Best IT Security Software for Kibana

Find and compare the best IT Security software for Kibana in 2024

Use the comparison tool below to compare the top IT Security software for Kibana on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Criminal IP Reviews

    Criminal IP

    AI SPERA

    $65/month
    1 Rating
    See Software
    Learn More
    Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.
  • 2
    KrakenD Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Engineered for peak performance and efficient resource use, KrakenD can manage a staggering 70k requests per second on just one instance. Its stateless build ensures hassle-free scalability, sidelining complications like database upkeep or node synchronization. In terms of features, KrakenD is a jack-of-all-trades. It accommodates multiple protocols and API standards, offering granular access control, data shaping, and caching capabilities. A standout feature is its Backend For Frontend pattern, which consolidates various API calls into a single response, simplifying client interactions. On the security front, KrakenD is OWASP-compliant and data-agnostic, streamlining regulatory adherence. Operational ease comes via its declarative setup and robust third-party tool integration. With its open-source community edition and transparent pricing model, KrakenD is the go-to API Gateway for organizations that refuse to compromise on performance or scalability.
  • 3
    Cyral Reviews

    Cyral

    Cyral

    $50 per month
    All data endpoints have granular visibility and can be enforced with policy enforcement. Designed to support your infrastructure-as-code workflows and orchestration. Your workloads are dynamically scaled with sub-millisecond latency. All your tools work seamlessly with your application. You can enhance cloud security by implementing granular data access policies. Increase zero trust in the data cloud. Protect your company from data breaches. You can increase trust and provide assurance to your customers. Cyral is designed to meet the unique requirements of the data cloud in terms of performance, deployment, and availability. Cyral allows you to see the whole picture. Cyral's data sidecar, a lightweight and stateless interception system that allows real-time observability of all data cloud activity and granular access control, is Cyral. High-performance and scalable interception. You can prevent malicious access and threats to your data that would otherwise go unnoticed.
  • 4
    Suricata Reviews
    Suricata can perform real-time intrusion detection (IDS), offline pcap processing (NSM), and inline intrusion preventions (IPS) on the network. Suricata analyzes network traffic using powerful rules and signature languages. It also has Lua scripting support to detect complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata's community-driven development is fast-paced and focuses on security, usability, efficiency. The Open Information Security Foundation (OISF) owns and supports Suricata's code and project. This non-profit foundation is committed to Suricata’s continued development and success as an open-source project.
  • 5
    EraSearch Reviews

    EraSearch

    Era Software

    ¢65 per GB
    EraSearch is purpose-built for cloud-native deployments. It offers a dynamic data fabric that leverages storage & compute decoupled storage and compute, a true zero schema design, and adaptive indexing. This allows you to provide an infinitely-scalable log management experience at a remarkable reduction in cost and complexity. Elasticsearch is used to build many log management products. To solve the key problems of EraSearch, we built it from scratch. It is easy to manage EraSearch with K8s by adopting a stateless design of all core components. Elasticsearch is used to build many log management products. To solve the key problems of EraSearch, we built it from scratch. EraSearch is able to handle data at a significantly reduced cost by using a modern, coordinated ingest design. EraSearch is completely hands-off so you don't have to worry about cluster health.
  • 6
    Enso Reviews

    Enso

    Enso Security

    Through Application Security Posture Management (ASPM), Enso's platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build an agile AppSec without interfering with development. Enso is used daily AppSec teams small and large across the globe. Get in touch for more information!
  • 7
    IIS Inspector Reviews

    IIS Inspector

    IIS Inspector

    $15.98 one-time payment
    You can capture detailed information for every request without the use of log files. IIS Inspector doesn't use log files. It uses ETW instead. For each request, capture both execution time (the time it takes for the client to respond) and flush time (the time it takes for the client to respond). Capture CPU, memory and.NET exceptions. Also capture app pool recycles. Bandwidth. You can see the performance of any website that is hosted in IIS, including ASP.NET or PHP. IIS Inspector reports Microsoft IIS KPIs on Elasticsearch. This visualization is done by Kibana. IIS Inspector comes pre-made visualizations, but you can create your own. You can quickly Discover and Visualize verbose requests captured from Microsoft IIS using IIS Inspector. Elasticsearch's watcher can also be used to create custom alerts. IIS Inspector comes with several pre-defined watch definitions that make it easy to get started. IIS Inspector provides detailed information about what Microsoft IIS is compressing and caching.
  • 8
    REDXRAY Reviews

    REDXRAY

    Red Sky Alliance

    You've spent years building up your business. Don't let cyber criminals destroy that in seconds. REDXRAY's proprietary intelligence feeds can identify threats daily against your networks, target companies/agencies, or supply chain. The emailed threat report covers the following types of threats: Botnet Tracker (also known as Botnet Tracker), Breach Data (also known as Breach Data), Keylogger Records (also known as Keylogger Records), Malicious Emails Context and Malicious Email Detections), OSINT Records, Sinkhole Traffic and THREATRECON Records.
  • 9
    LogMan.io Reviews
    TeskaLabs Logman.io provides log management, collection and archiving as well as log analysis. Scalable Log Management can easily be upgraded to the full-scale TeskaLabs SIEM (security event management) tool. You can stay one step ahead of any potential threats and have a complete overview of the security of your IT infrastructure. TeskaLabs LogMan.io protects sensitive data and important data by providing timely and clear threat detection. TeskaLabs is a cybersecurity expert, so all our products meet your company's security standards. LogMan.io ensures compliance with GDPR and cyber security legislation. Logman.io is flexible enough to adapt to your needs. You can easily upgrade to TeskaLabs SIEM. It provides a quick overview of the entire IT infrastructure and is a complete tool for risk modeling, risk management, vulnerability scanning, and threat modeling.
  • 10
    TeskaLabs SIEM Reviews
    This state-of the-art tool is designed to manage security information and events. This security surveillance tool allows you to automatically monitor and correlate security events, evaluate them, and create reports in real time. TeskaLabs SIEM provides a central overview of your company's infrastructure. Early detection helps to eliminate potential risks and affects on the company's operation. TeskaLabs SIEM will keep you safe from potential threats. TeskaLabs is a cybersecurity expert, so all our products will meet your company's security standards. TeskaLabs SIEM ensures compliance with Cyber Security, GDPR and ISO 27001:2013 legislation. Automated real time detection and reporting of known anomalies and incidents will allow you to quickly respond to each incident and prioritize the solution. You can save time by searching for potential threats early.
  • 11
    Stamus Networks Reviews
    Stamus Networks offers network-based solutions for threat detection and response. Discover serious threats and unauthorized activities lurking within your network. We use the inherent power of your network traffic to uncover critical security threats for your organization. Stamus Security Platform is a powerful network detection and response platform built on Suricata that provides actionable network visibility. Stamus Security Platform has been trusted by many of the most important organizations in the world, including government CERTs and central banks, insurance companies, managed security service providers and financial service providers.
  • Previous
  • You're on page 1
  • Next