Arctic Wolf Description

The Arctic Wolf®, Platform and Concierge Security® Team will help you improve your organization's security effectiveness. Cybersecurity is a complex field that requires constant adaptation and 24x7 monitoring. The cloud native platform of Arctic Wolf and the Concierge Security®, Team deliver unique solutions. The Arctic Wolf®, Platform processes more than 65 billion security events per day across thousands of installations. The platform gathers and enriches network, endpoint, and cloud telemetry and then analyzes it using multiple detection engines. Your organization will be protected with machine learning and custom detection rules. The Arctic Wolf®, a vendor-neutral platform, allows for broad visibility. It seamlessly integrates with existing technology stacks and eliminates blind spots and vendor lock-in.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Arctic Wolf Networks
Year Founded:
2012
Headquarters:
United States
Website:
Update This Listing

Media

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Phone Support
Online

Arctic Wolf Features and Options

Cloud Management Software

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting