+
+

Related Products

  • ManageEngine OpManager
    1,629 Ratings
    Visit Website
  • Site24x7
    907 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    190 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Auvik
    675 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    485 Ratings
    Visit Website

About

Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​

About

Prevent internet exposure, unencrypted data, misconfigurations, secrets abuse, and more from being deployed into code repositories and in production. Concourse Labs’ platform quickly integrates into existing CI/CD toolchains to remove security and compliance friction, so developers can deliver code rapidly and safely. Our agentless technology continually evaluates cloud usage and automatically tests for drift, attack, misconfiguration, and misuse. Get actionable (and auditable) results in seconds, not weeks. Empower developers with immediate and specific cloud-native guidance, so they can remediate violations without needing security team intervention, and do so using their existing development tools. Fixes are automatically validated for compliance with policy. Validate complex expressions and eliminate dangerous false negatives by uncovering violations below the root stack that may be hiding within complex nested stacks.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams searching for a threat detection solution for on-premises and cloud environments

Audience

Cloud Security platform for IT teams wanting to prevent security risks in development and continuously assess runtime environments for drift, attack, and misuse

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Cisco
Founded: 1984
United States
www.cisco.com/c/en/us/products/security/stealthwatch-cloud/index.html

Company Information

Concourse Labs
Founded: 2017
United States
www.concourselabs.com/product/

Alternatives

Alternatives

Flowmon

Flowmon

Progress Software
Lacework

Lacework

Fortinet
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
LiveWire

LiveWire

BlueCat
Aqua

Aqua

Aqua Security

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Monitoring Features

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting

Integrations

Amazon Web Services (AWS)
Anterix
ColoCrossing
Compudyne
Horizon Hosted Phone System
Innspire
Inpixon
InsightCloudSec
MercuryTel
OctoXLabs
Optiv Managed XDR
Oracle Cloud Infrastructure Data Catalog
Oracle Endeca Commerce
Perspective VMS
Soundbite
StorMagic SvKMS
TrustMAPP
Verint AI Blueprint

Integrations

Amazon Web Services (AWS)
Anterix
ColoCrossing
Compudyne
Horizon Hosted Phone System
Innspire
Inpixon
InsightCloudSec
MercuryTel
OctoXLabs
Optiv Managed XDR
Oracle Cloud Infrastructure Data Catalog
Oracle Endeca Commerce
Perspective VMS
Soundbite
StorMagic SvKMS
TrustMAPP
Verint AI Blueprint
Claim Cisco Secure Cloud Analytics and update features and information
Claim Cisco Secure Cloud Analytics and update features and information
Claim Concourse Labs and update features and information
Claim Concourse Labs and update features and information