What is Gravwell?

Gravwell serves as a comprehensive data fusion platform designed for thorough context and root cause analysis of both security and business information. It was developed to ensure that all customers, regardless of their size or the nature of their data—be it binary or textual, security-related or operational—can harness the advantages of machine data. The collaboration between seasoned hackers and big data specialists enables the creation of an unparalleled analytics platform capable of delivering insights that were previously unimaginable. Offering security analytics that extend beyond mere log data, Gravwell also encompasses industrial processes, vehicle fleets, and IT infrastructure, providing a holistic approach to data analysis. If you need to investigate an access breach, Gravwell can utilize facial recognition machine learning to analyze camera footage, effectively identifying multiple individuals who may enter a facility using just one badge. Additionally, it has the capability to correlate building access logs for comprehensive oversight. Our mission is to assist those who seek more than simple text log searches and desire timely solutions that fit within their budgetary constraints. By leveraging advanced technology, Gravwell empowers organizations to enhance their security measures and operational efficiency like never before.

Pricing

Free Version:
Free Version available.

Screenshots and Video

DNS activity heat map

DNS activity heat map

Company Facts

Company Name:
Gravwell
Company Location:
USA
Company Website:
gravwell.io
Edit This Page

Product Details

Deployment
SaaS
Windows
Mac
Linux
iPhone
iPad
Android
Training Options
Documentation Hub
Online Training
On-Site Training
Support
Standard Support
Web-Based Support

Product Details

Target Company Sizes
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Enterprise
Supported Languages
English

Gravwell Categories and Features

Network Security Software

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Log Management Software

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance