Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Our next generation Enterprise SIEM is trusted by government departments and defence agencies, as well as businesses worldwide. It provides a simple way to implement and manage cyber threat detection and response solutions for your organisation. Huntsman Security's Enterprise SIEM features a new dashboard that includes the MITRE ATT&CK®, allowing IT teams and SOC analysts to identify threats and classify them. As cyber-attacks become more sophisticated, threats are inevitable. That's why we developed our next generation SIEM to improve the speed and accuracy of threat detection. Learn about the MITRE ATT&CK®, and its crucial role in mitigation, detection, and reporting on cyber security operations.

Description

Scanner.dev is a cloud-based security data lake and a streamlined security information and event management (SIEM) platform that allows users to index logs directly into their Amazon S3 storage, thereby enabling the retention of unlimited logs and facilitating full-text searches across vast amounts of data in mere seconds, all without the need for additional ETL processes or schema setups. With its lightweight indexing system, any log format can be made immediately searchable, and it offers rapid search capabilities, ongoing threat detection through customizable detection rules that can be managed as code via GitHub, and seamless alerting with APIs for automation and existing security workflow integration. The platform's streaming detection engine constantly assesses rule queries in nearly real time and is equipped to backtest detection logic using historical data. Furthermore, its API and Model Context Protocol (MCP) not only provide programmatic access but also allow for AI-assisted evaluation of security data, enhancing the overall security analysis process. This robust architecture ensures that organizations can effectively manage and respond to security threats with agility and precision.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

1Password
AWS CloudTrail
Amazon S3
Amazon Web Services (AWS)
Auth0
Check Point IPS
Check Point Infinity
Cisco Identity Services Engine (ISE)
Claude
Claude Code
Cloudflare
GitHub
Google Cloud Platform
Google Workspace
Microsoft Azure
Model Context Protocol (MCP)
Okta
PagerDuty
ServiceNow

Integrations

1Password
AWS CloudTrail
Amazon S3
Amazon Web Services (AWS)
Auth0
Check Point IPS
Check Point Infinity
Cisco Identity Services Engine (ISE)
Claude
Claude Code
Cloudflare
GitHub
Google Cloud Platform
Google Workspace
Microsoft Azure
Model Context Protocol (MCP)
Okta
PagerDuty
ServiceNow

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$30,000 per year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Huntsman Security

Founded

1999

Country

Australia

Website

www.huntsmansecurity.com/products/siem-enterprise/

Vendor Details

Company Name

Scanner

Founded

2022

Country

United States

Website

scanner.dev/

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives