Average Ratings 0 Ratings
Average Ratings 1 Rating
API Access
Has API
API Access
Has API
Integrations
Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
SOC Prime Platform
Tenable One
Integrations
Airlock
Chronicle SOAR
GoSecure
NXLog
Recorded Future
SOC Prime Platform
Tenable One
Pricing Details
$50.00/month/user
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Support
Phone Support
24/7 Live Support
Online
Support
Phone Support
24/7 Live Support
Online
Training
Documentation
Webinars
Live Online
In Person
Training
Documentation
Webinars
Live Online
In Person
Vendor Details
Company Name
D2C
Founded
2016
Country
Russian Federation
Website
d2c.io
Vendor Details
Company Name
LogPoint
Founded
2001
Country
Denmark
Website
www.logpoint.com
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Product Features
Application Performance Monitoring (APM)
Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Network Security
Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
SIEM
Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring