Related Products
|
||||||
About
Cloud security best practices as a service.
CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure.
Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.
|
About
Record your IBM Cloud activities with IBM Cloud Activity Tracker. Search and alert on activity events through a hosted event search offering. Financial Services Validated users should read the About tab for more information. IBM Cloud Activity Tracker is your source for activity events recorded within IBM Cloud. Activity events are records of the API calls to services on the IBM Cloud and produce the evidence to comply with corporate policies and market industry-specific regulations. Cloud activity events help accelerate the detection of security events and application performance issues. IBM Cloud Activity Tracker offers ready-to-run event search offerings to simplify configuration and expedite your time to greater insights.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
AWS users or administrators interested in security
|
Audience
Database Monitoring solution for IT teams
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$7.17/month
Free Version
Free Trial
|
Pricing
$1.725 per GB per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCloudSploit
Founded: 2015
United States
cloudsploit.com
|
Company InformationIBM
Founded: 1911
United States
cloud.ibm.com/catalog/services/ibm-cloud-activity-tracker
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
|
||||||
Categories |
Categories |
|||||
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
|
||||||
Integrations
PagerDuty
Slack
ZEST Security
|
||||||
|
|