Azure ad alternative with user management, web app sso, cloud ldap, saas radius, gpo-like policies for mac, linux, and windows, 2fa, & more.

Powertech is the world’s leading provider of automated security and compliance solutions for linux, aix, and ibm i. with powertech, you can manage evolving data privacy threats while saving your valuable it resources.

Logsign is a security orchestration, automation and response (soar) platform with next-gen security information and event management (siem) solution.

See why rsa is the cyber security market leader and how digital risk management is the next cyber security frontier. get best practices & research here.

Eventlog analyzer is a comprehensive log management solution withreal-time threat detection and analysis. it can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management pl... Read more

Log360, an integrated solution that combines adaudit plus and eventlog analyzer into a single console, is the one-stop solution for all log management & network security challenges. it offers real-time log collection, analysis, correlation,... Read more

DNIF

starstarstarstarstar_half keyboard_arrow_down
$84.00/mo

Dnif is a first of its kind next gen siem with advanced security analytics and response automation that’s built on big data analytics platform for real-time threat detection and response. get the siem you always wanted.

Splunk

starstarstarstarstar_half keyboard_arrow_down
$86.00/mo

Splunk inc. the data-to-everything platform turns data into action, tackling the toughest it, iot, security and data challenges.

AlienVault USM

star_outlinestar_outlinestar_outlinestar_outlinestar_outline keyboard_arrow_down
$3.00/one-time

At at&t cybersecurity our mission is to provide phenomenal threat intelligence, collaborative defense & effective security for organizations of all sizes.

Logrhythm's security intelligence and analytics platform enables organizations to detect, contain and neutralize cyber threats with threat lifecycle management.