Best IT Management Software for LogRhythm SIEM

Find and compare the best IT Management software for LogRhythm SIEM in 2025

Use the comparison tool below to compare the top IT Management software for LogRhythm SIEM on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Keeper Security Reviews
    Top Pick

    Keeper Security

    Keeper Security

    $2.00 per user, per month
    1,549 Ratings
    See Software
    Learn More
    Password security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting.
  • 2
    BackBox Reviews
    Network engineers save time with the BackBox Automation Platform for Network Teams by quickly automating and auditing time consuming manual tasks. With a library of over 3,000 pre-built automations and a script-free way to build new ones BackBox makes it easy to get started on your automation journey. BackBox is a point-and-click automation solution for firewall and network device backups, OS updates and patching, configuration compliance audits and remediation, network vulnerability management, network configuration change management, and more.
  • 3
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 4
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 5
    Indent Reviews

    Indent

    Indent

    $8 per month
    Faster access unlocks more revenue. Give your team on-demand access to apps that is faster and easier without frustrating them. Slack allows users to request access to apps. Managers can approve or deny the request from Slack. All of this is auditable. Stop manually catherding approvals. Every time an access is granted, there's a security risk. Indent helps teams to scale security and least-privilege by shifting users from permanent access without slowing things down. Automate spreadsheet-based processes for SOC 2, SOX ISO and HITRUST. Controls and policies are baked directly into the access request workflows. Reduce your license footprint by only providing access when needed, instead of granting permanent access. Indent reduces costs without adding friction to the end user experience. If you want to lead a rapidly growing company to success, you need to take on big risks.
  • 6
    Imperva CDN Reviews
    If you don't have security, the risk of your website and application being deployed around the world can increase. The Imperva Content Delivery Network, (CDN), provides content caching, load-balancing, failover, and failover, all built into a comprehensive Web Application Protection (WAAP), platform. Your applications are securely delivered around the world. Machine learning will do the rest. It efficiently caches your dynamically-generated pages, while ensuring content freshness. This greatly increases cache utilization and further reduces bandwidth consumption. Multiple content and networking optimization techniques can be used to reduce page rendering time and improve the user experience. Imperva's global CDN employs advanced caching and optimization techniques in order to increase connection and response speeds and lower bandwidth costs.
  • 7
    Barracuda PST Enterprise Reviews
    End-users often use PST files as personal email archives. They are often scattered across end-user devices and network storage which makes it difficult to find and manage them consistently and effectively. Your users no longer have to save data locally in PST files thanks to Microsoft Exchange and Office 365. You will still need to manage legacy PST files, which contain important data. Barracuda PST Enterprise was created to address this problem. Many terabytes may be stored on PST files on end-user devices or on network servers. These files are notoriously unstable and easy to misplace, and are often corrupted. These large files can be costly in terms of both IT administrative overhead and system resources.
  • 8
    Ordr Platform Reviews
    Automatically identify, classify and locate all network-connected devices. We passively find high-fidelity information about all connected devices within a matter of hours via network tap or SPAN. This includes make, location, serial numbers, and application/port use. This visibility can be integrated with asset inventory solutions and provided in real-time for every connected device. Know about vulnerabilities, recalls, weak passwords and certificates that are associated with every device. Ordr provides deep insight into device usage so teams can make data-driven moves, additions, and changes as they scale their capacity. These device insights are crucial to determine the life expectancy of certain devices and allow teams to schedule maintenance tickets or support procurement decisions. We automatically group fleet devices and monitor usage for tracking purposes and comparison. We integrate with identity systems such as Active Directory.
  • Previous
  • You're on page 1
  • Next