ZTX Platform

ZTX Platform

SecureTrust Cyber
+
+

Related Products

  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    190 Ratings
    Visit Website
  • NinjaOne
    4,254 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    486 Ratings
    Visit Website
  • New Relic
    2,752 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website

About

Logsign is a global vendor that specializes in providing comprehensive cybersecurity solutions that enable organizations to enhance their cyber resilience, reduce risk, and streamline security processes while decreasing HR and operational chaos. Logsign consistently offers an efficient, user-friendly, and seamless platform and employs the latest technologies to establish secure, resilient, and compliant environments while providing organizations with comprehensive visibility into their IT infrastructure, enhancing threat detection capabilities, and streamlining response efforts. In today's complex threat landscape, Logsign ensures that businesses have a robust cybersecurity posture in place, proactively safeguarding their systems, data, and digital assets. With a presence on four continents and a customer base of over 600 enterprises and governmental institutions as mentioned by Gartner SIEM Magic Quadrant two years in a row, Logsign also has high ratings on Gartner Peer Insight.

About

The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. Each user session is isolated via encrypted tunnels, preventing lateral movement and ensuring compliance. Ideal for companies seeking simplified, high-performance cybersecurity without managing multiple tools.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Mid and Large Enterprises, MSSPs

Audience

Small to mid-sized enterprises (SMEs) Managed Security Service Providers (MSSPs) Compliance-focused organizations (HIPAA, CMMC, ISO 27001, etc.) IT/security teams looking for fully managed cybersecurity Regulated industries: healthcare, finance, legal, manufacturing

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$30/month per device
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Logsign
Founded: 2010
Netherlands
www.logsign.com

Company Information

SecureTrust Cyber
Founded: 2018
United States
securetrust.io

Alternatives

Alternatives

Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Log Management Features

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

RMM Features

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

Integrations

Acronis Cyber Protect Cloud
AWS AI Services
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
Gurucul
IBM QRadar SIEM
Kaspersky EDR
MySQL
Netspark
OpenAI
Palo Alto Networks Next-Generation Firewalls
Picus
SentinelOne Purple AI
Splunk Enterprise
Trustwave

Integrations

Acronis Cyber Protect Cloud
AWS AI Services
Acronis Cyber Infrastructure
Acronis Disaster Recovery Service
Binalyze AIR
CyberArk Privileged Access Manager
Cynet All-in-One Cybersecurity Platform
DeCYFIR
Exabeam
Gurucul
IBM QRadar SIEM
Kaspersky EDR
MySQL
Netspark
OpenAI
Palo Alto Networks Next-Generation Firewalls
Picus
SentinelOne Purple AI
Splunk Enterprise
Trustwave
Claim Logsign and update features and information
Claim Logsign and update features and information
Claim ZTX Platform and update features and information
Claim ZTX Platform and update features and information