Best IT Security Software for Graylog

Find and compare the best IT Security software for Graylog in 2026

Use the comparison tool below to compare the top IT Security software for Graylog on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    60,933 Ratings
    See Software
    Learn More
    Google Cloud Platform provides comprehensive IT security solutions aimed at safeguarding cloud workloads, featuring tools for identity management, encryption, and threat detection. Its layered security strategy enables organizations to effectively protect their infrastructure, data, and applications. With resources such as Google Cloud Identity & Access Management (IAM) and the Google Cloud Security Command Center, companies can effectively address risks and maintain compliance. New users are offered $300 in complimentary credits to experiment with, test, and deploy workloads, allowing them to assess the platform's security capabilities without any initial investment. GCP’s security offerings encompass automated patch management, vulnerability assessments, and secure authentication methods to help lessen risks and minimize the attack surface. Additionally, the platform is built to comply with strict regulatory standards, ensuring that businesses can fortify their cloud environments while meeting industry requirements.
  • 2
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    1,037 Ratings
    See Software
    Learn More
    Auth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
  • 3
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    102 Ratings
    See Software
    Learn More
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 4
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 5
    SentinelOne Singularity Reviews

    SentinelOne Singularity

    SentinelOne

    $45 per user per year
    6 Ratings
    A singularly innovative platform. Unmatched velocity. Limitless scalability. Singularity™ provides unparalleled visibility, top-tier detection capabilities, and self-sufficient response mechanisms. Experience the strength of AI-driven cybersecurity that spans across the entire enterprise. The foremost companies in the world rely on the Singularity platform to thwart, identify, and address cyber threats at remarkable speed, larger scales, and with enhanced precision across endpoints, cloud environments, and identity management. SentinelOne offers state-of-the-art security through this platform, safeguarding against malware, exploits, and scripts. The SentinelOne cloud-based solution has been meticulously designed to adhere to security industry standards while delivering high performance across various operating systems, including Windows, Mac, and Linux. With its continuous updates, proactive threat hunting, and behavioral AI, the platform is equipped to tackle any emerging threats effectively, ensuring comprehensive protection. Furthermore, its adaptive nature allows organizations to stay one step ahead of cybercriminals in an ever-evolving threat landscape.
  • 6
    Amazon CloudWatch Reviews
    Amazon CloudWatch serves as a comprehensive monitoring and observability tool designed specifically for DevOps professionals, software developers, site reliability engineers, and IT administrators. This service equips users with essential data and actionable insights necessary for overseeing applications, reacting to performance shifts across systems, enhancing resource efficiency, and gaining an integrated perspective on operational health. By gathering monitoring and operational information in the forms of logs, metrics, and events, CloudWatch delivers a cohesive view of AWS resources, applications, and services, including those deployed on-premises. Users can leverage CloudWatch to identify unusual patterns within their environments, establish alerts, visualize logs alongside metrics, automate responses, troubleshoot problems, and unearth insights that contribute to application stability. Additionally, CloudWatch alarms continuously monitor your specified metric values against established thresholds or those generated through machine learning models to effectively spot any anomalous activities. This functionality ensures that users can maintain optimal performance and reliability across their systems.
  • 7
    F5 BIG-IP Reviews
    In a world increasingly dominated by applications, advanced technology is essential for success. Your business thrives on apps, and BIG-IP application services ensure you have the availability, performance, and security necessary to satisfy your operational needs. With BIG-IP application delivery controllers, you can guarantee that your applications remain operational and efficient. The BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS are designed to effectively manage your application traffic while safeguarding your infrastructure. You benefit from integrated security and traffic management services, as well as performance enhancements, regardless of whether your applications are hosted in a private data center or in the cloud. Moreover, solutions like BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) oversee network resources to maintain peak performance for your applications, ensuring they meet carrier-grade standards. These tools also assist in discovering opportunities to optimize and monetize your network, ultimately leading to an improved financial outcome for your business. By leveraging these advanced services, you can fully unlock the potential of your applications, driving innovation and growth across your organization.
  • 8
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 9
    Microsoft Defender for IoT Reviews

    Microsoft Defender for IoT

    Microsoft

    $0.001 per device per month
    Continuous asset discovery, vulnerability management, threat detection, and continuous asset discovery for your Internet of Things and operational technology devices (OT). Ensure IoT/OT innovation by accelerating IoT/OT innovation through comprehensive security across all IoT/OT devices. Microsoft Defender for IoT is an agentless, network-layer security solution that can be quickly deployed by end-user organizations. It works with diverse industrial equipment and integrates with Microsoft Sentinel and other SOC tools. You can deploy on-premises and in Azure-connected environments. Microsoft Defender for IoT is a lightweight agent that embeds device-layer security in new IoT/OT initiatives. Passive, agentless network monitoring allows you to get a complete inventory and analysis of all your IoT/OT assets. This is done without any impact on the IoT/OT networks. Analyze a variety of industrial protocols to identify the device details, including manufacturer, type, firmware level, IP or Media Access Control address.
  • 10
    StixMDM Reviews

    StixMDM

    Stix

    $0.99 per month
    StixMDM provides a dependable, secure, and cost-effective mobile device management (MDM) solution tailored for businesses. The platform emphasizes customer-friendliness and robust security across various platforms, making it suitable for sectors such as hospitality, retail, field services, restaurants, and education. Businesses can manage their mobile device fleets according to their specific requirements, allowing for bulk enrollment of devices and centralized app distribution. Companies can determine the level of control over each device, ranging from minimal oversight to complete lockdown, depending on their preferences. Employees are empowered to utilize their personal devices for work purposes, with Android's work profiles effectively distinguishing between business and personal applications, enabling them to seamlessly balance both work and leisure activities. This separation allows IT departments to manage corporate data while ensuring that employees maintain privacy over their personal applications, photos, and other information. Consequently, this arrangement offers reassurance to both users and IT staff alike. The process of establishing a work profile is straightforward, requiring just the installation of an EMM app from Google Play and following the intuitive setup wizard, resulting in a smooth transition for all parties involved. Ultimately, StixMDM aims to simplify mobile management while enhancing productivity and security for organizations.
  • 11
    Fleet Reviews

    Fleet

    Fleet Device Management

    $4 per host per month
    Inquire about the various servers and laptops in your network, regardless of their operating systems or locations. Monitor and categorize your registered devices effectively. Look for key information and focus on specific targets as needed. Gather and disseminate valuable insights for operational teams, security personnel, help desk staff, and others involved. Fleet operates as a self-hosted and self-managed solution, allowing deployment within your own data centers or in cloud environments. Utilize fleetctl to write scripts and create scheduled queries that facilitate the integration of alerts and dashboards throughout your organization, enhancing overall efficiency and responsiveness. This platform empowers you to maintain a comprehensive overview of your hardware assets and their security status.
  • 12
    Azure-AD-External-Identities Reviews

    Azure-AD-External-Identities

    Microsoft

    $0.00325 per month
    Azure Active Directory External Identities, which is a component of Microsoft Entra, delivers secure digital interactions for external users such as partners, customers, citizens, and patients, while offering customizable controls. By unifying external identities and user directories within a single portal, organizations can effortlessly oversee access management. This enables both onsite and remote staff to enjoy uninterrupted access to their applications, ensuring productivity regardless of their location. Additionally, automating workflows streamlines user lifecycle management and provisioning processes. By implementing self-service identity management for external users, organizations can conserve administrative time and resources. Moreover, access to thousands of pre-integrated Software as a Service (SaaS) applications is simplified through single sign-on capabilities, allowing users to connect from any device, anywhere. This holistic approach not only enhances security but also improves the overall user experience significantly.
  • 13
    Keyfactor EJBCA Reviews
    EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors.
  • 14
    SafeConsole Reviews

    SafeConsole

    DataLocker

    $28 per device per year
    Central Management Server Software. SecureConsole central management software gives you instant access to all your encrypted USB flash drives or portable hard drives. It allows you to instantly gain complete control over them. You can enjoy the productivity benefits of USB storage devices without worrying about malware, data leaks or breaches. Available as an on-premises or DataLocker hosted cloud service with global locations. You can enforce policies such as file type restrictions, password rules, and geographic boundaries. Reset passwords, change devices to read-only mode, or remotely wipe them in the event of theft or loss. All encrypted drives can be monitored, including their location around the globe. Integrate Active Directory to easily track users, devices and computers connected. You can see which files are being saved to and deleted from your encrypted drives at any time.
  • 15
    Qualys Container Security Reviews
    Qualys Cloud Security offers a vulnerability analysis plug-in specifically designed for the CI/CD tool Jenkins, with plans to expand to additional platforms such as Bamboo, TeamCity, and CircleCI in the near future. Users can conveniently download these plug-ins straight from the container security module. This integration allows security teams to engage in the DevOps workflow, ensuring that vulnerable images are blocked from entering the system, while developers receive practical insights to address vulnerabilities effectively. It is possible to establish policies aimed at preventing the inclusion of vulnerable images in repositories, with settings adjustable based on factors like vulnerability severity and particular QIDs. The plug-in also provides an overview of the build, detailing vulnerabilities, information on software that can be patched, available fixed versions, and the specific image layers affected. Given that container infrastructure is inherently immutable, it is essential for containers to be consistent with the original images they are created from, thus necessitating rigorous security measures throughout the development lifecycle. By implementing these strategies, organizations can enhance their ability to maintain secure and compliant container environments.
  • 16
    Sophos Central Device Encryption Reviews
    The rise of remote work emphasizes the necessity of protecting computers and their stored information. Given the alarming frequency of laptops being lost, stolen, or misplaced daily, implementing full disk encryption serves as a vital initial barrier against potential data breaches. Sophos Central Device Encryption utilizes the strengths of Windows BitLocker and macOS FileVault to ensure the security of devices and sensitive data. This solution offers centralized management and operations provided by one of the most reliable and scalable cloud security platforms available today. With its open APIs and a wide array of third-party integrations, accompanied by unified dashboards and alerts, Sophos Central simplifies and enhances the effectiveness of cybersecurity measures. It also features integrated SASE-ready solutions designed to safeguard your cloud and hybrid networks both now and in the future. These solutions encompass a range of products from Firewalls and Zero Trust technologies to Switches, Wi-Fi, and beyond. Additionally, you can regain confidence in your inbox with advanced cloud email security that shields your team and essential information from threats like malware, phishing, and impersonation. As remote work continues to expand, the importance of these security measures only grows.
  • 17
    TruKno Reviews
    Stay informed about how adversaries are circumventing enterprise security measures by analyzing the most recent patterns of cyberattacks occurring in the field. Gain insights into the cyber attack patterns linked to harmful IP addresses, file hashes, domains, malware, and threat actors. Remain vigilant regarding the newest cyber threats targeting your networks, as well as those affecting your industry, peers, and vendors. Familiarize yourself with the MITRE TTPs at a procedural level that adversaries employ in current cyberattack initiatives to bolster your threat detection capabilities. Additionally, obtain a real-time overview of the evolution of leading malware campaigns in relation to attack sequences (MITRE TTPs), exploitation of vulnerabilities (CVEs), and indicators of compromise (IOCs), which can significantly aid in proactive defense strategies. Understanding these evolving tactics is essential for staying one step ahead of potential threats.
  • 18
    Sandfly Security Reviews
    Renowned for securing critical infrastructure worldwide, Sandfly offers agentless Linux security that eliminates the need for endpoint agents, ensuring a hassle-free experience. Its deployment is immediate, prioritizing system stability without sacrificing security. As an agentless platform, Sandfly is designed to monitor Linux systems quickly and securely. It safeguards a wide range of Linux environments, from contemporary cloud infrastructures to legacy devices, irrespective of their distribution or CPU type. In addition to standard Endpoint Detection and Response (EDR) features, Sandfly effectively manages SSH credentials, identifies weak passwords through audits, detects unauthorized modifications with drift detection, and incorporates customizable modules to identify novel and evolving threats. This comprehensive approach guarantees maximum safety, efficiency, and compatibility across Linux systems. Furthermore, Sandfly stands out in the market by providing extensive coverage for various Linux distributions and architectures, including AMD, Intel, Arm, MIPS, and POWER CPUs. With Sandfly, organizations can ensure their Linux security is both robust and versatile, catering to their diverse technological landscapes.
  • 19
    NXLog Reviews
    Achieve unparalleled security observability by leveraging insightful data from your logs. Enhance the visibility of your infrastructure while bolstering threat prevention through a flexible, multi-platform solution. With compatibility spanning over 100 operating system versions and more than 120 customizable modules, you can obtain extensive insights and strengthen your overall security posture. Significantly lower the expenses associated with your SIEM solution by effectively minimizing noisy and redundant log data. By filtering events, truncating unnecessary fields, and eliminating duplicates, you can substantially improve the quality of your logs. Unify the collection and aggregation of logs from all systems within your organization using a single, comprehensive tool. This approach simplifies the management of security-related events and accelerates both detection and response times. Additionally, empower your organization to fulfill compliance obligations by centralizing specific logs within a SIEM while archiving others for long-term retention. The NXLog Platform serves as an on-premises solution designed for streamlined log management, offering versatile processing capabilities to meet diverse needs. This powerful tool not only enhances security efficiency but also provides a streamlined approach to managing extensive log data.
  • 20
    FortiGate Cloud Reviews
    FortiGate Cloud enhances network management for Fortinet devices such as FortiGate, FortiSwitch, FortiAP, and FortiExtender, streamlining the process of initial deployment, configuration, and continuous maintenance. This platform offers advanced analytics and reporting capabilities designed for small to medium-sized enterprises, allowing organizations of any size to gain comprehensive insights into their security posture. As a cloud-based software-as-a-service (SaaS), FortiGate Cloud delivers a variety of management, reporting, and analytical tools tailored for FortiGate next-generation firewalls. It further simplifies the deployment, setup, and management of FortiGate alongside SD-WAN functionalities, FortiSwitch, FortiAP, and FortiExtender through zero-touch provisioning, ensuring full visibility over the entire deployment process. With the ability to scale according to your needs, FortiGate Cloud can evolve from managing a single FortiGate device to overseeing a complete security management service capable of handling thousands of devices across numerous clients. This flexibility ensures that as your business grows, your security management capabilities can adapt seamlessly to meet new challenges.
  • 21
    Trapster Reviews

    Trapster

    Ballpoint

    $1000/year
    Trapster offers a full deceptive security solution designed to uncover cyber intrusions by strategically placing convincing decoy systems throughout your network. Its core is a network-based honeypot server that deploys virtual machines on your hypervisor or cloud, supporting more than 15 protocols to detect reconnaissance activities and lateral attacker movements. The system delivers real-time alerts via email, dashboards, webhooks, syslog, or API, all with minimal setup and zero maintenance. Trapster enhances early detection by planting honeytokens—such as fake files, URLs, API keys, and database records—to lure attackers and expose malicious activity at an initial stage. The external login panel imitates legitimate login screens, capturing credential leaks before attackers can exploit them. Unlike conventional security tools, Trapster proactively surfaces stealthy threats that bypass standard defenses. Its automated and maintenance-free design simplifies deployment, allowing organizations to strengthen security posture effortlessly. Trapster helps security teams stay ahead by revealing hidden intrusions before damage occurs.
  • 22
    Swimlane Reviews
    Swimlane Turbine is the world’s fastest and most scalable security automation platform. Turbine is built with the flexibility and cloud scalability needed for enterprises and MSSP to automate any SecOps process, from SOC workflows to vulnerability management, compliance, and beyond. Only Turbine can execute 25 million daily actions per customer, 17 times faster than any other platform, provider, or technology.
  • 23
    AWS CloudTrail Reviews
    AWS CloudTrail serves as a vital tool for managing governance, compliance, operational audits, and risk assessments within your AWS account. By utilizing CloudTrail, users can log, monitor continuously, and keep a record of account activities associated with various actions throughout their AWS environment. It offers a detailed event history of activities within the AWS account, encompassing actions performed via the AWS Management Console, AWS SDKs, command-line tools, and other AWS services. This comprehensive event history enhances the security analysis process, allows for tracking resource changes, and aids in troubleshooting efforts. Moreover, CloudTrail can be leveraged to identify atypical behaviors within your AWS accounts, streamlining operational assessments. You can identify unauthorized access by examining the Who, What, and When aspects of CloudTrail Events, and respond effectively with rules-based alerts through EventBridge and automated workflows. Additionally, the service supports the continuous monitoring of API usage patterns using machine learning models to detect unusual activity, enabling you to ascertain the root cause of security incidents and maintain the integrity of your cloud environment. These features collectively strengthen the security posture and operational efficiency of your AWS infrastructure.
  • 24
    Tenable One Reviews
    Tenable One offers a groundbreaking solution that consolidates security visibility, insights, and actions across the entire attack surface, empowering contemporary organizations to identify and eliminate critical cyber risks spanning IT infrastructure, cloud systems, essential infrastructure, and beyond. It stands as the only AI-driven platform for managing exposures in the market today. With Tenable's advanced vulnerability management sensors, you can gain a comprehensive view of every asset within your attack surface, including cloud systems, operational technologies, infrastructure, containers, remote employees, and modern web applications. By analyzing over 20 trillion components related to threats, vulnerabilities, misconfigurations, and asset data, Tenable’s machine-learning capabilities streamline remediation efforts by allowing you to prioritize the most significant risks first. This focused approach fosters necessary enhancements to minimize the likelihood of serious cyber incidents while providing clear and objective assessments of risk levels. In this rapidly evolving digital landscape, having such precise visibility and predictive power is essential for safeguarding organizational assets.
  • 25
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB