ZTX Platform

ZTX Platform

SecureTrust Cyber
+
+

Related Products

  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    191 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • Source Defense
    7 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.

About

The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. Each user session is isolated via encrypted tunnels, preventing lateral movement and ensuring compliance. Ideal for companies seeking simplified, high-performance cybersecurity without managing multiple tools.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams

Audience

Small to mid-sized enterprises (SMEs) Managed Security Service Providers (MSSPs) Compliance-focused organizations (HIPAA, CMMC, ISO 27001, etc.) IT/security teams looking for fully managed cybersecurity Regulated industries: healthcare, finance, legal, manufacturing

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$30/month per device
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Exabeam
Founded: 2012
United States
www.exabeam.com/platform/logrhythm-siem/

Company Information

SecureTrust Cyber
Founded: 2018
United States
securetrust.io

Alternatives

Alternatives

Alert Logic

Alert Logic

Fortra
Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

RMM Features

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

Integrations

AllSecureX
Axonius
BackBox
Box Shield
Check Point IPS
Cofense Triage
DNSSense
Dragos Platform
Exabeam
Filigran
GigaSECURE
HackGuard
Intellicta
Kroll Cyber Risk
NorthStar Navigator
OpenAI
PassiveTotal
Powertech SIEM Agent for IBM i
Qualys WAS
Varonis Data Security Platform

Integrations

AllSecureX
Axonius
BackBox
Box Shield
Check Point IPS
Cofense Triage
DNSSense
Dragos Platform
Exabeam
Filigran
GigaSECURE
HackGuard
Intellicta
Kroll Cyber Risk
NorthStar Navigator
OpenAI
PassiveTotal
Powertech SIEM Agent for IBM i
Qualys WAS
Varonis Data Security Platform
Claim LogRhythm SIEM and update features and information
Claim LogRhythm SIEM and update features and information
Claim ZTX Platform and update features and information
Claim ZTX Platform and update features and information