Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 163 Ratings

Total
ease
features
design
support

What is TheHive?

TheHive is a security case management platform born inside the CSIRT of a major European financial institution to address increasingly complex cyber threats. It quickly earned the trust of the incident response community, and in 2018, its creators founded StrangeBee to fully focus on the platform’s development, working closely with the community ever since. Today, TheHive is trusted by 3500+ users worldwide, enabling them to centralize, automate and scale security operations and incident response across multiple teams, environments or clients.

What is TaskCall?

TaskCall is an all-encompassing platform designed specifically for the automation of incident response and management, catering to the needs of IT and DevOps professionals. It boasts an array of features such as on-call scheduling, AIOps functionalities, automated workflows, real-time call routing, comprehensive analytics, communication tools for stakeholders, and various integration options. Organizations across multiple sectors, including retail, healthcare, financial services, and government institutions, depend on this solution. By leveraging TaskCall, companies can significantly improve their capacity to detect, respond to, and resolve incidents promptly, which ultimately minimizes downtime and enhances teamwork among staff members. Additionally, the platform's advanced analytics capabilities allow teams to refine their incident management strategies continuously, ensuring that they are always improving their performance and efficiency. With the growing complexity of IT environments, the importance of such a solution cannot be overstated.

What is ManageEngine Log360?

Log360 is a comprehensive security information and event management (SIEM) solution designed to address threats across on-premises, cloud, and hybrid environments. Additionally, it assists organizations in maintaining compliance with various regulations like PCI DSS, HIPAA, and GDPR. This adaptable solution can be tailored to fit specific organizational needs, ensuring the protection of sensitive information. With Log360, users have the ability to monitor and audit a wide range of activities across their Active Directory, network devices, employee workstations, file servers, databases, Microsoft 365, and various cloud services. The system effectively correlates log data from multiple sources to identify intricate attack patterns and persistent threats. It includes advanced behavioral analytics powered by machine learning, which identifies anomalies in user and entity behavior while providing associated risk scores. More than 1000 pre-defined, actionable reports present security analytics in a clear manner, facilitating informed decision-making. Moreover, log forensics can be conducted to delve deeper into the origins of security issues, enabling a thorough understanding of the challenges faced. The integrated incident management system further enhances the solution by automating remediation responses through smart workflows and seamless integration with widely used ticketing systems. This holistic approach ensures that organizations can respond to security incidents swiftly and effectively.

Media

Media

Media

Integrations Supported

Microsoft Azure
Active Directory
Amazon CloudWatch
Apache Sentry
Censys
Cyral
Datadog
Filigran
Jira
Microsoft Entra ID
Microsoft Exchange
Microsoft Teams
Polarity
Recorded Future
ServiceNow
Slack
Splunk APM
Zendesk
n8n
urlscan.io

Integrations Supported

Microsoft Azure
Active Directory
Amazon CloudWatch
Apache Sentry
Censys
Cyral
Datadog
Filigran
Jira
Microsoft Entra ID
Microsoft Exchange
Microsoft Teams
Polarity
Recorded Future
ServiceNow
Slack
Splunk APM
Zendesk
n8n
urlscan.io

Integrations Supported

Microsoft Azure
Active Directory
Amazon CloudWatch
Apache Sentry
Censys
Cyral
Datadog
Filigran
Jira
Microsoft Entra ID
Microsoft Exchange
Microsoft Teams
Polarity
Recorded Future
ServiceNow
Slack
Splunk APM
Zendesk
n8n
urlscan.io

API Availability

Has API

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$9/user/month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

StrangeBee

Date Founded

2012

Company Location

France

Company Website

strangebee.com/thehive/

Company Facts

Organization Name

TaskCall

Date Founded

2021

Company Location

United States

Company Website

taskcallapp.com

Company Facts

Organization Name

Zoho

Date Founded

1996

Company Location

India

Company Website

www.manageengine.com/log-management/siem-solution-log360.html

Categories and Features

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Categories and Features

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Popular Alternatives

D3 Smart SOAR Reviews & Ratings

D3 Smart SOAR

D3 Security