SolarWinds Kiwi Log ViewerSolarWinds
|
||||||
About
Empower Your Current Team to Achieve Enterprise-Level Security
An all-in-one solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond.
We handle the security heavy lifting, so you get time back in your day. With out-of-the-box detections, pre-filtered alerts, and response playbooks, IT teams can achieve real security value with Blumira.
Quick Deployment, Immediate Results: Integrates with your tech stack and fully deploy, with no warm-up period, in hours
All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for full-lifecycle detection
Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring
99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support
|
About
Display log files in an easy-to-read tabular format and choose various search and filter options. Kiwi Log Viewer can read files up to 14TB to make sure you can view and search all logs you need regardless of size. Easily monitor changes to a specified log file in real-time. Display log files in easy-to-read tabular format. Monitor changes to a specified log file in real-time. Open files of any size and automatically highlight important text. Leverage sub-string matching or Perl-style regular expression (regex) matching. Apply highlighting rules to detect the most important messages quickly. Easily monitor log files for specific keywords, phrases, or patterns. Kiwi Log Viewer displays text-based log files in a tabular format. You can copy selected rows in tab-delimited format or click-select-copy any part of the row text. Thanks to the file tailing feature, you can monitor the specified log file for changes and view any new data added in real-time.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
U.S. and Canadian-based companies with small IT/security team and MSPs, who are looking for an affordable alternative to typical enterprise solutions of SIEM, MDR, XDR and SOC.
|
Audience
Anyone seeking a solution to monitor log files for specific keywords, phrases, or patterns
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
Free Trial
Free Version
Free Trial
|
Pricing
$111 one-time payment
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationBlumira
Founded: 2018
United States
www.blumira.com
|
Company InformationSolarWinds
Founded: 1999
United States
www.solarwinds.com/kiwi-log-viewer
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
|||||
CategoriesEmpower Your Team to Achieve Enterprise-Level Cybersecurity An all-in-one cybersecurity solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. We handle the cybersecurity heavy lifting, so you get time back in your day. With out-of-the-box detections, pre-filtered alerts, and response playbooks, your team can achieve real cybersecurity value with Blumira. Quick Deployment, Immediate Results: Integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring 99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support Empower Your Current Team to Achieve Enterprise-Level Security with Blumira XDR An all-in-one XDR solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. We handle the security heavy lifting, so you get time back in your day. An XDR with out-of-the-box detections, pre-filtered alerts, and response playbooks, IT teams can achieve real security value with Blumira. Quick Deployment, Immediate Results: the XDR integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for an XDR with full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring 99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support Empower Your Current Team to Achieve Enterprise-Level IT Security An all-in-one IT Security solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. We handle the security heavy lifting, so you get time back in your day. With out-of-the-box detections, pre-filtered alerts, and response playbooks, your team can achieve real IT security value with Blumira. Quick Deployment, Immediate Results: Integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring 99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support Achieve Enterprise-Level Security With Blumira Over An MDR An all-in-one solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. Like a Managed Detection and Response solution, we handle the security heavy lifting, so you get time back in your day. With out-of-the-box detections, pre-filtered alerts, and response playbooks, IT teams can achieve real security value with Blumira. Quick Deployment, Immediate Results: Integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring (MDRs drop a percent of logs after 30 days) Better Support Than an MDR: Product Solution Architects, Incident Detection Tea, and 24/7 SecOps with 99.7% CSAT scores. Empower Your Current Team to Achieve Enterprise-Level Security with Blumira SIEM An all-in-one solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. We handle the security heavy lifting, so you get time back in your day. A SIEM with out-of-the-box detections, pre-filtered alerts, and response playbooks, IT teams can achieve real security value with Blumira. Quick Deployment, Immediate Results: the SIEM integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for a SIEM with full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring 99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support |
Categories |
|||||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
|
||||||
Integrations
Active Directory
Azure Firewall
Carbon Black EDR
Cisco Duo
Cisco Meraki
Cisco Umbrella
CrowdStrike Falcon
ESET Endpoint Security
Google Workspace
Malwarebytes
|
Integrations
Active Directory
Azure Firewall
Carbon Black EDR
Cisco Duo
Cisco Meraki
Cisco Umbrella
CrowdStrike Falcon
ESET Endpoint Security
Google Workspace
Malwarebytes
|
|||||
|
|