Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
It is the most flexible full-stack analytics platform in the world. We excel at fusing disparate data sources such as firewall logs, end point event logs, network traffic, OT IDS logs, OT process data, threat feed data, etc. to create a central source of knowledge. Created in the IoT age we know modern data insights demand unlimited ingest and analysis capability for cybersecurity, IoT, business analytics, and more. We support a wide range of customers, from energy production, energy delivery, government, finance, and insurance to health and beauty products. | It offers centralized network security logging and reporting for the Fortinet Security Fabric. Functions such as viewing/filtering individual event logs, generating security reports, alerting based on behaviors, and investigating activity via drill-downs are all key features of FortiAnalyzer. |
Ability for deployment in cloud, on-premises, or in an isolated on-premises network lacking outside network connectivity;
Capable of collecting disparate unstructured time-series data sources into a queryable data lake;
Enable data scientists to create custom analysis code/tools to be executed as part of a search pipeline or query system;
Analysts and data scientists have access to raw entry records for retroactive analysis and application of machine learning that did not exist at the time of collection;
Capable of data separation and fine-grained access controls for multi-tenancy;
Data collectors or agents are modifiable by the customer to enable processing, filtering, or enrichment before forwarding to the central store;
Massive scalability. Over 100 Terabytes a day is no problem. ;
Unlimited data ingestion;
Unlimited retention;
Live Dashboards;
Secure and Proprietary;
Offline ("Cold") and online ("Hot") replication;
Region-aware redundancy;
Multi-tenancy Permissions & Unlimited user seats;
Binary data support;
Configurable data retention and automatic age-out;
Distributed web frontends;
Unlimited search count | Viewing/filtering individual event logs; Generating security reports; Alerting based on behaviors |
Statistics | |
Stacks 5 | Stacks 6 |
Followers 9 | Followers 21 |
Votes 11 | Votes 0 |
Pros & Cons | |
Pros
Cons
| No community feedback yet |
Integrations | |
| No integrations available | |

Papertrail helps detect, resolve, and avoid infrastructure problems using log messages. Papertrail's practicality comes from our own experience as sysadmins, developers, and entrepreneurs.

Get a clear overview of what is happening across your distributed environments, and spot the needle in the haystack in no time. Build dynamic analyses and identify improvements for your software, your user experience and your business.

It is a SaaS solution to manage your log data. There is nothing to install and updates are automatically applied to your Loggly subdomain.

Logentries makes machine-generated log data easily accessible to IT operations, development, and business analysis teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 25,000 worldwide users.

Logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). If you store them in Elasticsearch, you can view and analyze them with Kibana.

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Centralize and aggregate all your log files for 100% visibility. Use our powerful query language to search through terabytes of log data to discover and analyze important information.

Sqreen is a security platform that helps engineering team protect their web applications, API and micro-services in real-time. The solution installs with a simple application library and doesn't require engineering resources to operate. Security anomalies triggered are reported with technical context to help engineers fix the code. Ops team can assess the impact of attacks and monitor suspicious user accounts involved.

Sematext pulls together performance monitoring, logs, user experience and synthetic monitoring that tools organizations need to troubleshoot performance issues faster.

Add a powerful, simple and flexible 2FA verification view to your login flow, without making any DB changes and just 3 API calls.