Loading...
SIEM platforms for centralized security log management, correlation, alerting, and compliance reporting.
Browse 151 security information and event management tools
Security data pipeline platform for collecting, curating, and routing logs
Security data pipeline platform for collecting, curating, and routing logs
Managed Prometheus monitoring service for cloud-native apps and Kubernetes
Managed Prometheus monitoring service for cloud-native apps and Kubernetes
Cloud-native system call and audit log analysis tool based on Wireshark
Cloud-native system call and audit log analysis tool based on Wireshark
Cloud-native data analytics platform for security and digital ops management
Cloud-native data analytics platform for security and digital ops management
AI-driven DNS threat intel analysis platform for SOC alert reduction
AI-driven DNS threat intel analysis platform for SOC alert reduction
SIEM solution for threat detection, log management, and compliance reporting
SIEM solution for threat detection, log management, and compliance reporting
Managed SIEM service with 24/7 AI-assisted SOC for threat monitoring
Managed SIEM service with 24/7 AI-assisted SOC for threat monitoring
SIEM solution for log management, threat detection, and compliance reporting
SIEM solution for log management, threat detection, and compliance reporting
AI-driven SIEM platform for real-time threat detection and response
AI-driven SIEM platform for real-time threat detection and response
AI-powered security platform for natural language queries across petabytes of data
AI-powered security platform for natural language queries across petabytes of data
SIEM platform with native threat intel, AI analytics, and Security Data Lake
SIEM platform with native threat intel, AI analytics, and Security Data Lake
File integrity monitoring for Windows, Linux & network devices
File integrity monitoring for Windows, Linux & network devices
AI-powered SIEM platform for log management, threat detection, and IT ops
AI-powered SIEM platform for log management, threat detection, and IT ops
AI-powered SIEM, API security, and log management platform
AI-powered SIEM, API security, and log management platform
AI-powered SIEM, API security, and log management platform
AI-powered SIEM, API security, and log management platform
AI-powered SIEM, API security, and log management platform
AI-powered SIEM, API security, and log management platform
Enterprise log management appliance for collecting, indexing, and searching logs
Enterprise log management appliance for collecting, indexing, and searching logs
Enterprise log management software for collecting and centralizing log data
Enterprise log management software for collecting and centralizing log data
Open-source log collection, processing, and forwarding tool for log management
Open-source log collection, processing, and forwarding tool for log management
Cloud-based platform for search, observability, and security use cases
Cloud-based platform for search, observability, and security use cases
Search AI platform with vector database for logs, threat hunting, and AI apps
Search AI platform with vector database for logs, threat hunting, and AI apps
Observability platform for logs, metrics, traces, and APM with AI-driven analysis
Observability platform for logs, metrics, traces, and APM with AI-driven analysis
Log parsing and processing platform for observability and incident response
Log parsing and processing platform for observability and incident response
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Common questions about Security Information and Event Management tools including selection guides, pricing, and comparisons.
SIEM platforms for centralized security log management, correlation, alerting, and compliance reporting.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox