Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 74 Ratings

Media

Media

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Box
Check Point Infinity
Dropbox
F5 BIG-IP SSL Orchestrator
FortiSandbox
GateScanner
Gmail
Google Drive
LinkedIn
MITRE ATT&CK
Microsoft Azure
Microsoft Entra ID
Microsoft Exchange
Microsoft Outlook
SAP Store
Slack
X (Twitter)
Yahoo! Mail

Integrations Supported

Active Directory
Amazon Web Services (AWS)
Box
Check Point Infinity
Dropbox
F5 BIG-IP SSL Orchestrator
FortiSandbox
GateScanner
Gmail
Google Drive
LinkedIn
MITRE ATT&CK
Microsoft Azure
Microsoft Entra ID
Microsoft Exchange
Microsoft Outlook
SAP Store
Slack
X (Twitter)
Yahoo! Mail

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Menlo Security

Date Founded

2013

Company Location

United States

Company Website

www.menlosecurity.com

Company Facts

Organization Name

Zoho

Date Founded

1996

Company Location

India

Company Website

www.manageengine.com/log-management/siem-solution-log360.html

Categories and Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

VersaONE Reviews & Ratings

VersaONE

Versa Networks
Kasm Workspaces Reviews & Ratings

Kasm Workspaces

Kasm Technologies