Splunk Cloud PlatformCisco
|
ThreatSpotterAISecureMe
|
|||||
Related Products
|
||||||
About
Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
|
About
ThreatSpotter is a compliance cloud security scanner for AWS, Azure, and GCP. It is basically scanning the whole cloud infrastructure against anomaly detection and helps you to achieve the compliance score against all cloud security vulnerabilities. It is basically running on a Machine Learning engine where it basically runs on historical data and provides accurate results with real Threat Analytics. Threat Analytics provides different views according to pie and graph charts from past data. ThreatSpotter takes care of "Shared Responsibility Model" where each and every aspect of cloud infrastructure ensures the compliance check against malware and intrusion attacks. Regular monitoring helps in identifying the container vulnerabilities, intrusion attacks and malware attacks. Ensure the compliance over infrastructure workloads and cloud workloads. Threat analytics dashboard where user and management can see the compliance score trend on weekly, monthly and yearly basis.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies of all sizes
|
Audience
Companies and IT teams requiring a compliance cloud security scanner solution to keep track of security threats
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$800 per month
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCisco
Founded: 1984
United States
www.splunk.com/en_us/products/splunk-cloud-platform.html
|
Company InformationAISecureMe
India
aisecureme.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Application Performance Monitoring (APM) Features
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Artificial Intelligence Features
Chatbot
For eCommerce
For Healthcare
For Sales
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)
Cloud Management Features
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Visualization Features
Analytics
Content Management
Dashboard Creation
Filtered Views
OLAP
Relational Display
Simulation Models
Visual Discovery
IT Management Features
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service Features
Contract Management
Incident Management
IT Asset Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Log Management Features
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Machine Learning Features
Deep Learning
ML Algorithm Library
Model Training
Natural Language Processing (NLP)
Predictive Modeling
Statistical / Mathematical Tools
Templates
Visualization
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
Network Troubleshooting Features
Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring
Predictive Analytics Features
AI / Machine Learning
Benchmarking
Data Blending
Data Mining
Demand Forecasting
For Education
For Healthcare
Modeling & Simulation
Sentiment Analysis
SIEM Features
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring
Server Management Features
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
|
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
|||||
Integrations
Admin By Request
AirShield
AlertSite
Amazon Quantum Ledger Database (QLDB)
CARTO
Data Virtuality
EndaceProbe
Google Cloud Platform
HackGuard
InfiniBox
|
Integrations
Admin By Request
AirShield
AlertSite
Amazon Quantum Ledger Database (QLDB)
CARTO
Data Virtuality
EndaceProbe
Google Cloud Platform
HackGuard
InfiniBox
|
|||||
|
|
|