Apps tagged with 'threat-monitoring'

All apps in Apps tagged with 'threat-monitoring' category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Graylog icon
     43 likes

    Graylog is a powerful Security Information and Event Management (SIEM) solution offering a robust log analytics platform that simplifies the collection, search, analysis, and alerting of all types of machine-generated data.

    Cost / License

    • Freemium
    • Proprietary

    Application type

    Platforms

    • Self-Hosted
    • Online
    • Software as a Service (SaaS)
    Graylog screenshot 1
    Graylog screenshot 1
    Graylog screenshot 2
    +3
    Graylog screenshot 3
  2. AbuseIPDB icon
     4 likes

    AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
    AbuseIPDB screenshot 1
    AbuseIPDB screenshot 1
    AbuseIPDB screenshot 2
    +1
    AbuseIPDB screenshot 3
    42 alternatives
  3. Cowrie icon
     1 like

    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

    Cost / License

    • Free
    • Open Source

    Platforms

    • Linux
    10 alternatives
  4. Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    Thinkst Canary screenshot 1
    10 alternatives
  5. Gravwell icon
     4 likes

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Linux
    • Online
    • Self-Hosted
    • Software as a Service (SaaS)
    Gravwell screenshot 1
    Gravwell screenshot 1
    Gravwell screenshot 2
    +1
    Gravwell screenshot 3
    18 alternatives
  6. Sift Security enables SOC, Incident Response and Threat Hunting teams to get their jobs done faster and with less frustration. Sift Security uniquely leverages AI and Graph Analytics to prioritize threats, accelerate investigations, and take action.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
    Sift Security screenshot 1
    Sift Security screenshot 1
    Sift Security screenshot 2
    4 alternatives
  7. EventLog Analyzer collects, archives and displays huge amount of network logs (Syslog and SNMP trap) and help net and system admins in identifying security incidents, policy violations, and operational issues.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    • Linux
    NetVizura EventLog Analyzer - syslog
    NetVizura EventLog Analyzer - syslog filtering
    NetVizura EventLog Analyzer - syslog severity filtering
    +1
    NetVizura EventLog Analyzer - configuration
    8 alternatives
  8. Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security...

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
    ThreatDefence XDR screenshot 1
    ThreatDefence XDR screenshot 1
    ThreatDefence XDR screenshot 2
    +3
    ThreatDefence XDR screenshot 3
    4 alternatives
  9. Deception technology for early and accurate threat detection of in-network threats. Decoys, endpoint, application, and data deceptions deceive and detect attackers.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
    10 alternatives
  10. Kippo icon
     Like

    Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

    Cost / License

    • Free
    • Open Source

    Alerts

    • Discontinued

    Platforms

    • Linux
    6 alternatives
  11. Free threat intelligence platform that aggregates 4000+ cybersecurity sources, clusters related articles, and delivers daily digests on APTs, ransomware, CVEs, and emerging threats.

    Cost / License

    • Free
    • Proprietary

    Platforms

    • Online
    ThreatCluster news feed - showing trending cyber security news from 4000+ sources. Duplicate articles are merged together into one unified ThreatCluster.
    An example Threat Cluster - showing multiple sources talking about the same topic, grouped together into one unified page. You are able to view what each source is saying directly from this page. On the right hand side you will see extracted 'entities' - keywords that appear in the articles, such as malware, CVEs, ransomware groups, APT groups (and 17 other types) intelligently extracted.
    The entities page - highlighting the different types of entities and IOCs that are automatically extracted from articles. This system used a mix of techniques to be able to identify and extract known, as well as new mentions of keywords such as new and emerging malware, ransomware, APT groups, and many more.
    +5
    An example entity page, which generates an AI summary based on the articles mentioning this entity, a mentions over time to see how the entity is trending, and associated clusters and articles.
  12. Continuously identify vulnerabilities and simulate attack scenarios across your digital assets so you're always a step ahead.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    Asterisk.so screenshot 1
    9 alternatives
  13. Online brand protection powered by AI to combat phishing, fraud, counterfeiting & cyber threats. Ensure your brand remains secure.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
    • Software as a Service (SaaS)
    8 alternatives
  14. Aves Netsec icon
     1 like

    Aves is a cloud-based cyber deception platform used to deploy and manage deception decoys in your on-premise & cloud environments.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Windows
    • Linux
    • Online
    • Software as a Service (SaaS)
    Aves Netsec screenshot 1
    6 alternatives