Security Information Event Managers: All Listings 

Results 21 - 27 of 27 This Category · All Listings
Filter listings...
Open Source
Pricing Model

OSSIM provides all of the features that a security professional needs from a SIEM offering – event collection, normalization, and correlation. Established and launched by security engineers out of necessity, OSSIM was created with an understanding of the ...

Modified
OSSIM™ - Open Source SIEM
EMC Corporation
Commercial
Pricing Model

By bringing together security information event management (SIEM) , network security monitoring, and combining them with the advanced analysis capabilities of a data security warehouse and integrated threat intelligence, RSA Security Analytics helps secur ...

Modified
RSA Security Analytics
Security Onion Solutions LLC

Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The ...

Modified
Security Onion
Commercial
Pricing Model

AlienVault USM is an all-in-one platofrm designed and priced to ensure that mid-market organisations can effectively defend themselves against todays' advanced threats. The AlienVault (USM) platform provides five security capabilities in a single console ...

Modified
AlienVault Unified Security Mangement
Netmonastery NSPL
Commercial
Pricing Model

NETMONASTERY (NM) is a industry leader in the cyber th002, NM has been providing real-time threat detection and analytics to the most critical data assets on the Internet. CNAM, a SaaS delivered SIEM, is built ground up for threat management and is used e ...

Modified
CNAM - Threat Defense Platform
Quadrant Information Security
Open Source
Pricing Model

Sagan is an open source (GNU/GPLv2) high performance, real-time log analysis & correlation engine that run under *nix operating systems (Linux/FreeBSD/OpenBSD/etc). It is written in C and uses a multi-threaded architecture to deliver high performance log ...

Modified

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

Modified
LogRhythm Threat Lifecycle Management

© Computer Network Defence Limited 2021