Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Alert Logic offers SIEMless Threat Management that connects platform, intelligence, & experts to provide the best security and peace of mind for your business. | Open source software for providing and transparently securing network connectivity and loadbalancing between application workloads such as application containers or processes. |
Threat monitoring and visibility;
Intrusion detection;
Security analytics;
Log collection and monitoring;
Office 365 log collection and search. | Identity Based Security - Cilium visibility and security policies are based on the container orchestrator identity (e.g., Kubernetes labels). Never again worry about network subnets or container IP addresses when writing security policies, auditing, or troubleshooting.; Blazing Performance - BPF is the underlying Linux superpower to do the heavy lifting on the datapath by providing sandboxed programmability of the Linux kernel with incredible performance.; API-Protocol Visibility + Security - Traditional firewalls only see and filter packets based on network headers like IP address and ports. Cilium can do this as well, but also understands and filters the individual HTTP, gRPC, and Kafka requests that stitch microservices together.; Designed for Scale - Cilium was designed for scale, with no node-to-node interactions required when new pods are deployed, and all coordination through a highly scalable key-value store. |
Statistics | |
GitHub Stars - | GitHub Stars 22.8K |
GitHub Forks - | GitHub Forks 3.4K |
Stacks 12 | Stacks 38 |
Followers 20 | Followers 81 |
Votes 0 | Votes 1 |
Pros & Cons | |
No community feedback yet | Pros
|
Integrations | |

Papertrail helps detect, resolve, and avoid infrastructure problems using log messages. Papertrail's practicality comes from our own experience as sysadmins, developers, and entrepreneurs.

Get a clear overview of what is happening across your distributed environments, and spot the needle in the haystack in no time. Build dynamic analyses and identify improvements for your software, your user experience and your business.

It is a SaaS solution to manage your log data. There is nothing to install and updates are automatically applied to your Loggly subdomain.

Logentries makes machine-generated log data easily accessible to IT operations, development, and business analysis teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 25,000 worldwide users.

Logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). If you store them in Elasticsearch, you can view and analyze them with Kibana.

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Centralize and aggregate all your log files for 100% visibility. Use our powerful query language to search through terabytes of log data to discover and analyze important information.

Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.

Sematext pulls together performance monitoring, logs, user experience and synthetic monitoring that tools organizations need to troubleshoot performance issues faster.

Add a powerful, simple and flexible 2FA verification view to your login flow, without making any DB changes and just 3 API calls.