+
+

Related Products

  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Graylog
    405 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • New Relic
    2,907 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website

About

Logsign is a global vendor that specializes in providing comprehensive cybersecurity solutions that enable organizations to enhance their cyber resilience, reduce risk, and streamline security processes while decreasing HR and operational chaos. Logsign consistently offers an efficient, user-friendly, and seamless platform and employs the latest technologies to establish secure, resilient, and compliant environments while providing organizations with comprehensive visibility into their IT infrastructure, enhancing threat detection capabilities, and streamlining response efforts. In today's complex threat landscape, Logsign ensures that businesses have a robust cybersecurity posture in place, proactively safeguarding their systems, data, and digital assets. With a presence on four continents and a customer base of over 600 enterprises and governmental institutions as mentioned by Gartner SIEM Magic Quadrant two years in a row, Logsign also has high ratings on Gartner Peer Insight.

About

XDR – Full Speed The effort to manage multiple security tools is time-intensive. The lack of intelligence sharing across solutions results in the lost opportunity for proactive defense from threats. Realizing the power of four superior security solutions, RevBits Cyber Intelligence Platform takes XDR to full speed security. The integrated platform offers superior protection by sharing threat intelligence from ten security modules. Cybersecurity solutions should protect a company's network from any threat at any time and ideally, integrate to provide proactive threat intelligence. Contact RevBits for more information regarding RevBits Cyber Intelligence Platform.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Mid and Large Enterprises, MSSPs

Audience

Companies of all sizes

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Logsign
Founded: 2010
Netherlands
www.logsign.com

Company Information

RevBits
Founded: 2016
United States
www.revbits.com/cyber-intelligence-platform

Alternatives

Alternatives

CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption
Trustwave

Integrations

Acronis Cyber Protect Cloud
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
DeCYFIR
Exabeam
F5 BIG-IP Advanced WAF
Forcepoint DLP
Gurucul
IBM QRadar SIEM
Imperva API Security
Kaspersky EDR
MySQL
Netspark
Palo Alto Networks Next-Generation Firewalls
Picus
Sophos Managed Threat Response
Trend Micro Endpoint Encryption
Trustwave
Claim Logsign and update features and information
Claim Logsign and update features and information
Claim RevBits Cyber Intelligence Platform and update features and information
Claim RevBits Cyber Intelligence Platform and update features and information