Sandfly Security Description

Sandfly is trusted on critical infrastructure around the world. It delivers Linux security without endpoint agents or drama. Instant deployment without compromising on stability or requiring endpoint agents. Sandfly provides a Linux security monitoring platform that is agentless, instantaneously deployable, and secure. Sandfly can protect any Linux system - from cloud deployments and older devices to modern cloud deployments, regardless of CPU architecture or distribution. Sandfly's Endpoint Detection and Response capabilities (EDR) include tracking SSH credentials, auditing for weak passwords and drift detection. Custom modules can be added to the Sandfly platform to detect new and emerging threats. All of this is done with the highest level of safety, performance and compatibility for Linux. We do this without installing agents on your endpoints. The most comprehensive Linux coverage on the market. Sandfly protects all Linux distributions, including AMD, Intel, Arm and POWER CPUs.

Pricing

Free Trial:
Yes

Integrations

API:
Yes, Sandfly Security has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Sandfly Security
Headquarters:
New Zealand
Website:
sandflysecurity.com
You Might Also Like
It's not magic, it's real-time data with Twilio Segment Icon
Activate your data warehouse to all the tools you use with a CDP that’s fast, powerful and flexible. We'll show you how with Twilio Segment.

Product Details

Platforms
SaaS
Linux
On-Premises
Type of Training
Documentation
In Person
Videos
Customer Support
Phone Support
Online

Sandfly Security Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response Software

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management