Loading...
Explore 56 curated cybersecurity tools, with 14,604 visitors searching for solutions
SIEM platform for log management, threat detection, and security monitoring
SIEM platform for log management, threat detection, and security monitoring
Security operations platform combining SIEM, UEBA, and SOAR capabilities
Security operations platform combining SIEM, UEBA, and SOAR capabilities
Retraced is an audit logging solution that provides compliant, searchable audit trails for applications with client libraries for Go and JavaScript.
Retraced is an audit logging solution that provides compliant, searchable audit trails for applications with client libraries for Go and JavaScript.
Log management appliance for collecting, storing, searching, and auditing logs
Log management appliance for collecting, storing, searching, and auditing logs
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
A Security Information and Event Management (SIEM) system with a focus on security and minimalism.
A Security Information and Event Management (SIEM) system with a focus on security and minimalism.
A method for log volume reduction without losing analytical capability.
A method for log volume reduction without losing analytical capability.
A command-line tool for searching AWS CloudWatch logs using pattern matching with configurable parameters for log groups, time ranges, and regions.
A command-line tool for searching AWS CloudWatch logs using pattern matching with configurable parameters for log groups, time ranges, and regions.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure