Alternatives to Azure AI Anomaly Detector

Compare Azure AI Anomaly Detector alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Azure AI Anomaly Detector in 2026. Compare features, ratings, user reviews, pricing, and more from Azure AI Anomaly Detector competitors and alternatives in order to make an informed decision for your business.

  • 1
    Zilliz Cloud
    Zilliz Cloud is a fully managed vector database based on the popular open-source Milvus. Zilliz Cloud helps to unlock high-performance similarity searches with no previous experience or extra effort needed for infrastructure management. It is ultra-fast and enables 10x faster vector retrieval, a feat unparalleled by any other vector database management system. Zilliz includes support for multiple vector search indexes, built-in filtering, and complete data encryption in transit, a requirement for enterprise-grade applications. Zilliz is a cost-effective way to build similarity search, recommender systems, and anomaly detection into applications to keep that competitive edge.
  • 2
    Google Cloud Timeseries Insights API
    Anomaly detection in time series data is essential for the day-to-day operation of many companies. With Timeseries Insights API Preview, you can gather insights in real-time from your time-series datasets. Get everything you need to understand your API query results, such as anomaly events, forecasted range of values, and slices of events that were examined. Stream data in real-time, making it possible to detect anomalies while they are happening. Rely on Google Cloud's end-to-end infrastructure and defense-in-depth approach to security that's been innovated for over 15 years through consumer apps like Gmail and Search. At its core, Timeseries Insights API is fully integrated with other Google Cloud Storage services, providing you with a consistent method of access across storage products. Detect trends and anomalies with multiple event dimensions. Handle datasets consisting of tens of billions of events. Run thousands of queries per second.
  • 3
    VictoriaMetrics Anomaly Detection
    VictoriaMetrics Anomaly Detection is a service that continuously scans time series stored in VictoriaMetrics and detects unexpected changes within data patterns in real time. It does so by utilizing user-configurable machine learning models. In the dynamic and complex world of system monitoring, VictoriaMetrics Anomaly Detection, a part of our Enterprise offering, is a pivotal tool for achieving advanced observability. It empowers SREs and DevOps teams by automating the intricate task of identifying abnormal behavior in time-series data. It goes beyond traditional threshold-based alerting, utilizing machine learning techniques to detect anomalies and minimize false positives, thus reducing alert fatigue. Providing simplified alerting mechanisms atop unified anomaly scores enables teams to spot and address potential issues faster, ensuring system reliability and operational efficiency.
  • 4
    Nixtla

    Nixtla

    Nixtla

    Nixtla is a platform for time-series forecasting and anomaly detection built around its flagship model TimeGPT, described as the first generative AI foundation model for time-series data. It was trained on over 100 billion data points spanning domains such as retail, energy, finance, IoT, healthcare, weather, web traffic, and more, allowing it to make accurate zero-shot predictions across a wide variety of use cases. With just a few lines of code (e.g., via their Python SDK), users can supply historical data and immediately generate forecasts or detect anomalies, even for irregular or sparse time series, and without needing to build or train models from scratch. TimeGPT supports advanced features like handling exogenous variables (e.g., events, prices), forecasting multiple time-series at once, custom loss functions, cross-validation, prediction intervals, and model fine-tuning on bespoke datasets.
  • 5
    AiOpsX
    Deep Text Inspection, anomaly detection, clustering. Cutting edge AI that scans all log data and streams insights and alerts. ML clustering that detects new errors, unique risk KPI and more. Pattern recognition and discovery. Anomaly detection for data, risk and content monitoring. Integration with Logstash, ELK and others. AiOpsX deployed in minutes on any log data and augmentד existing monitoring and log analysis tools with millions of smart eyes. Security, performance, audit, errors & problems, trends, anomalies, and much more! Unique algorithms identify patterns and compute risk levels. Anomaly detection continuously scans risk level and performance data to identify outliers. The AiOpsX monitoring engine identifies new types of messages, errors, log volume changes, risk level spikes; and triggers reports and alerts for IT monitoring teams and app owners.
  • 6
    IBM Z Anomaly Analytics
    IBM Z Anomaly Analytics is software that provides intelligent anomaly detection and grouping to proactively identify operational issues in your enterprise environment. IBM Z Anomaly Analytics uses historical IBM Z log and metric data to build a model of normal operational behavior. Real-time data is then scored against the model to detect anomalous behavior. A correlation algorithm then groups and analyzes anomalous events to proactively alert operation teams of emerging problems. Your essential services and applications must always be available in today's digital environment. For enterprises with hybrid applications, including IBM Z, detecting and determining the root cause of hybrid application issues has become more complex with rising costs, skill shortages, and changing user patterns. Proactively identify operational issues and avoid costly incidents by detecting anomalies in both log and metric data.
  • 7
    Anomalia

    Anomalia

    Scry AI

    Anomalia® uses proprietary AI-Algorithms to identify potential fraud, risk, conflict and non-compliance in financial and legal engagements at transactional level. Anomalia® anomaly detection in ACH Transactions uses customer’s transactional as well as behavioral data to detect anomalies in ACH transactions and prevents fraudulent transactions. Anomalia® anomaly detection in mobile check deposits analyzes authenticity of mobile checks, accounts in which they are deposited and their geo-spatial mobile deposit locations to detect potential fraud in transactions. Anomalia® anomaly detection in wire transactions analyzes originators, beneficiaries and their anomaly scores derived from other wire transactions to detect and prevent potential frauds. Anomalia® anti money laundering performs analyzes on various transactions, entities and their linkages for enhanced due diligence to detect potential money laundering transactions.
  • 8
    evoML

    evoML

    TurinTech AI

    evoML accelerates the creation of production-quality machine learning models by streamlining and automating the end-to-end data science workflow, transforming raw data into actionable insights in days instead of weeks. It automates crucial steps, automatic data transformation that detects anomalies and handles imbalances, feature engineering via genetic algorithms, parallel model evaluation across thousands of candidates, multi-objective optimization on custom metrics, and GenAI-based synthetic data generation for rapid prototyping under data-privacy constraints. Users fully own and customize generated model code for seamless deployment as APIs, databases, or local libraries, avoiding vendor lock-in and ensuring transparent, auditable workflows. EvoML empowers teams with intuitive visualizations, interactive dashboards, and charts to identify patterns, outliers, and anomalies for use cases such as anomaly detection, time-series forecasting, and fraud prevention.
  • 9
    LotusEye

    LotusEye

    LotusEye

    LotusEye is a cloud-based AI anomaly detection service that automatically learns normal behavior from uploaded numerical or sensor data in CSV format and continuously calculates anomaly scores to flag deviations that may indicate faults or unexpected activity, providing alerts and visual insights without requiring users to have expertise in machine learning. It supports both wide-format CSV files, where each row represents sensor values at a timestamp, and long-format CSV with timestamp, sensor name, and value columns, and lets users upload data via drag-and-drop or through an API for scheduled automated processing. After training an AI model with normal operation data, users can upload test data to see calculated anomaly scores and review them in dashboards with time-series graphs, threshold indicators, and filters, helping teams spot unusual patterns and investigate potential issues quickly.
  • 10
    Tatvic Anomaly Detection
    Real-time Anomaly Detection solution helps you identify certain user behavior or actions or a set of actions by users which do not conform to an expected pattern(s) in a dataset. Expected patterns can be generated from historical data sets or idealistic datasets that you can configure as well – we’re big on customization at Tatvic. Now know the sudden spike in the traffic to your website or app is due to bots and spam or is there some other external factor affecting the spike. Real-time Anomaly Detection solution lets you point out faults on your website such as broken UX due to new release or change in website and app. For more complex websites, Real-time Anomaly Detection enables you to keep a track of whether your website and app is up and running smoothly.
    Starting Price: $39.99/month/user
  • 11
    PowerAI

    PowerAI

    Buzz Solutions

    Robust software platform, REST APIs, analytics, and work prioritization to help you efficiently and accurately inspect energy infrastructure with powerful AI capabilities. Optimize your inspection with the highest accuracy. PowerAI makes inspections safer, more cost and time-efficient, and more collaborative than ever before. Embrace the future with AI-based visual data processing and keep your people, assets, and community safe. Our AI-based anomaly detection redefines accuracy and consistency in power infrastructure inspections with the most accurate visual data processing in the industry. This precision leads to 50-70% cost savings on data processing and visual anomaly detections as well as 50-60% time savings. We offer industry-leading accuracy for the detection of 27 different assets and asset anomalies. Our technology, driven by machine learning, redefines accuracy and consistency in power infrastructure inspections.
  • 12
    NEMESIS

    NEMESIS

    Aviana

    NEMESIS: Next-generation AI-powered anomaly detection technology designed to recognize fraud and waste. NEMESIS: Next-generation AI-powered anomaly detection technology pinpoints efficiency opportunities in your business management systems. Powered by AI, NEMESIS is an enterprise-ready configurable business solution platform, empowering business analysts to swiftly transform data into actionable insights. Allow the power of AI to solve your problems of overstaffing, medical errors, quality of care, and claims fraud. Benefit from NEMESIS’s uninterrupted process monitoring, unearthing a wide range of risk elements, from predicting quality issues to waste and abuse. Employ machine learning and AI to detect fraud and fraud schemes before they drain your finances. Exercise more robust controls over expenses and budget deviations, through continuous visibility of waste and abuse.
  • 13
    Google Cloud Inference API
    Time-series analysis is essential for the day-to-day operation of many companies. Most popular use cases include analyzing foot traffic and conversion for retailers, detecting data anomalies, identifying correlations in real-time over sensor data, or generating high-quality recommendations. With Cloud Inference API Alpha, you can gather insights in real-time from your typed time-series datasets. Get everything you need to understand your API queries results, such as groups of events that were examined, the number of groups of events, and the background probability of each returned event. Stream data in real-time, making it possible to compute correlations for real-time events. Rely on Google Cloud’s end-to-end infrastructure and defense-in-depth approach to security that’s been innovated on for over 15 years through consumer apps. At its core, Cloud Inference API is fully integrated with other Google Cloud Storage services.
  • 14
    Sensai

    Sensai

    Sensai

    Sensai provides AI based anomaly detection, root cause analysis and prediction tool, enabling real time resolution of issues. Sensai AI solution significantly improves uptime & time to root cause. Empowers IT leaders to manage SLAs for improved performance and profitability. Streamlines & automates anomaly detection, prediction, root cause analysis (RCA) & resolution. Holistic view & integrated analytics through integration w/3rd party tools. Pre-trained algorithms & models from day one.
  • 15
    Tangent Works

    Tangent Works

    Tangent Works

    Drive business value from predictive analytics. Make informed decisions and improve processes. Create predictive models in seconds for faster and better forecasting & anomaly detection. TIM InstantML is a hyper-automated, augmented machine learning solution for time series data for better, faster, and more accurate forecasting, anomaly detection, and classification. TIM helps you to discover the business value of your data and enables you to leverage the power of predictive analytics. High-quality automatic feature engineering while simultaneously adapting the model structure and model parameters. TIM offers flexible deployment options. Easy integration with some of your favorite platforms. TIM offers a wide array of interfaces. Users looking for a streamlined graphical interface can find this in TIM Studio. Become truly data-driven with powerful, automated predictive analytics. Discover the predictive value in your data faster and easier.
    Starting Price: €3.20 per month
  • 16
    Mona

    Mona

    Mona

    Gain complete visibility into the performance of your data, models, and processes with the most flexible monitoring solution. Automatically surface and resolve performance issues within your AI/ML or intelligent automation processes to avoid negative impacts on both your business and customers. Learning how your data, models, and processes perform in the real world is critical to continuously improving your processes. Monitoring is the ‘eyes and ears' needed to observe your data and workflows to tell you if they’re performing well. Mona exhaustively analyzes your data to provide actionable insights based on advanced anomaly detection mechanisms, to alert you before your business KPIs are hurt. Take stock of any part of your production workflows and business processes, including models, pipelines, and business outcomes. Whatever datatype you work with, whether you have a batch or streaming real-time processes, and for the specific way in which you want to measure your performance.
  • 17
    SmartFlow

    SmartFlow

    Solana Networks

    SmartFlow is an IT cyber security monitoring tool that uses Anomaly Detection to pinpoint hard-to-detect security threats. SmartFlow complements existing signature based security monitoring tools. It analyzes network flow traffic to detect zero-day security attacks. Smartflow is an appliance based solution and targeted for medium and large enterprises. SmartFlow utilizes patent-pending anomaly detection techniques and network behaviour analysis to identify security threats in a network. It applies Solana algorithms on flow data such as Netflow to detect address scans, DDoS attacks, Botnets, port scans, malware etc. Zero day threats and encrypted malicious traffic (such as Botnet Command & Control) may escape detection by signature-based security monitoring tools. However, they will not escape detection by SmartFlow. SmartFlow distills network traffic and flow data into more than 20 different statistical measures which it continuously analyzes for early warnings of cyber threats.
  • 18
    Splunk IT Service Intelligence
    Protect business service-level agreements with dashboards to monitor service health, troubleshoot alerts and perform root cause analysis. Reduce MTTR with real-time event correlation, automated incident prioritization and integrations with ITSM and orchestration tools. Use advanced analytics like anomaly detection, adaptive thresholding and predictive health scores to monitor KPI data and prevent issues 30 minutes in advance. Monitor performance the way the business operates with pre-built dashboards that track service health and visually correlate services to underlying infrastructure. Use side-by-side displays of multiple services and correlate metrics over time to identify root causes. Predict future incidents using machine learning algorithms and historical service health scores. Use adaptive thresholding and anomaly detection to automatically update rules based on observed and historical behavior, so your alerts never become stale.
  • 19
    Qualytics

    Qualytics

    Qualytics

    Helping enterprises proactively manage their full data quality lifecycle through contextual data quality checks, anomaly detection and remediation. Expose anomalies and metadata to help teams take corrective actions. Automatically trigger remediation workflows to resolve errors quickly and efficiently. Maintain high data quality and prevent errors from affecting business decisions. The SLA chart provides an overview of SLA, including the total number of SLA monitoring that have been performed and any violations that have occurred. This chart can help you identify areas of your data that may require further investigation or improvement.
  • 20
    Sightness

    Sightness

    Sightness

    Overcome complexity. Better decide. The SaaS solution for detection of transport anomalies by AI. Smart vision for transport Smart transport vision is global visibility, intelligent anomaly detection and a powerful ally for optimal decision-making. Thanks to its AI (Artificial Intelligence) technology, Sightness frees decision-makers from the complexity of freight transport: it standardizes heterogeneous data, offers a synoptic and microscopic view of the activity and identifies anomalies. This set makes it possible to set up the right action plans. Sightness is available in modules corresponding to the three key components of transport: costs, customer promise and environmental impact. Its functionalities make it possible to meet the business challenges of both shippers and carriers. Fully integrate transport into your CSR policy. Calculate your emissions, simulate your action plans and check their correct functioning.
  • 21
    cloudNito

    cloudNito

    cloudNito

    cloudNito is an innovative AI-powered SaaS platform designed to help businesses of all sizes optimize their AWS cloud costs. Our solution combines real-time monitoring, advanced anomaly detection, and automated cost-saving actions to eliminate wasteful spending and improve cloud efficiency. Key features include: AI-driven cost anomaly detection Automated resource scaling and optimization Detailed cost allocation and reporting Predictive cost forecasting Customizable alerts and thresholds With cloudNito, companies can save their AWS bills, ensuring maximum value from their cloud investment.
  • 22
    Acryl Data

    Acryl Data

    Acryl Data

    No more data catalog ghost towns. Acryl Cloud drives fast time-to-value via Shift Left practices for data producers and an intuitive UI for data consumers. Continuously detect data quality incidents in real-time, automate anomaly detection to prevent breakages, and drive fast resolution when they do occur. Acryl Cloud supports both push-based and pull-based metadata ingestion for easy maintenance, ensuring information is trustworthy, up-to-date, and definitive. Data should be operational. Go beyond simple visibility and use automated Metadata Tests to continuously expose data insights and surface new areas for improvement. Reduce confusion and accelerate resolution with clear asset ownership, automatic detection, streamlined alerts, and time-based lineage for tracing root causes.
  • 23
    Lepide Data Security Platform
    Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
  • 24
    Cloud Cost Pro
    Introducing Cloud Cost Pro, an industry-leading cloud cost optimization and FinOps solution. With Cloud Cost Pro, you get a 360-degree view of your multi-cloud environment, complete with actionable insights, ML-powered recommendations, and automated actions for streamlined cloud operations. Drive organization-wide improvements, enhance budgeting, and ensure compliance with security and resiliency best practices. Automate assessment of best practices and actions on budget violations and anomalies. Get ML-powered cost forecasts, anomaly detection, and optimization recommendations. Gain end-to-end, granular visibility into your cloud resources to ensure every dollar spent is accounted for. Track multi-cloud costs across different teams and business units easily. Get near real-time actionable insights to optimize cloud costs. With ML-powered anomaly detection, you can shut down any unauthorized, costly resource before costs snowball.
  • 25
    Azure AI Metrics Advisor
    Embed AI-powered monitoring features to stay one step ahead of incidents, no machine learning expertise is required. Monitor the performance of your organization's growth engines, including sales revenue and manufacturing operations, with Azure AI Metrics Advisor, built on AI Anomaly Detector, and a part of Azure AI Services. Quickly identify and fix problems through a powerful combination of monitoring in near-real time, adapting models to your scenario, and offering granular analysis with diagnostics and alerting. End-to-end management of data monitoring is easily done through the AI Metrics Advisor interface, which plugs into popular time-series databases and provides stream monitoring support. All dimension combinations are analyzed to pinpoint affected areas for root-cause analysis and diagnoses and send alerts. A guided autotuning experience helps you customize the service to your unique needs.
    Starting Price: $0.75 per 1,000 time series
  • 26
    Supervizor

    Supervizor

    Supervizor

    With unparalleled anomaly detection, Supervizor’s continuous quality assurance helps error-proof your accounting and curb fraud. We are on a mission to help corporations produce reliable financial data. Supervizor provides corporations with unique anomaly detection capabilities to identify several types of errors (including accounting ones) and fraud attempts. Processes and people systematically produce errors, and organizations encounter a growing number of fraud schemes. Connect your ERP and let Supervizor consolidate journal entries using our library of millions of accounting patterns. Continuously run ready-to-use checks across multiple areas. Collaborate between teams to oversee financial data quality across subsidiaries, systems, departments, and geographies. Automatically extracts and prepares your data to avoid spending time gathering, scrubbing, and formatting manually. Identifies and prioritizes your riskiest findings to investigate, intelligently minimizing false positives.
  • 27
    Infrascale Cloud Backup
    Infrascale offers an enterprise cloud backup solution which includes Anomaly Detection, to alert you when the number of “new” or “changed” files dramatically changes from established benchmark levels. The Anomaly Detection feature provides an important early warning system to quickly isolate a ransomware infection and allow you to recover important data before the entire network is frozen. Infrascale understands that backup and recovery of mission-critical data is of utmost importance. This includes the flexibility to perform backups on any endpoint device, and to deliver fast and effortless restores – as well as making it easy to use for the end user. Infrascale Cloud Backup provides unlimited retention and version history, with support for an unlimited number of endpoint devices. Endpoint backup data is always available! With built-in local backup for rapid restore and redundancy, and Live Protect to monitor and capture data changes real-time.
  • 28
    Amazon Lookout for Metrics
    Reduce false positives and use machine learning (ML) to accurately detect anomalies in business metrics. Diagnose the root cause of anomalies by grouping related outliers together. Summarize root causes and rank them by severity. Seamlessly integrate AWS databases, storage services, and third-party SaaS applications to monitor metrics and detect anomalies. Automate customized alerts and actions when anomalies are detected. Automatically detect anomalies within metrics and identify their root causes. Lookout for Metrics uses ML to detect and diagnose anomalies within business and operational data. Detecting unexpected anomalies is challenging since traditional methods are manual and error-prone. Lookout for Metrics uses ML to detect and diagnose errors within your data, with no artificial intelligence (AI) expertise required. Identify unusual variances in subscriptions, conversion rates, and revenue, so you can stay on top of sudden changes.
  • 29
    RemoteAware GenAI Analytics Platform

    RemoteAware GenAI Analytics Platform

    New Boundary Technologies

    RemoteAware™ GenAI Analytics Platform for IoT transforms complex streams of sensor and device data into clear, actionable insights using advanced generative AI models. It ingests and normalizes high‑volume, heterogeneous IoT data, whether from edge gateways, cloud APIs, or remote assets, and applies scalable AI pipelines to detect anomalies, forecast equipment failures, and generate prescriptive recommendations in plain‑language narratives. Through a unified, web‑based dashboard, users gain real‑time visibility into key performance indicators, customizable alerts and threshold‑based notifications, and dynamic drill‑down capabilities for time‑series analysis. The platform’s generative summary reports condense vast datasets into concise operational briefs, while its root‑cause analysis and what‑if simulations guide preventive maintenance and resource allocation.
  • 30
    Elastic Observability
    Rely on the most widely deployed observability platform available, built on the proven Elastic Stack (also known as the ELK Stack) to converge silos, delivering unified visibility and actionable insights. To effectively monitor and gain insights across your distributed systems, you need to have all your observability data in one stack. Break down silos by bringing together the application, infrastructure, and user data into a unified solution for end-to-end observability and alerting. Combine limitless telemetry data collection and search-powered problem resolution in a unified solution for optimal operational and business results. Converge data silos by ingesting all your telemetry data (metrics, logs, and traces) from any source in an open, extensible, and scalable platform. Accelerate problem resolution with automatic anomaly detection powered by machine learning and rich data analytics.
  • 31
    Logtail

    Logtail

    Logtail

    Logtail lets you query your logs the same way you query a database. Experience radically better SQL-compatible log management at an unbeatable price. Store your logs in a structured format and search them easily with SQL. Create actionable dashboards with hosted Grafana. Archive log fragments, collaborate with colleagues, and get automatic anomaly detection alerts.
  • 32
    Amazon Lookout for Equipment
    Use data from existing sensors to create machine learning (ML) models specific to your equipment. Respond with speed and precision with automatic equipment monitoring that pinpoints anomalous sensors. Accelerate issue resolution with immediate notifications and automatic actions when anomalies are detected. Improve model performance and accuracy of alerts by incorporating anomaly trends and feedback. Amazon Lookout for Equipment is an ML industrial equipment monitoring service that detects abnormal equipment behavior so you can act and avoid unplanned downtime. Avoid unplanned downtime by automatically detecting abnormal equipment behavior. Lookout for Equipment automatically analyzes sensor data for your industrial equipment to detect abnormal machine behavior. This allows you to detect equipment anomalies with speed and precision, quickly diagnose issues, and act to avoid unplanned downtime, with no ML experience required.
  • 33
    Ingalls MDR

    Ingalls MDR

    Ingalls Information Security

    Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment. We leverage the best of the commercial, open source, and internally-developed tools and methods to provide the highest fidelity of monitoring possible. We have partnered with Cylance to provide the best endpoint threat detection and prevention capability available on the market today, CylancePROTECT(™).
  • 34
    Thoras.ai

    Thoras.ai

    Thoras.ai

    Say goodbye to cloud waste while ensuring your critical applications run reliably. Anticipate demand fluctuations, ensuring optimal capacity and uninterrupted performance. Early anomaly detection enables rapid identification and resolution for smooth operations. Reduce under or over-provisioning through intelligent workload rightsizing. Thoras autonomously optimizes, providing engineers with recommendations and visualizing trends.
  • 35
    Amazon GuardDuty
    Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain.
  • 36
    Apache Pinot

    Apache Pinot

    Apache Corporation

    Pinot is designed to answer OLAP queries with low latency on immutable data. Pluggable indexing technologies - Sorted Index, Bitmap Index, Inverted Index. Joins are currently not supported, but this problem can be overcome by using Trino or PrestoDB for querying. SQL like language that supports selection, aggregation, filtering, group by, order by, distinct queries on data. Consist of of both offline and real-time table. Use real-time table only to cover segments for which offline data may not be available yet. Detect the right anomalies by customizing anomaly detect flow and notification flow.
  • 37
    Auger.AI

    Auger.AI

    Auger.AI

    Auger.AI has the most complete solution for ensuring machine learning model accuracy. Our MLRAM tool (Machine Learning Review and Monitoring) ensures your models are consistently accurate. It even computes the ROI of your predictive model! MLRAM works with any machine learning technology stack. If your ML system lifecyle doesn’t include consistent measurement of model accuracy, you’re likely losing money from inaccurate predictions. And frequent retraining of models is both expensive and, if they’re experiencing concept drift, may not fix the underlying problem. MLRAM provides value to both the data scientist and business user with features like accuracy visualization graphs, performance and accuracy alerts, anomaly detection and automated optimized retraining. Hooking up your predictive model to MLRAM is just a single line of code. We offer a free one month trial of MLRAM to qualified users. Auger.AI is the most accurate AutoML platform.
  • 38
    Avora

    Avora

    Avora

    AI-powered anomaly detection and root cause analysis for the metrics that matter to your business. Using machine learning, Avora autonomously monitors your business metrics 24/7 and alerts you to critical events so that you can take action in hours, rather than days or weeks. Continuously analyze millions of records per hour for unusual behavior, uncovering threats and opportunities in your business. Use root cause analysis to understand what factors are driving your business metrics up or down so that you can make changes quickly, and with confidence. Embedded Avora’s machine learning capabilities and alerts into your own applications, using our suite of APIs. Get alerted about anomalies, trend changes and thresholds via email, Slack, Microsoft Teams, or to any other platform via Webhooks. Share relevant insights with other team members​. Invite others to track existing metrics and receive notifications in real-time.
  • 39
    DataPortia

    DataPortia

    Atorcom

    DataPortia is an advanced on-premises industrial data acquisition and reporting software with built-in AI analytics. It connects to automation systems via OPC UA protocol (Siemens, ABB, Valmet, Beckhoff, Schneider, Honeywell, Rockwell), collects 2000+ measurement points per second, and stores time-series data in PostgreSQL/TimescaleDB. Key features: - Real-time dashboards with gauges, charts, bar charts, and tables - Interactive trend views with ECharts visualization and drag-to-zoom - Comprehensive reporting with CSV and PDF export - Automated report scheduling (daily, weekly, monthly, custom) - AI-powered data analysis with local Ollama LLM (anomalies, forecasts, cost optimization, reports) — no cloud dependency - OPC UA Alarms & Conditions management with analytics and export - OPC UA history read from server historian - Calculation circuits (cumulative and non-cumulative formulas) - Tag transfer, copy and merge between connections - TimescaleDB time-series database
  • 40
    Nutanix Intelligent Operations
    NCM Intelligent Operations (formerly Prism Pro/Ultimate) optimizes capacity, proactively detects performance anomalies, and automates operations tasks with ease and confidence. Intuitively and easily optimize virtualization and infrastructure management with predictive analytics and task automation. Automate day-to-day operational tasks and improve productivity with a few clicks and zero coding. Gauge VM performance behavior in real time, automatically detect anomalies, and automate remediation. See how capacity is used, forecast how to meet business demands, and gain insight into inefficiencies. Machine learning algorithms play a key role in predicting capacity trends and suggesting resource optimizations. Infrastructure anomalies automatically trigger alerts and intelligent remediation actions. Instead of one algorithm, X-FIT uses an ensemble of models in a tournament to choose the best one for specific environments.
  • 41
    Revelock

    Revelock

    Revelock

    We build a digital fingerprint for each user based on biometric, behavioral, device, IP and network data, then continuously verify users across the user journey. In addition to detection, we empower you to configure policies that automatically respond to malware, phishing, and RATs with Revelock Active Defense. We build the BionicID™ from thousands of parameters collected from behavioral biometrics, behavioral analytics, device, network and threat data. The BionicID™ is trained and ready to verify users in just two interactions, reducing false positives and false negatives that trip up users and flood your call center. No matter what type of attack - malware, RATs or phishing, IDTheft, ID impersonation or ID manipulation - the BionicID™ changes the game. Our anomaly detection and classification engine delivers a continual risk assessment that protects your users and stops fraud.
  • 42
    Nazar

    Nazar

    Nazar

    Nazar was created from our own needs to manage multiple databases in multi-cloud or hybrid environments. It is production ready for the main database engines and completely eliminates the need for using multiple tools. It saves one a lot of time by making a standard and easy way to setup new servers in the platform. Get a normalized view of your database's behavior on a single dashboard without having to use multiple tools with completely different views and metrics from one another. Setting up, tracing and investigating logs and querying data dictionaries every time is not where the race is won. Nazar uses the resources already available in the DBMS for monitoring and does not need to rely on agents. NAZAR automates anomaly detection and root-cause analysis, reducing mean time to resolution (MTTR) and detecting issues to avoid incidents for peak application and business performance.
  • 43
    viAER

    viAER

    viAct.ai

    viAct Drone AeroVision AI technology, viAER, is engineered to redefine aerial intelligence for the fast-emerging Hong Kong’s low-altitude economy. With seamless integration into existing digital ecosystems — from Smart Site Safety Systems, WMS, ERPs, to BIM, it ensures 99.9% accuracy in detecting anomalies, predicting maintenance needs, and optimizing on-site decisions. Whether it’s detecting structural deviations in construction, corrosion in offshore rigs, or surface instability in mining sites, viAER turns aerial visualization into actionable intelligence. Key Capabilities • Geospatial Mapping with centimetre-level accuracy • Safety Monitoring through Thermal and Visual anomaly detection • Automated Earthwork Volumetrics • Autonomous Confined/Restricted Space Inspection • Perimeter Security & Intrusion Detection • Incident Response & Emergency Mapping Powered by Edge AI, viAER delivers real-time insights even in low-connectivity or remote areas.
  • 44
    SentinelTrails

    SentinelTrails

    LogSentinel

    Our blockchain-based technology does not allow any audit trail changes or deletion even by privileged users. Meet the audit trail requirements of many standards and regulations: GDPR, PSD2, PCI-DSS, ISO 27001, HIPAA, SOX, etc. Real-time detailed analysis of everything that happens, as well as AI-driven anomaly detection will prevent any fraud attempts. Straightforward agent or agentless integration of all existing systems, as well as a simple RESTful API. Have a unified command centre for real-time control and insight across all systems and users. Demonstrate compliance at reduced operational cost and minimise effort on audit, forensics and fraud detection. Never again worry about the integrity of your critical data – we use blockchain so no one can ever tamper with it.
  • 45
    Shield34

    Shield34

    Shield34

    Shield34 is the ONLY web automation framework that: Is 100% Selenium compatible! Continue working with your existing Selenium scripts. Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests are a huge pain! Shield34 adds defense-and-recovery AI algorithms to every Selenium command, including dynamic element locator, eliminating false positive results, driving self-healing and maintenance-free testing. Get Real-time Root Cause Analysis Using AI algorithms, Shield34 is automatically pinpointing the root cause of every test failure – reducing the overhead of debugging and reproducing failed tests. Enjoy a ‘Smarter Selenium’. Integrate automatically with your
  • 46
    Metaplane

    Metaplane

    Metaplane

    Monitor your entire warehouse in 30 minutes. Identify downstream impact with automated warehouse-to-BI lineage. Trust takes seconds to lose and months to regain. Gain peace of mind with observability built for the modern data era. Code-based tests take hours to write and maintain, so it's hard to achieve the coverage you need. In Metaplane, you can add hundreds of tests within minutes. We support foundational tests (e.g. row counts, freshness, and schema drift), more complex tests (distribution drift, nullness shifts, enum changes), custom SQL, and everything in between. Manual thresholds take a long time to set and quickly go stale as your data changes. Our anomaly detection models learn from historical metadata to automatically detect outliers. Monitor what matters, all while accounting for seasonality, trends, and feedback from your team to minimize alert fatigue. Of course, you can override with manual thresholds, too.
  • 47
    LogicLadder

    LogicLadder

    LogicLadder

    Achieve your net zero vision with a single platform. IoT Gateways and Edge Gateways help you acquire real time data on energy, water and emission directly from sensors or automation systems. Automated workflows and data scheduling to collect data accurately and with speed. Acquire data across your value chain. Acquire all your sustainability data into single repository with our powerful third party integrations and API. Full auditable record of data generation, change request and correction. Automated data checks and anomaly detection for keeping your data clean and disclosure grade. Setup permissions, workflows and validation rules for automated and manual data correction.
  • 48
    Validio

    Validio

    Validio

    See how your data assets are used: popularity, utilization, and schema coverage. Get important insights about your data assets such as popularity, utilization, quality, and schema coverage. Find and filter the data you need based on metadata tags and descriptions. Get important insights about your data assets such as popularity, utilization, quality, and schema coverage. Drive data governance and ownership across your organization. Stream-lake-warehouse lineage to facilitate data ownership and collaboration. Automatically generated field-level lineage map to understand the entire data ecosystem. Anomaly detection learns from your data and seasonality patterns, with automatic backfill from historical data. Machine learning-based thresholds are trained per data segment, trained on actual data instead of metadata only.
  • 49
    Lumeus

    Lumeus

    Lumeus

    Automate anomaly detection to meet SLAs. Monitor the entire network. Optimize digital experiences. Modernize network security leveraging your existing infrastructure through an agentless, AI-assisted approach. Enforce access by least privilege. Create identity-based boundaries. Extend to applications, devices, and infrastructure. Instant notifications of escalations. Review all session activity and details from cohesive logs. Enable device fingerprinting and gain network topology insights. Seamlessly connect to your existing infrastructure. Unify connectivity and control from campus to cloud. Organizations can use Lumeus to monitor and detect escalations using AI; segment traffic to prevent lateral movement; and secure user access by extending MFA and zero trust to network infrastructure all with one unified management plane. Lumeus has a cloud management portal that connects to your infrastructure via API.
  • 50
    Wraith

    Wraith

    NetCentrics

    Rapid cloud adoption coupled with the complexities of multi-cloud environments and siloed security teams creates a critical visibility gap for many organizations. Wraith addresses this challenge by offering unparalleled visibility and threat-hunting capabilities across on-premise, hybrid, and multi-cloud architectures. These capabilities are enhanced by AI-enabled anomaly detection, making Wraith an essential tool for neutralizing hidden threats to secure and defend cloud environments. Wraith provides comprehensive multi-terrain visibility, allowing security teams to monitor assets and activities across different Cloud Service Providers (CSPs) with a single tool set. This ensures a unified security posture and faster threat response across diverse and complex cloud environments.