Gravwell Description

Gravwell is an all you can ingest data fusion platform that allows for complete context and root cause analysis for security and business data.

Gravwell was created to provide machine data benefits to all customers, large or small, binary or text, security or operational. An analytics platform that can do things you've never seen before is possible when experienced hackers team up with big data experts. Gravwell provides security analytics that go beyond log data to industrial processes, vehicle fleets, IT infrastructure or all of it. Do you need to track down an access breach? Gravwell can run facial recognition machine-learning against camera data to identify multiple subjects who enter a facility with one badge-in. Gravwell can also correlate building access logs. We are here to help people who require more than text log searching and want it sooner than they can afford.

Pricing

Free Version:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Gravwell
Headquarters:
USA
Website:
gravwell.io
Update This Listing

Media

DNS activity heat map

DNS activity heat map

Recommended Products
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*! Icon
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*!

Message, video, and phone on any device. Trusted by over 400,000 businesses.

- Includes 100+ Premium Features
- Unlimited Calling, Faxing, SMS, Conferencing.

Product Details

Platforms
Windows
Mac
Linux
SaaS
iPhone
iPad
Android
Type of Training
Documentation
Live Online
In Person
Customer Support
Phone Support
Online

Gravwell Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Log Management Software

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Big Data Software

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Data Analysis Software

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics