Alternatives to Supercharger
Compare Supercharger alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Supercharger in 2026. Compare features, ratings, user reviews, pricing, and more from Supercharger competitors and alternatives in order to make an informed decision for your business.
-
1
ManageEngine EventLog Analyzer
ManageEngine
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats. -
2
CPTRAX for Windows
Visual Click Software
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. -
3
Securden Endpoint Privilege Manager
Securden
Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready -
4
EventSentry
NETIKUS.NET ltd
Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.Starting Price: $85.00/one-time -
5
Cribl Stream
Cribl
Cribl Stream allows you to implement an observability pipeline which helps you parse, restructure, and enrich data in flight - before you pay to analyze it. Get the right data, where you want, in the formats you need. Route data to the best tool for the job - or all the tools for the job - by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders. As much as 50% of log and metric data goes unused – null fields, duplicate data, and fields that offer zero analytical value. With Cribl Stream, you can trim wasted data streams and analyze only what you need. Cribl Stream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the Cribl Stream universal receiver to collect from any machine data source - and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIsStarting Price: Free (1TB / Day) -
6
Corner Bowl Event Log Manager
Corner Bowl Software Corporation
An enterprise class Centralized Windows Event Log Management Software Tool. A Centralized Log Consolidator. A Real-Time Windows Event Log, Syslog and Application Log Monitor Software Tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.Starting Price: $84 -
7
Logz.io
Logz.io
We know engineers love open source. So we supercharged the best open source monitoring tools — including ELK, Prometheus, and Jaeger, and unified them on a scalable SaaS platform. Collect and analyze your logs, metrics, and traces on one unified platform for end-to-end monitoring. Visualize your data on easy-to-use and customizable monitoring dashboards. Logz.io’s human-coached AI/ML automatically uncovers errors and exceptions in your logs. Quickly respond to new events with alerting to Slack, PagerDuty, Gmail, and other endpoints. Centralize your metrics at any scale on Prometheus-as-a-service. Unified with logs and traces. Add just three lines of code to your Prometheus config files to begin forwarding your metrics to Logz.io for storage and analysis. Quickly respond to new events by alerting Slack, PagerDuty, Gmail, and other endpoints. Logz.io’s human-coached AI/ML automatically uncovers errors and exceptions in your logs.Starting Price: $89 per month -
8
ezCash
ezBackOffice
ezCash is a powerful credit and collection solution that helps businesses collect their outstanding receivable portfolio faster. Our customers succeed by organizing and prioritizing their collection efforts using our Collection Strategy engine, reducing DSO and avoiding write-offs. Using rules-based workflow, ezCash then drives the collection process through a series of tasks that are created on a nightly basis. The tasks are produced by the Collection Strategy engine and can be configured to handle individual or groups of customer accounts according to the collection policies. Tasks can be generated in preview or automatic mode and assigned to individual collectors or a pool of collectors. Automatic tasks can result in automated emails to customers or entries into a dialer queue whereas preview tasks are handled directly by collectors. We offer ezCash as an in-house, internally hosted system or as a SaaS system. The system is based on the Microsoft platform using ASP and SQL server. -
9
Microsoft Intune
Microsoft
Transform IT service delivery for your modern workplace. Simplify modern workplace management and achieve digital transformation with Microsoft Intune. Create the most productive Microsoft 365 environment for users to work on devices and apps they choose, while protecting data. Securely manage iOS, Android, Windows, and macOS devices with a single endpoint management solution. Streamline and automate deployment, provisioning, policy management, app delivery, and updates. Stay up to date with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices. -
10
Baidu AI Cloud Log Service
Baidu AI Cloud
Relying on the technical advantages of cloud computing and big data, you only need to deploy the configuration and collect, aggregate, and efficiently transmit the massive logs at a low cost. So, you can cope with various business scenarios easily, such as equipment operations and management, business trend insight, security monitoring, and audit. It can compress the log data for transmission, and supports multiple compression formats, effectively reducing the storage cost and saving the transmission bandwidth. It provides the simple and easy-to-use installation, management, and upgrading features of the collector to ensure stable operation. It provides the hosted service mode, which can be easily used with a simple deployment without the investment in development and operations. -
11
ManageEngine Firewall Analyzer
ManageEngine
Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.Starting Price: $395 -
12
Change Manager for Group Policy/Intune
SDM Software, Inc.
Change Manager for Group Policy/Intune brings modern change control and governance to customers that rely on Windows Group Policy and Intune day in and day out. Securely delegate access to GPO editing, container linking and Intune profiles and their assignments, with approval-based workflows. View differences and search for settings between versions of GPOs, containers and Intune profiles and rollback, undelete or schedule deployment of changes–all from a modern web interface. Whether you are new to GPO (and Intune) Change Control or looking for an alternative to Advanced Group Policy Management (AGPM), CMGPI can meet your needs. Bring Security and Governance to your Windows configuration environments.Starting Price: based on active computers -
13
XpoLog
XpoLog
Reduce Complexity and Cut-Costs of manual work and scripting by 90%. PortX Automated Parsing and Collectors of any log Type/Source, Cloud data, Apps, and Services. PortX – Identifies, parses, and tags sources automatically. PortX automatically identifies data patterns from a wide variety of applications and systems. XpoLog uses PortX to Automatically Deploy Analytical Apps for generating instant insights. Security, performance, audit, errors, trends, anomalies, and much more! Once log data is collected, XpoLog automatically detects and matches analytics apps. The apps provide ready to use reports. Gain real-time insights instantly. XpoLog automatically detects errors, exceptions, anomalies, unique patterns, risk. Check XpoLogs’ market-leading marketplace, with dozens of out-of-the-box analytics apps. -
14
Microsoft Configuration Manager
Microsoft
Microsoft Configuration Manager is a comprehensive systems management solution that enhances IT productivity by automating tasks such as the secure deployment of applications, software updates, and operating systems across servers, desktops, and laptops. It offers real-time device management, cloud-powered analytics for both on-premises and internet-based devices and compliance settings management. It integrates seamlessly with Microsoft technologies including Intune for co-managing diverse mobile device platforms, Azure for hosting cloud services, and Windows Server Update Services (WSUS) for software update management. Additionally, it utilizes Active Directory Domain Services and Microsoft Entra ID for security and configuration, as well as SQL Server for database management, integrating with SQL Server Reporting Services (SSRS) for comprehensive reporting.Starting Price: Free -
15
opEvents
Opmantek
Configure your business policies to reflect your business environment. Set up to send alerts via SMS or email while following your escalation rules to one or more contacts. Outline your business hours to follow escalation or hierarchy differences and also allow for planned outages. Completely customizable notification settings that alert at the frequency that matches your demands. opEvents provides a centralised logging service for the purposes of operations, compliance and auditing. Complete management (centralised storage and audit capability) of logs from NMIS, applications, active directory, devices and cloud infrastructure. Enrich your network events with logs from multiple sources. Suppression and highlighting lists to ensure the right events generate notifications. Stateless and stateful events are applicable and events can be related to nodes. A set of normalized node properties are extracted and applied to the event.Starting Price: $649 per year -
16
LOGalyze
Zuriel
LOGalyze is an open source, centralized log management and network monitoring software. If you would like to handle all of your log data in one place, LOGalyze is the right choice. It supports Linux/Unix servers, network devices, Windows hosts. It provides real-time event detection and extensive search capabilities. With this open source application log analyzer, collect your log data from any device, analyze, normalize and parse them with any custom made Log Definition, use the built-in Statistics and Report Definitions or use your own ones. You can define Events and Alerts by correlating any log data. The ticketing system provides powerful tool closing your open incidents more quickly. LOGalyze is an open source network management tool what helps reducing internal costs, improving network uptime, increasing network efficiency and eliminating unwanted network traffic. The built-in scheduled Reports give you an overview of the whole network. -
17
EZ Collect for Acumatica
Nexvue
With EZ-Collect you increase your cash flow as your accounts receivable, days outstanding, and bad debt write-off decrease. EZ-Collect leverages tasks, activities, and notes in your Acumatica system to create an automated workflow that makes collectors more effective and more efficient. EZ-Collect helps manage the entire collections effort by providing rules-based automation, empowering the collector to accept on-the-spot payments and manage requests for extended credit. Rules-based automation automatically assigns troubled invoices to collectors and assigns collection tasks, preventing individual invoices and troubled accounts from “falling through the cracks.” These tasks help direct and prioritize the overall collection efforts, whether there is one collector or many. When EZ-Collect is implemented with EZ-Pay, collectors will have the ability to accept credit card or e-check payments while on the phone. -
18
Remedio
Remedio
Remedio is an AI-powered, autonomous device posture management platform that continuously discovers, monitors, and remediates security misconfigurations and configuration drift across enterprise IT and OT environments to reduce attack surface, enforce compliance, and harden endpoint security without disruption. It delivers real-time visibility into configuration risks on devices running Windows, macOS, and Linux, as well as cloud instances and servers, and automatically applies safe remediation actions that are instantly reversible, giving security teams confidence when closing gaps without business impact. Remedio simplifies policy validation and enforcement by benchmarking settings against security standards such as CIS, NIST, and MITRE frameworks and continuously re-applies policies across updates, user changes, and new devices to maintain consistent secure baselines. It provides centralized control and governance of Active Directory, Group Policy, MDM, and Intune settings. -
19
ALog SMASH
AMIYA
ALog SMASH is a server access log product that records "when, who, and what" for Windows servers. Since it is installed directly on the file server, there is no need for a manager server dedicated to log management. With ALog SMASH, compact log management can be achieved quickly. The database and report/alert functions are all standard equipment. There is no additional cost. With 1-year of maintenance support. Everything from log search/report to system settings can be operated on the browser. Also equipped with a log translation function unique to the ALog series. You no longer have to spend time decrypting the event log. You can flexibly search the collected logs with an intuitive GUI. Designed for long-term log storage. Logs are automatically compressed up to about 1/4000. You can rest assured that you have ALog SMASH.Starting Price: $1740.00/one-time/user -
20
Quiver
Castle Shield
Quiver – Log Management Solutions that are Advanced & Easy-to-Use. Identify and mitigate threats, system breaches, & policy violations with Quiver™. Quiver™ is a cost-effective, powerful and flexible log management and log monitoring solution that combines complete log management with powerful correlation technology, real-time event log correlation and log monitoring, and an integrated incident response system – all on one appliance. Quiver™ offers organizations of all sizes and industries. Quiver™ provides an arsenal of log management, threat detection and risk reduction tools. -
21
UncommonX
UncommonX
UncommonX delivers a hyperconverged, AI‑powered Exposure Management platform that provides complete, agentless visibility across on‑premises, cloud, mobile, and SaaS environments. Its patented Agentless Discovery automatically maps every network element without intrusive agents, while Universal Integration consolidates logs, SIEM data, and threat feeds into a single dashboard. A proprietary Relative Risk Rating (R3) assesses assets in real time against standard NIST factors, and built‑in Threat Intelligence continuously enriches risk profiles. The platform’s Detection and Response module offers a real‑time alert dashboard for rapid investigation, containment, and remediation, and a Central Intelligence feature enables proactive vulnerability assessments and threat hunting. Complementing these core capabilities, UncommonX supports managed MDR/XDR, 24/7 SOC services, Asset Discovery & Management, Vulnerability Management, and MSP‑focused XDR deployments. -
22
Nexus Smart ID Corporate PKI
Nexus Group
Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI. A corporate public-key infrastructure can issue and manage trusted identities for people, devices and services, forming the basis of information security in an organization. Smart ID provides a reliable foundation, including roles, policies and procedures, for issuing and managing trusted, certificate-based identities. Smart ID corporate PKI is a flexible and scalable solution that can be used by any organization to issue, manage and validate certificate-based digital identities for mixed endpoint environments that include people, infrastructure and things. Based on standard products that are proven in business-critical environments and made in Sweden. -
23
Fortra Event Manager
Fortra
Real-time cybersecurity insight and response platform. As threats grow more sophisticated, speed is essential. Risks need to be identified and addressed before damage can occur. Fortra's SIEM software, Event Manager, prioritizes security risks in real time. Automated escalation and streamlined incident response with security event management fast-tracks your response time and resolution. Organizations today collect more security data than ever. Many security events require little to no attention, but serious issues require a rapid response. In that sea of security data, it's easy for important information to be overlooked. Event Manager reduces alert fatigue by identifying and escalating critical security events, enabling security analysts to respond quickly and effectively. In addition to default settings filtering out insignificant information or benign threats, users can fine tune the data they see, and add inclusion/exclusion rules about what exactly should be processed. -
24
Beesion TCCS Suite
Beesion
Debt collection suite solution that helps businesses check prospects' credit eligibility, manage subscriber payments and collect debts. Cloud-based and on-premise platform that helps businesses of all sizes streamline sales processes with prescreening, account monitoring, automated payment reminders, invoicing, call routing and more. With point-and-click tools, adjust applications to address market trends, customers’ payments behavior, and changing regulations and financial requirements. Steer and control credit, payment, and collection policies. Make each application smarter and more predictive by sharing data about customers’ fit and behavior. Use all three applications to create a secure online portal where subscribers can pay their debt in arrears without the intrusion of a collector’s call. Subscribers can select payment plans and even receive discounts. If they don’t honor their commitments, their service is automatically suspended. -
25
XPLG PortX
XPLG
Now it takes only minutes to Collect, Parse & Forward Log Data using automated log parser & collection, powered by AI/ML pattern detection. Introducing PortX by XPLG, the leading, optimized log data management and forwarding solutions for log data streams. PortX Reduces 90% of scripting and manual work. Optimizing costs, Reduces RegExp, Grok work, and ongoing maintenance. High performance, Load balanced, Persistent & Secure. PortX Simplifies high-performance data stream management and Reduces resource data consumption. Route/Forward Log Data Streams to any Service. Filter Valuable Events, Archive The Rest. Forwarding log streams to any logging service: ELK, SIEM, and more. Reducing data volumes using smart-managed filters. Customize all Data with Visual Log parser and Log Viewer. Control every data source with UI, permissions, log events filters, and log fields customization. -
26
SolarWinds Log Analyzer
SolarWinds
Easily investigate machine data to help identify the root cause of IT issues faster. Powerfully designed and intuitive log aggregation, tagging, filtering, and alerting for effective troubleshooting. Fully integrated with Orion Platform products, enabling a unified view of IT infrastructure monitoring and associated logs. We’ve worked as network and systems engineers, so we understand your problems and how to solve them. Your infrastructure is constantly generating log data to provide performance insight. Collect, consolidate, and analyze thousands of syslog, traps, Windows, and VMware events to perform root-cause analysis with log monitoring tools from Log Analyzer. Perform searches using basic matching. Execute searches using multiple search criteria and apply filters to narrow results. Save, schedule, and export search results within the log monitoring software. -
27
Collector Systems
Collector Systems
Collector Systems is the leading cloud-based collection management solution for managing collections of fine art, furniture, jewelry, cars, clothing and wine. Collector Systems provides you with sophisticated tools for easily maintaining standardized records in archives and historical collections, from built-in access to Chenhall's Nomenclature to our forthcoming Digital Asset Management System (DAMS). Modules tailored for the demands of natural history collections empower you to keep all your data organized and accessible, with built-in tools for full and precise taxonomic classification. For fieldwork, research and management, Collector Systems provide the complete cataloging solution for archaeological and ethnological collections.Starting Price: $85 per user per month -
28
SolarWinds Papertrail
SolarWinds
The days of logging in to servers and manually viewing log files are over. SolarWinds® Papertrail™ aggregates logs from applications, devices, and platforms to a central location. With Papertrail, you can view, search, and tail events in real time from a single UI, without the need for grep or AWK. Papertrail scans incoming logs for anomalies and generates real-time alerts and summaries, so you can gain immediate visibility into system activity and application performance. Explore how Papertrail can help you realize value from logs you already collect. SolarWinds® Papertrail™ provides cloud-based log management that seamlessly aggregates logs from applications, servers, network devices, services, platforms, and much more. Papertrail features a fast search, flexible system groups, team-wide access, long-term archives, charts and analytics exports, and monitoring webhooks.Starting Price: $7 per month -
29
Integrated monitoring, logging, and tracing managed services for applications and systems running on Google Cloud and beyond. Cloud Logging is a fully managed, scale-out service that can transfer log data from platforms and applications, as well as custom log data from GKE environments, VMs, and other services into and out of Google Cloud. Get advanced performance, troubleshooting, security, and business statistics with Log Statistics, which integrates the power of BigQuery into Cloud Logging. Cloud Monitoring provides visibility into the performance, uptime, and overall health of cloud-based applications. Collects metrics, events, and metadata from Google Cloud services, hosted uptime polls, application instrumentation, and various common application components.Starting Price: $0.2580 per MiB
-
30
TrueSight Operations Management
BMC Software
TrueSight Operations Management delivers end-to-end performance monitoring and event management. It uses AIOps to dynamically learn behavior, correlate, analyze, and prioritize event data so IT operations teams can predict, find and fix issues faster. Identify data anomalies and predictively alert to remediate issues before service impact. TrueSight Infrastructure Management helps you detect and address performance abnormalities before they impact the business. It automatically learns the behavior of your infrastructure, telling you what’s normal, and only issues alerts when behavior needs attention. This helps you focus on the events that matter most to IT and the business. TrueSight IT Data Analytics uses machine-assisted analysis for log data, metrics, events, changes, and incidents. You can automatically sift through millions of messages with a single click to solve problems faster. -
31
Microsoft Entra ID Protection
Microsoft
Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access. Extend risk-based adaptive access policies to help protect against malicious actors. Safeguard sensitive access with high-assurance authentication methods. Export intelligence back into any Microsoft or other security information and event management (SIEM) and extended detection and response (XDR) tools for further investigation. Elevate your identity security with a comprehensive snapshot of prevented identity attacks and common attack patterns in an easily digestible dashboard. Secure access for any identity, from anywhere, to any resource across the cloud and on-premises. -
32
Collecteurs
Collecteurs
Collecteurs, The Collective Museum of Private Collections, offers free and paid cloud-based art collection management solutions with an easy to use interface as well as a platform for collectors to exhibit their collections and connect with other collectors and galleries. Our Emerging account is free and offers a new alternative to existing art collection management models with a social presence. We also offer a gallery management software, for galleries to share their exhibitions and keep an inventory of artworks in their roster. Gallery accounts are invite-only, but they can request an invite through our pricing page.Starting Price: Free for Collectors, Invite-only for Galleries -
33
LogGRIFFIN
Secuve
LogGRIFFIN is the solution for consolidated log management capable of big data analysis. It provides real-time log collection to prevent audit logs generated by multiple heterogeneous networks and servers from modification or forgery, and analyzes these collected and stored logs to support incident response, audit trail, and/or legal compliance. Adjusting log-collecting speed of log-collecting agents according to CPU workload of log-collecting servers. Support for encrypted communication between log-collecting agents and log-collecting servers. Supporting big data processing through distributed search engine. Support for defining PROPERTY about new log formats and for analyzing them. User-defined correlation analysis of non-conformative logs based on dynamic analytic chains. Real-time detection and analysis of correlation. -
34
OpenText ZENworks Endpoint Security Management provides fine-grained, policybased control over all your Windows desktop and mobile PCs—including the ability to automatically change security configurations depending on a user’s role and location. By creating and managing policies from a central console, ZENworks makes it possible to implement and enforce tightly controlled, highly adaptive security policies without placing any configuration or enforcement burden on end users. ZENworks Endpoint Security Management also features robust client selfdefense capabilities that provide assurance that security policies are not circumvented; in addition, it has a complete suite of monitoring, alert, reporting, and auditing tools. Bring comprehensive, centralized security to your most vulnerable IT assets—the mobile PCs at the edges of your organization.
-
35
OpenText Security Log Analytics
OpenText
OpenText™ Security Log Analytics is a scalable and user-friendly security operations platform designed to accelerate threat detection through comprehensive log management and big data analytics. It features a natural language-like querying interface that simplifies complex data searches, enabling security teams to visualize and analyze security events quickly and efficiently. The core columnar database ensures data immutability, enhancing trust and integrity in log management. This solution helps reduce analyst fatigue by streamlining threat hunting processes and automating repetitive remediation tasks. Integrated compliance reporting supports audit readiness for standards like GDPR, PCI, and FIPS 140-2. It also supports data ingestion from over 480 sources, providing a unified and normalized view for enhanced security visibility. -
36
Porto Venere
Porto Venere
The straightforward tool for collectors to record and preserve important information and artefacts to protect the value of their passion-based assets. Share your passion with friends or interested buyers through private and publicly shared collections. Your information is your business. Our most important concern is the protection and confidentiality of collectors’ data. Porto Venere can also manage collections of antiques, vintage cars, jewelry, coins, and more. -
37
VirtualMetric
VirtualMetric
VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. The platform’s scalable architecture, with features like zero data loss and long-term compliance storage, ensures that businesses can maintain high security standards while optimizing performance.Starting Price: Free -
38
Logflare
Logflare
Never get surprised by a logging bill again, collect for years, query in seconds. Costs escalates quickly with typical log management solutions. To setup long term analytics on events you need to archive to a CSV and setup another data pipeline to ingest events into a custom tailored data warehouse. With Logflare and BigQuery there is no setup for long term analytics. You can ingest immediately, query in seconds and store data for years. Use our Cloudflare app and catch every request to your web service no matter what. Our Cloudflare App worker doesn't modify your request, it simply pulls the request/response data and logs to Logflare asynchronously after passing your request through. Want to monitor your Elixir app? Our library adds minimal overhead. We batch logs and use BERT binary serialization to keep payload size and serialization load low. When you sign in with your Google account, we give you access to your underlying BigQuery table.Starting Price: $5 per month -
39
CRYPTOLOG
Crypttech
One of the major needs of businesses is a convenient log management system that collects logs of the IT systems in the organization and analyzes them to meet legal regulations and industry standards. CRYPTOLOG complies with public & sectoral requirements and offers unified and easy-to-use search, analysis, correlation options that can be customized to the needs and size of the IT systems. CRYPTOLOG makes it easy to identify potential security threats from log data to conduct forensic investigations. CRYPTOLOG is a cost-effective integrated log management system that helps you meet regulatory compliance on the one hand, while reducing your security risks in a variety of IT environments. With its fast and powerful engines, CRYPTOLOG brings together a wide range of log and events to give you a comprehensive view of all your network activities on a customizable panel. -
40
Splunk On-Call
Cisco
Empower teams by routing alerts to the right people for fast collaboration and issue resolution. Deliver the right alerts to the right people reducing time to acknowledge and resolve incidents. Complete ChatOps experience, integration with the tools you already have, incident timelines and reporting for blameless post-incident reviews. Engage people where they work. Mobile-first experiences leverage machine learning to make on-call accessible wherever you are. Splunk On-Call automates incident management, reducing alert fatigue and increasing uptime. Use Splunk On-Call to streamline your on-call schedules and escalation policies. From rotations to overrides, we automate all the essentials. Our software provides contextual alert information, suggestions driven from machine learning, and empowers collaboration to solve problems with speed and efficiency, all while capturing essential remediation data.Starting Price: $27.00/month/user -
41
LogMan.io
TeskaLabs
TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning. -
42
Network Detective Pro
RapidFire Tools, a Kaseya Company
Automate collection of data across the entire network to identify and respond to risk. Network Detective Pro is an IT assessment solution that identifies risks and issues, scores their severity and presents them in actionable dashboards and dynamic reports. Enhance network visibility and gather data from across the IT environments you manage. With Network Detective Pro you can uncover, prioritize, and manage risks and issues. Ensure the integrity of your systems with automated data collectors. Network Detective Pro uses non-intrusive data collectors, light-weight discovery agents, and powerful scanners to identify risks quickly. Reduce risk efficiently with detailed management plans and remediation guidance that scores network threats and issues based on severity. Customize which IT issues are reported and the importance that they are given in an assessment. -
43
SplashCollect
SplashDev
SplashCollect on Premise is a full-blown Debt Collection solution for those companies that require a solution that is scalable and that needs to be managed on their own location or Private Cloud environment. It contains all the functionalities as described plus it can be completely customized to your business processes and flows. SplashCollect on Premise is built on Microsoft Dynamics 365 Customer Service and has a rich range of features and capabilities standard available. SplashCollect in the Cloud is for smaller debt collectors that do not have the infrastructure to manage the solution themselves or do not have the budget or need for self-managed hardware and software. SplashCollect Cloud provides standard processes for debt collection and can be customized in a limited way. SplashCollect Cloud is built on the Microsoft Dynamics 365 Business Central platform. SplashCollect Cloud has an affordable subscription model.Starting Price: $15 per user per month -
44
ArtMoi
ArtMoi
Artwork portfolio building software lets artists, art galleries, collectors and arts organizations manage their inventory, images and art catalogues. As a cloud-based platform, ArtMoi provides professional artists, collectors, and galleries with all of the tools needed to catalogue, organize, track, and share provenance based information in one place. ArtMoi is a creation registry platform which can track a work of art or any collectible object over its lifetime. Our goal is to become an ISBN-type system for visual arts and high valued collectibles. Every piece of art that gets uploaded into ArtMoi is assigned a globally unique ID number so that all of the information surrounding a single work of art can be tracked over time. With this we are working to create a new industry standard that is controlled by artists for the long term provenance tracking of art.Starting Price: $1.00/month/user -
45
WithSecure Elements Infinite
WithSecure
WithSecure Elements Infinite provides a comprehensive suite of security tools and capabilities as a continuous Managed Detection and Response (MDR) service that includes responding 24/7 to cyber security incidents and improving customers security posture through Continuous Threat Exposure Management (CTEM). Elements Infinite’s proprietary Endpoint Detection & Response (EDR) agent and log collectors feed data into our XDR detection platform, offering exceptional visibility into user, endpoint, cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way. -
46
NBA Top Shot
NBA Top Shot
Thousands of NBA Fans from around the world collecting over 7.6 million Top Shot moments. Start building your roster of Rookies, Vets, and Rising Star Players. Supercharge your collection by buying packs of NBA Top Shot Moments. Grab a pack and secure this season's most coveted plays first. Give your starting five superpowers by equipping them with epic skills from your collection of Top Shot Moments. It’s a new era in fandom. And it’s about more than repping your favorite teams and players. For the first time, you can own the NBA’s greatest highlights. Giannis' slams. Luka's dimes. Kyrie's crossovers. Every night, an NBA star does something so amazing you need to watch the highlight on repeat. Now you can make those plays yours, all officially licensed by the NBA and minted on the blockchain in limited supply. Only a scarce number of Top Shot Moments are released, so building the best collection requires a scout’s eye and a superstar’s dedication. Become a top collector. -
47
Contract Collector
Graveco
Automate your entire installment loan servicing process with Contract Collector v5 from Graveco Software, Inc. It’s the most advanced, feature-rich and easy to use contract collection/ loan servicing software available. Contract Collector is a comprehensive system that manages all types of installment loans, notes, contracts, mortgages, deeds of trust, as well as any number of clients and contracts, and all types of payments. Every process is streamlined – from entering new clients, companies and contracts, to printing client statements, deposit slips, and payment coupons. Contract Collector users include banks, auto dealerships, finance companies, mortgage companies, private investors, and anyone who tracks installment payments. For large organizations, it is a cost-effective way to automate loan collection processing. For organizations of any size, Contract Collector is the best solution for loan servicing. -
48
AWS CloudTrail
Amazon
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting. Detect unauthorized access using the Who, What, and When information in CloudTrail Events. Respond with rules-based EventBridge alerts and automated workflows. Continuously monitor API usage history using machine learning (ML) models to spot unusual activity in your AWS accounts, and determine root cause. -
49
Totality
Totality Software
Totality quickly and easily adapts to your needs. Law firms, collection agencies, and businesses — medical and dental practices, real property management, and more — use Totality debt collection software to manage their collection activities. Get Totality debt collection software with just the right set of features to match your needs. Collection law practices need Totality with its court and lawsuit features, while collection agencies and businesses managing their own collection activities will appreciate Totality Collector designed specifically for them. Our debt collection program is the most affordable collection agency software and law firm software, and it is the easiest to learn. You will master Totality in minutes. If you handle collections, then you need Totality debt collections software or Totality Collector collection agency software— the easy to use debt collection software for law firms and collection agencies.Starting Price: $599 one-time payment -
50
MPA Tools
Veles Software Ltd
MPA Tools offers a comprehensive and unified solution for device management across multiple platforms, giving IT professionals a single, powerful interface to manage their entire endpoint landscape. Whether your organization relies on traditional Active Directory, modern Entra ID, Configuration Manager (MECM), or Microsoft Intune, MPA Tools seamlessly integrates with all of them—eliminating the complexity of juggling multiple consoles or inconsistent management workflows. Designed for environments where devices are scattered across hybrid or cloud-first infrastructures, MPA Tools brings everything together into one streamlined experience. Administrators gain the ability to deploy software, manage configurations, perform maintenance tasks, and troubleshoot issues in real time, all without switching tools or losing visibility. The platform delivers deep insights, advanced remote management capabilities, and intuitive controls, allowing IT teams to work faster, reduce downtime, and impStarting Price: $500