts across applications and data repositories, Attivio is the fastest path to understanding and using 100% of the information that drives your innovation and operations. Whether you are developing new solutions on emerging sources or integrating siloed apps and their repositories, Attivio’s Insight Engine can profile, identify, and unify every source, regardless of its location or format. Don’t settle for anything less than a complete 360-degree view. Learn why independent analysts recognize Attivio as a leading provider of solutions that analyze unstructured content, correlate those results with structured information, and deliver actionable insight. -
46
HSEQ Manager
Xcetra
The HSEQ Manager application is designed to allow the user to create any type of HSEQ report using a handheld device, in this case the iPhone, iPad and Android device. The design is based on the most commonly used procedures for health, safety, environmental and quality reporting. Considering industry requirements and responsibilities, it has become essential to record and report on all types of HSEQ events. This application will provide a secure and seamless way to record, create and manage these reports. Allow your users to capture reports in the field and create actions. A dynamic system that captures the information you need. Capture actions in your reports and distribute to the right persons. Follow up and close out actions through the app or web interface. Turn data into intelligence. Analyse compliance issues to prevent them occurring in the future. Advanced dashboard to show the user performance, statistics and user interaction on all your projects and divisions.Starting Price: $14.70 per month -
47
Selector Analytics
Selector
Selector’s software-as-a-service employs machine learning and NLP-driven, self-serve analytics to provide instant access to actionable insights and reduce MTTR by up to 90%. Selector Analytics uses artificial intelligence and machine learning to conduct three essential functions and provide actionable insights to network, cloud, and application operators. Selector Analytics collects any data (including configurations, alerts, metrics, events, and logs), from various heterogeneous data sources. For example, Selector Analytics may harvest data from router logs, device or network metrics, or device configurations. Once collected, Selector Analytics normalizes, filters, clusters, and correlates metrics, events, and alarms using pre-built workflows to draw actionable insights. Selector Analytics then uses machine learning-based data analytics to compare metrics and events and conduct automated anomaly detection. -
48
ESKA Digital Billing
ESKADENIA Software
ESKA® Digital Billing enables real-time billing in telecommunication networks. It has a flexible and powerful convergent rating engine that gives network operators a competitive advantage to be market leaders in the telecommunications industry. It provides an advanced system for the convergent billing of different services such as wireline, wireless and data networks. This powerful system provides many rich and valuable features such as supporting convergent billing of different telecom services, supporting multi-billing cycles with different frequencies and grace periods, supporting different charging methods such as advance, arrear and one-time charging. ESKA® Digital Billing enables telecom operators to manage their administrative and billing tasks effectively through the integration with other systems such as Customer Care. -
49
IBM® Z® Service Management Suite offers a single point of control for systems management functions for many system elements. This suite delivers multiple AIOps capabilities required to manage both hardware and software enterprise resources in an IBM Systems complex. Achieve operational excellence with policy-based automation, maximizing availability of IBM Z systems and IBM Parallel Sysplex® clusters and optimizing key IT operations objectives. Leverage IBM Z OMEGAMON® to extend monitoring and observability to manage the health of the Z platform with product-provided best practices and expert advice from a single service management console. Use Watson AIOps to correlate monitoring events and apply analytics to understand the impact from IBM Z events across hybrid cloud. Analyze IBM OMEGAMON metrics with popular AI platforms for improved visibility and anomaly detection.
-
50
Bilin
Bilin Technology
We built our proprietary platform completely in-house by utilizing innovative machine-learning technologies. This platform allows us to monitor individual company’s data consumption. By analyzing the content consumption of companies across the Internet, identifying research patterns, and correlating billions of events to determine companies purchasing intent, we can identify who you should be targeting with your marketing. Proprietary bidder specifically built for B2B marketers. Reach hundreds of thousands of targeted companies and decision makers. Dynamic creative customize messages for each account and individuals. Custom topics and segments defined by keywords. Monitor millions of companies on the Internet in real time. Identify prospects as soon as they start their buying journey. Intent data and topics of interest for each account. Detailed decision maker information with full transparency.