Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Coralogix is the most popular stateful streaming platform, providing engineering teams with real-time insight and long-term trend analysis without relying on storage or indexing.
To manage, monitor, alert, and manage your applications, you can import data from any source. Coralogix automatically narrows the data from millions of events to common patterns, allowing for faster troubleshooting and deeper insights.
Machine learning algorithms constantly monitor data patterns and flows among system components and trigger dynamic alarms to let you know when a pattern is out of the norm without the need for static thresholds or pre-configurations.
Connect any data in any format and view your insights anywhere, including our purpose-built UI and Kibana, Grafana as well as SQL clients and Tableau. You can also use our CLI and full API support.
Coralogix has successfully completed the relevant privacy and security compliances by BDO, including SOC 2, PCI and GDPR.
Description
ITSEC's VPN Beholder is a specialized VPN monitoring tool that delivers extensive insight into VPN traffic, facilitating immediate detection of anomalies and alerts for cybersecurity professionals. It conducts in-depth analysis of VPN logs and can interface with Security Information and Event Management (SIEM) systems to uncover potential compromises related to Active Directory accounts, misuse of shared VPN accounts, unauthorized connections from devices, and any unusual activities. The software features real-time chat and email alerts, ensuring that cybersecurity teams receive timely notifications about potentially dubious actions. By automating the scrutiny of VPN log data, VPN Beholder alleviates the burden on cybersecurity teams, allowing them to concentrate on other critical tasks. Developed through a collaboration between ITSEC engineers and security experts, VPN Beholder aims to bolster the security framework of organizations by offering a complete overview of VPN traffic. In addition, its user-friendly interface and robust functionality make it an essential asset for maintaining cybersecurity vigilance.
API Access
Has API
API Access
Has API
Integrations
AWS Elastic Load Balancing
AWS Lambda
Aspecto
Bitbucket
Blink
Cloudflare
Cortex XSOAR
Enso
Fastly
Fluentd
Integrations
AWS Elastic Load Balancing
AWS Lambda
Aspecto
Bitbucket
Blink
Cloudflare
Cortex XSOAR
Enso
Fastly
Fluentd
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Coralogix
Founded
2015
Country
United States
Website
coralogix.com
Vendor Details
Company Name
ITSEC
Founded
2010
Country
Indonesia
Website
itsec.asia/product/vpn-monitoring
Product Features
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Cloud Management
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
IT Infrastructure Monitoring
Alerts / Notifications
Application Monitoring
Bandwidth Monitoring
Capacity Planning
Configuration Change Management
Data Movement Monitoring
Health Monitoring
Multi-Platform Support
Performance Monitoring
Point-in-Time Visibility
Reporting / Analytics
Virtual Machine Monitoring
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
System Monitoring
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management
Website Monitoring
Availability Testing
Event Logs
Event-Based Notifications
FTP Monitoring
Mail Server Monitoring
Maintenance Scheduling
Performance Metrics
Real Time Monitoring
Transaction Monitoring
Uptime Reporting
Product Features
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting