Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

OpenText™ Enterprise Security Manager (ESM) is a powerful and adaptable SIEM platform that delivers real-time threat detection and automated response to reduce cyber risk and streamline security operations. Leveraging an advanced correlation engine, ESM quickly alerts security analysts to suspicious activities, helping organizations dramatically reduce their threat exposure. Native SOAR integration enables seamless orchestration and automation of incident response workflows, improving overall operational efficiency. The platform can process over 100,000 events per second from more than 450 diverse event sources, providing broad visibility and intelligence across complex cyber environments. Its flexible and scalable design allows businesses to customize correlation rules, dashboards, and reports to meet specific compliance and operational requirements. Additionally, ESM supports multi-tenant environments, enabling distributed teams to manage security centrally with fine-grained access controls. OpenText also offers professional services, training, and support to help organizations maximize the value of the solution. Together, these features help reduce the total cost of ownership while accelerating threat detection and response.

Description

You've spent years building up your business. Don't let cyber criminals destroy that in seconds. REDXRAY's proprietary intelligence feeds can identify threats daily against your networks, target companies/agencies, or supply chain. The emailed threat report covers the following types of threats: Botnet Tracker (also known as Botnet Tracker), Breach Data (also known as Breach Data), Keylogger Records (also known as Keylogger Records), Malicious Emails Context and Malicious Email Detections), OSINT Records, Sinkhole Traffic and THREATRECON Records.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Check Point Infinity
Cyware
Databricks
Google Cloud Platform
Kona Site Defender
Logstash
Microsoft Azure
NXLog
Netwrix Threat Prevention
OpenText Security Log Analytics
Powertech SIEM Agent for IBM i
SOC Prime Platform
Smokescreen
Snowflake
ThreatConnect Risk Quantifier (RQ)
Titania Nipper
Trustwave DbProtect
Varonis Data Security Platform
iSecurity SIEM / DAM Support

Integrations

Amazon Web Services (AWS)
Check Point Infinity
Cyware
Databricks
Google Cloud Platform
Kona Site Defender
Logstash
Microsoft Azure
NXLog
Netwrix Threat Prevention
OpenText Security Log Analytics
Powertech SIEM Agent for IBM i
SOC Prime Platform
Smokescreen
Snowflake
ThreatConnect Risk Quantifier (RQ)
Titania Nipper
Trustwave DbProtect
Varonis Data Security Platform
iSecurity SIEM / DAM Support

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

www.opentext.com/products/enterprise-security-manager

Vendor Details

Company Name

Red Sky Alliance

Founded

2011

Country

United States

Website

redskyalliance.com/redxray

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Alternatives

Huntsman SIEM Reviews

Huntsman SIEM

Huntsman Security

Alternatives

FortiSIEM Reviews

FortiSIEM

Fortinet
Criminal IP Reviews

Criminal IP

AI SPERA