Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Log360 Reviews & Ratings
    168 Ratings
    Company Website
  • Graylog Reviews & Ratings
    417 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    210 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    4,659 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ThreatLocker Reviews & Ratings
    684 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    521 Ratings
    Company Website
  • New Relic Reviews & Ratings
    2,913 Ratings
    Company Website
  • Guardz Reviews & Ratings
    118 Ratings
    Company Website

What is Logsign?

Founded in 2010, Logsign has dedicated itself to enhancing the cyber defense capabilities of various institutions. The company promotes the idea that effective cyber security requires collaboration and that security solutions should be designed with intelligence in mind. Logsign remains devoted to this mission through ongoing innovation, user-friendly interfaces, and smart technological solutions. By understanding the diverse needs of its stakeholders, Logsign positions itself as a collaborative partner in the field. Its extensive services cater to over 500 medium and large enterprises as well as government agencies, encompassing offerings such as Security Information and Event Management (SIEM), Security Orchestration, Automation, and Event Intervention (SOAR). Additionally, Logsign has received numerous accolades from both domestic and international organizations, including recognitions from Deloitte Technology Turkey Fast 50, Deloitte Technology EMEA Fast 500, Cybersecurity Excellence, and Info Security Products Guide, underscoring its impact and excellence in the technology and cybersecurity sectors. This recognition not only highlights the company's successful journey but also reinforces its commitment to providing top-notch security solutions.

What is Cyberoo?

At CYBEROO, we represent a fusion of disruption, expertise, and reliability, dedicated to safeguarding your organization through our commitment symbolized by four watchtowers that protect your critical information. Our innovative approach to Cyber Security employs a multi-layered defense mechanism crafted to shield your business from various threats, placing you ahead in our mission to simplify complexities. Our expert I-SOC operates seamlessly throughout the year, delivering straightforward and efficient services to meet your needs. By harnessing cutting-edge artificial intelligence, our intelligent monitoring system automates the detection and diagnosis of anomalies, mitigating inefficiencies across your infrastructure, services, and applications. This forward-thinking strategy not only fortifies your security posture but also helps to lower management expenses. Furthermore, we offer a wide array of managed services, enabling clients to customize their solutions according to the unique requirements of their IT environments, ensuring we are on hand to manage and ease your challenges at any time. Our unwavering dedication is to empower your business with resilient solutions that promote both stability and growth while adapting to ever-changing digital landscapes.

Media

Media

Integrations Supported

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption

Integrations Supported

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Logsign

Date Founded

2010

Company Location

Netherlands

Company Website

www.logsign.com

Company Facts

Organization Name

CYBEROO

Date Founded

2008

Company Location

Italy

Company Website

cyberoo.com

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

SentryXDR Reviews & Ratings

SentryXDR

Logically
RocketCyber Reviews & Ratings

RocketCyber

Kaseya