Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Exabeam helps teams to outsmart the odds, by adding intelligence and business products such as SIEMs, XDRs and cloud data lakes. Use case coverage that is out-of-the box consistently delivers positive results. Behavioral analytics allows teams to detect malicious and compromised users that were previously hard to find. New-Scale Fusion is a cloud-native platform that combines New-Scale SIEM with New-Scale Analytics. Fusion integrates AI and automation into security operations workflows, delivering the industry's leading platform for threat detection and investigation and response (TDIR).

Description

iSecurity assists organizations in safeguarding their critical information assets from insider threats, unauthorized external access, and both intentional and accidental modifications to essential data in key business applications by providing immediate notifications to designated recipients. The real-time Syslog alerts generated by all iSecurity modules are seamlessly integrated with top-tier SIEM/DAM solutions like IBM’s Tivoli, McAfee, RSA enVision, Q1Labs, and GFI Solutions, and have undergone testing with other platforms such as ArcSight, HPOpenView, and CA UniCenter. Furthermore, iSecurity is compatible with Imperva SecureSphere DAM, which enhances security measures. The integration of SIEM products for detailed forensic analysis of security incidents has become a crucial need for businesses globally; Raz-Lee’s iSecurity suite has effectively supported Syslog-to-SIEM integration for many years, demonstrating reliable compatibility with various SIEM solutions. It also offers support for the two primary standards in the field – LEEF (IBM QRadar) and CEF (ArcSight), which are also widely accepted in numerous other SIEM platforms. This robust integration ensures that organizations are well-equipped to monitor and respond to potential security threats in real time.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amplifier Security
Armis Centrix
Carbon Black EDR
Code42 Incydr
Cyware
Elevate Security
Google Digital Risk Protection
IBM Tivoli Monitoring
Indent
Logsign
McAfee Total Protection
Nozomi Networks
ORDR
Observo AI
OpenText Enterprise Security Manager
Proofpoint Adaptive Email Security
RSA SecurID
Spoom
ThreatConnect Risk Quantifier (RQ)
urlscan.io

Integrations

Amplifier Security
Armis Centrix
Carbon Black EDR
Code42 Incydr
Cyware
Elevate Security
Google Digital Risk Protection
IBM Tivoli Monitoring
Indent
Logsign
McAfee Total Protection
Nozomi Networks
ORDR
Observo AI
OpenText Enterprise Security Manager
Proofpoint Adaptive Email Security
RSA SecurID
Spoom
ThreatConnect Risk Quantifier (RQ)
urlscan.io

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Exabeam

Founded

2010

Country

United States

Website

www.exabeam.com

Vendor Details

Company Name

Raz-Lee Security

Founded

1983

Country

United States

Website

www.razlee.com/siemdam-support/

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

IT Alerting

Alert Noise Reduction
Alert Routing
Dynamic Notifications
Enriched Incident Context
Escalation Policies
Incident History Audit
Multi-User Alerting
Multiple Alert Types
On-Call Management
Rich HTML Email Notifications

Alternatives

Cogility Cogynt Reviews

Cogility Cogynt

Cogility Software

Alternatives

iSecurity Audit Reviews

iSecurity Audit

Raz-Lee Security
iSecurity AP-Journal Reviews

iSecurity AP-Journal

Raz-Lee Security
Huntsman SIEM Reviews

Huntsman SIEM

Huntsman Security