Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Exabeam helps teams to outsmart the odds, by adding intelligence and business products such as SIEMs, XDRs and cloud data lakes. Use case coverage that is out-of-the box consistently delivers positive results. Behavioral analytics allows teams to detect malicious and compromised users that were previously hard to find. New-Scale Fusion is a cloud-native platform that combines New-Scale SIEM with New-Scale Analytics. Fusion integrates AI and automation into security operations workflows, delivering the industry's leading platform for threat detection and investigation and response (TDIR).

Description

SureLog SIEM offers a powerful suite of capabilities designed for modern log and event management, providing real-time analysis of log event data to identify and thwart security threats. By integrating events from diverse log sources, SureLog Enterprise efficiently correlates and aggregates these events into standardized alerts, enabling swift notifications to your IT and security personnel. Among its advanced features are real-time event management, behavioral analytics for entities and users, machine learning integration, incident management, threat intelligence, and comprehensive reporting tools. With an extensive library of over 2000 preconfigured correlation rules, SureLog Enterprise supports a wide array of security, privacy, and compliance scenarios. Additionally, it offers thorough visibility into logs, data flow, and events across various environments, including on-premise systems, IoT devices, and cloud infrastructures. Compliance with regulations such as PCI, GDPR, HIPAA, SOX, and PIPEDA is streamlined through pre-built reporting capabilities, ensuring organizations can automatically identify threats and maintain robust security measures. This comprehensive approach not only enhances security posture but also simplifies the complexity of managing diverse compliance requirements across different sectors.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Armis Centrix
BeyondTrust Cloud Privilege Broker
Blink
Carbon Black EDR
Corelight
Cylera Platform
Cyware
DNSSense
Google Digital Risk Protection
Joe Sandbox
LogRhythm SIEM
Nozomi Networks
Observo AI
Optiv Managed XDR
Pentera
Proofpoint Adaptive Email Security
Recorded Future
SmartShare
Trustwave DbProtect
urlscan.io

Integrations

Armis Centrix
BeyondTrust Cloud Privilege Broker
Blink
Carbon Black EDR
Corelight
Cylera Platform
Cyware
DNSSense
Google Digital Risk Protection
Joe Sandbox
LogRhythm SIEM
Nozomi Networks
Observo AI
Optiv Managed XDR
Pentera
Proofpoint Adaptive Email Security
Recorded Future
SmartShare
Trustwave DbProtect
urlscan.io

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Exabeam

Founded

2010

Country

United States

Website

www.exabeam.com

Vendor Details

Company Name

Surelog

Founded

2012

Country

Canada

Website

surelog.ca

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Cogility Cogynt Reviews

Cogility Cogynt

Cogility Software

Alternatives

TeskaLabs SIEM Reviews

TeskaLabs SIEM

TeskaLabs
Huntsman SIEM Reviews

Huntsman SIEM

Huntsman Security