We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise. | Alert Logic offers SIEMless Threat Management that connects platform, intelligence, & experts to provide the best security and peace of mind for your business. |
Very secure- We take security seriously. We use industry standard secure algorithms (HMAC RFC 4426) and 256 bits keys which are always encrypted at rest.;Fully redundant- The Authy API is deployed accross different PCI level 1 data-centers and it's fully redundant. We also use a DNS provider with anycast support. We've had 100% availability since 2011.;Great user experience- You connect to Authy using a transparent REST API which allows you to customize the experience you want for your users.;Fully mobile- We support any cellphone. We provide apps for all major phones (iPhone and Android) as well as text-messages for other cellphones.;No expensive & complex setups- Hardware dongles, servers, software licenses, setup costs...It's 2013, forget all that. Authy is bringing two-factor authentication to the present. | Threat monitoring and visibility;
Intrusion detection;
Security analytics;
Log collection and monitoring;
Office 365 log collection and search. |
Statistics | |
Stacks 162 | Stacks 12 |
Followers 174 | Followers 20 |
Votes 1 | Votes 0 |
Pros & Cons | |
Pros
Cons
| No community feedback yet |
Integrations | |

Papertrail helps detect, resolve, and avoid infrastructure problems using log messages. Papertrail's practicality comes from our own experience as sysadmins, developers, and entrepreneurs.

Get a clear overview of what is happening across your distributed environments, and spot the needle in the haystack in no time. Build dynamic analyses and identify improvements for your software, your user experience and your business.

It is a SaaS solution to manage your log data. There is nothing to install and updates are automatically applied to your Loggly subdomain.

Logentries makes machine-generated log data easily accessible to IT operations, development, and business analysis teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 25,000 worldwide users.

Logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). If you store them in Elasticsearch, you can view and analyze them with Kibana.

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Centralize and aggregate all your log files for 100% visibility. Use our powerful query language to search through terabytes of log data to discover and analyze important information.

Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.

Sematext pulls together performance monitoring, logs, user experience and synthetic monitoring that tools organizations need to troubleshoot performance issues faster.

Add a powerful, simple and flexible 2FA verification view to your login flow, without making any DB changes and just 3 API calls.