Loading...
Explore 9 curated cybersecurity tools, with 15,336 visitors searching for solutions
Real-time threat detection and telemetry routing platform for security data
Real-time threat detection and telemetry routing platform for security data
Data analytics platform for security operations with search and automation
Data analytics platform for security operations with search and automation
AI-powered data pipeline manager for security log processing and routing
AI-powered data pipeline manager for security log processing and routing
Cloud-scale SOAR platform ingesting & correlating data for instant threat response
Cloud-scale SOAR platform ingesting & correlating data for instant threat response
AI-powered XDR platform for unified threat detection and response
AI-powered XDR platform for unified threat detection and response
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Data pipeline mgmt for SOC transformation with real-time data processing
Data pipeline mgmt for SOC transformation with real-time data processing
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.
Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.
Unfetter is a reference implementation framework that collects events from client machines and performs CAR analytics using an ELK stack with Apache Spark to detect potential adversary activity.
Unfetter is a reference implementation framework that collects events from client machines and performs CAR analytics using an ELK stack with Apache Spark to detect potential adversary activity.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure