---
description: Page 2 - Discover the best SIEM Tools in New Zealand. Compare top SIEM Tools tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best SIEM Tools in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [SIEM Tools](https://www.softwareadvice.co.nz/directory/4725/siem/software) > [Page 2](https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2)

# SIEM Tools

Canonical: https://www.softwareadvice.co.nz/directory/4725/siem/software

Page: 2 / 3\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4725/siem/software)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4725/siem/software?page=3)

-----

## Products

1. [OpenText Core Behavioral Signals](https://www.softwareadvice.co.nz/software/395295/arcsight) — 4.1/5 (12 reviews) — ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate an...
2. [LogPoint](https://www.softwareadvice.co.nz/software/207274/logpoint) — 4.9/5 (11 reviews) — LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats ...
3. [Vijilan](https://www.softwareadvice.co.nz/software/210877/vijilan-security) — 4.7/5 (10 reviews) — Vijilan offers managed service providers (MSPs) a suite of continuous monitoring solutions that allow them to detect ...
4. [LogRhythm SIEM](https://www.softwareadvice.co.nz/software/458391/LogRhythm-Enterprise) — 4.4/5 (10 reviews) — LogRhythm SIEM is a self-hosted security information and event management solution designed for threat detection, inv...
5. [Security Event Manager](https://www.softwareadvice.co.nz/software/183301/security-event-manager) — 4.7/5 (9 reviews) — Security \&amp; Event Manager by SolarWinds is a log management solution that caters to businesses across various indu...
6. [ManageEngine Log360 Cloud](https://www.softwareadvice.co.nz/software/435346/manageengine-log360-cloud) — 4.1/5 (8 reviews) — Secure your network from cyber threats with ManageEngine's Log360 Cloud, a comprehensive cloud SIEM tool integrated w...
7. [ServicePilot](https://www.softwareadvice.co.nz/software/241720/servicepilot-ism) — 4.4/5 (7 reviews) — ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applicat...
8. [AlienVault OSSIM](https://www.softwareadvice.co.nz/software/321623/alienvault-ossim) — 4.0/5 (6 reviews) — AlienVault OSSIM is an open source security information and event management solution for security professionals. It ...
9. [Reveelium](https://www.softwareadvice.co.nz/software/310277/reveelium) — 4.5/5 (6 reviews) — Reveelium is a cloud-based and on-premise solution cybersecurity and safety solution that helps businesses in aviatio...
10. [Enginsight](https://www.softwareadvice.co.nz/software/288516/enginsight) — 5.0/5 (6 reviews) — Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and st...
11. [ManageEngine EventLog Analyzer](https://www.softwareadvice.co.nz/software/69829/manageengine-eventlog-analyzer) — 4.8/5 (5 reviews) — ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across v...
12. [Threat Detection Marketplace](https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace) — 5.0/5 (4 reviews) — Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security infor...
13. [MixMode](https://www.softwareadvice.co.nz/software/266675/mixmode) — 4.8/5 (4 reviews) — MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety o...
14. [Quadrant XDR](https://www.softwareadvice.co.nz/software/417889/sagan) — 5.0/5 (4 reviews) — Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a s...
15. [BIMA](https://www.softwareadvice.co.nz/software/442516/bima) — 5.0/5 (4 reviews) — BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart in...
16. [SEKOIA.IO](https://www.softwareadvice.co.nz/software/366386/sekoia-io) — 4.7/5 (3 reviews) — Sekoia.IO is a cloud-based cybersecurity platform designed to help organizations anticipate, detect and respond to cy...
17. [TEHTRIS XDR Platform](https://www.softwareadvice.co.nz/software/421726/tehtris-xdr) — 4.3/5 (3 reviews) — Create your playbooks and interconnect your cyber solutions: Orchestrate all your cyber tools from a single console a...
18. [InsightIDR](https://www.softwareadvice.co.nz/software/98135/insightidr) — 4.3/5 (3 reviews) — insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to stre...
19. [Exabeam New-Scale Fusion](https://www.softwareadvice.co.nz/software/307624/exabeam) — 5.0/5 (3 reviews) — New-Scale Fusion combines New-Scale SIEM and New-Scale Analytics to form the cloud-native New-Scale Security Operatio...
20. [Versio.io](https://www.softwareadvice.co.nz/software/344207/versio-io-cmdb) — 4.5/5 (2 reviews) — Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from thi...
21. [Panther](https://www.softwareadvice.co.nz/software/192055/panther) — 4.5/5 (2 reviews) — The software has automation tools that support teams in identifying and categorizing incidents to enable experts to a...
22. [CloudJacket MXDR](https://www.softwareadvice.co.nz/software/183664/cloudjacketx) — 5.0/5 (1 reviews) — CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solu...
23. [NetWitness](https://www.softwareadvice.co.nz/software/141850/netwitness) — 5.0/5 (1 reviews) — RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mi...
24. [CybrHawk SIEM XDR](https://www.softwareadvice.co.nz/software/231130/cybrhawk-siem-ztr) — 5.0/5 (1 reviews) — CybrHawk XDR provides enterprise-wide protection by analyzing data from any source to detect and prevent sophisticate...
25. [Fidelis Elevate](https://www.softwareadvice.co.nz/software/307619/fidelis-elevate) — 5.0/5 (1 reviews) — Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense...

-----

Page: 2 / 3\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4725/siem/software)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4725/siem/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Security Orchestration Automation Response Tools (SOAR)](https://www.softwareadvice.co.nz/directory/4421/soar/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4725/siem/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@type":"WebSite","@id":"https://www.softwareadvice.co.nz/#website","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"SIEM Tools","description":"Page 2 - Discover the best SIEM Tools in New Zealand. Compare top SIEM Tools tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2","about":{"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"SIEM Tools","position":2,"item":"https://www.softwareadvice.co.nz/directory/4725/siem/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best SIEM Tools in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"OpenText Core Behavioral Signals","position":1,"description":"ArcSight is a behavioral analytics and vulnerability management solution that helps businesses detect, investigate and respond to threats and anomalies from within a unified platform. It lets team members utilize machine learning algorithms to identify threats, such as account misuse, data exfiltration, infected hosts, internal recon, and snooping.\n\nArcSight's timeline view enables IT professionals to view entities in chronological order with associated risk scores. With the built-in dashboard, staff members can access raw events that triggered an alert and enter additional queries on a centralized platform. Additionally, it allows team members to extract and observe behavior across entities, such as machines, users, servers, printers and IP addresses.\n\nArcSight comes with an application programming interface (API), which lets businesses integrate the platform with several third-party solutions. Pricing is available on request and support is extended via documentation, email, and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9134b0f-ff86-4ba3-9f8c-fbdbca3a6fe8.jpeg","url":"https://www.softwareadvice.co.nz/software/395295/arcsight","@type":"ListItem"},{"name":"LogPoint","position":2,"description":"LogPoint provides a quick analysis of your enterprise data to help businesses securely detect and respond to threats with real-time application of correlation rules.\n\nLogPoint enables organizations to identify advanced threats and minimize investigation time with UEBA. It comes with a reporting module, which provides all the actionable intelligence required to facilitate decision-making processes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d54b5f6-d3bd-47bd-be68-46324819507a.png","url":"https://www.softwareadvice.co.nz/software/207274/logpoint","@type":"ListItem"},{"name":"Vijilan","position":3,"description":"Vijilan offers managed service providers (MSPs) a suite of continuous monitoring solutions that allow them to detect and remediate security breaches. MSPs and IT providers can utilize log collection and storage, security threat analysis, and threat detection capabilities to secure any customer network, preventing incidents from turning into major security threats. Vijilan's range of solutions includes ThreatLog, ThreatAlert, and ThreatResponse.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c910af90-eb9f-468d-9a88-a3706c9017e0.png","url":"https://www.softwareadvice.co.nz/software/210877/vijilan-security","@type":"ListItem"},{"name":"LogRhythm SIEM","position":4,"description":"LogRhythm SIEM is a self-hosted security information and event management solution designed for threat detection, investigation, and response. It uses Machine Data Intelligence Fabric to manage security data and meet compliance requirements in industries such as financial services, healthcare, government, higher education, and manufacturing. It is suitable for organizations with data sovereignty needs or strict security mandates.\n\nThe system includes over 1,100 correlation rules aligned with the MITRE ATT&CK framework and supports compliance with 28 frameworks, including ISO 27001, PCI DSS, GDPR, and NIST standards. Its Machine Data Intelligence Fabric enriches data at ingestion, translating it into security-relevant language for accurate analytics. The platform features Security Orchestration and Automated Response capabilities with SmartResponse plug-ins to automate tasks and streamline incident response.\n\nLogRhythm SIEM offers a unified user experience with prebuilt dashboards, simplified reporting, and investigation timelines to help security teams prioritize tasks. It can be deployed in a data center or a self-managed private cloud, providing full control over security data. The LogRhythm Intelligence add-on enhances the platform with advanced behavior analytics and AI capabilities for improved threat detection and response.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/799338e6-1ee7-48c3-808b-2e3e2140505d.png","url":"https://www.softwareadvice.co.nz/software/458391/LogRhythm-Enterprise","@type":"ListItem"},{"name":"Security Event Manager","position":5,"description":"Security & Event Manager by SolarWinds is a log management solution that caters to businesses across various industries. Key features include compliance reporting, real-time event correlation, file-integrity monitoring, USB device monitoring and log forwarding.\n\nSecurity & Event Manager helps businesses detect suspicious activities in real-time, conduct security event investigations and forensics for threat mitigation and demonstrate compliance via audit reporting for HIPAA, PCI DCC and SOX. The solution also allows users to monitor and set alerts on registries, files and folder activities that help them to recognize malicious behavior.\n\nAdditionally, Security & Event Manager enables users to forward correlated and normalized logs or specific log data to external sources. The solution can either be deployed on-premise or hosted in the cloud.\n\nServices are offered for a one-time fee that includes support via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17acd0d7-a07b-4143-a93c-10dde4f6693c.png","url":"https://www.softwareadvice.co.nz/software/183301/security-event-manager","@type":"ListItem"},{"name":"ManageEngine Log360 Cloud","position":6,"description":"Secure your network from cyber threats with ManageEngine's Log360 Cloud, a comprehensive cloud SIEM tool integrated with advanced CASB functionalities. It offers security analytics, threat intelligence, and incident management, empowering analysts to identify, prioritize, and neutralize threats across both on-site and cloud settings. Apart from being highly scalable, Log360 Cloud aids in minimizing infrastructure and storage expenses, making it a cost-efficient choice for enterprise security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d6f0cb6d-ad04-4686-b220-e2ce64dfd1c4.png","url":"https://www.softwareadvice.co.nz/software/435346/manageengine-log360-cloud","@type":"ListItem"},{"name":"ServicePilot","position":7,"description":"ServicePilot is a high-performance IT monitoring system supporting highly detailed observability of critical applications, surveillance of thousands of devices, and analysis of millions of events. Combining real-time and historical metrics, traces, and logs for each technological stack (ITIM, NPM, APM, DEM, SIEM), ServicePilot helps troubleshoot IT issues before they impact your business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d097ccf3-8ebf-4b37-b34e-97f00f6a1603.webp","url":"https://www.softwareadvice.co.nz/software/241720/servicepilot-ism","@type":"ListItem"},{"name":"AlienVault OSSIM","position":8,"description":"AlienVault OSSIM is an open source security information and event management solution for security professionals. It offers users an intuitive platform to analyze all impending security risks providing users with tools such as SIEM event correlation, behavioral monitoring, vulnerability assessment, asset discovery and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/42833da3-c082-4010-aa65-cee67176421e.jpeg","url":"https://www.softwareadvice.co.nz/software/321623/alienvault-ossim","@type":"ListItem"},{"name":"Reveelium","position":9,"description":"Reveelium is a cloud-based and on-premise solution cybersecurity and safety solution that helps businesses in aviation, hospitality, IT, computer software, retail, broadcast media, and other sectors identify thefts, manage threats, and handle tasks from a unified platform. It lets staff members create new cases, view alerts, and manage waiting tasks. Staff members can visualize trends, and manage alerts based on status such as received, imported, or ignored.\n\nReveelium enables team members to create custom dashboards, define compliance indicators, conduct searches, and identify rare events.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ba5344ce-17f5-48e8-8fa0-f36ee9b4d37a.png","url":"https://www.softwareadvice.co.nz/software/310277/reveelium","@type":"ListItem"},{"name":"Enginsight","position":10,"description":"Enginsight helps protect businesses from the ever-evolving landscape of cyber threats and ensures the security and stability of their IT infrastructure. From vulnerability management to intrusion detection and prevention, the platform covers all aspects of cybersecurity.\n\nOne of the standout features of Enginsight is its automated penetration testing capability, which allows organizations to conduct thorough assessments of their network and infrastructure for potential vulnerabilities. By proactively identifying and remediating these vulnerabilities, organizations can enhance their security posture. The platform also provides detailed audit reports and actionable recommendations to improve cybersecurity. Its IT monitoring feature equips businesses with comprehensive control over their systems, enabling them to identify performance issues and anomalies. \n\nEnginsight offers robust web security capabilities, allowing organizations to monitor and secure their websites. By identifying vulnerabilities, monitoring performance, and detecting and mitigating threats like malware and DDoS attacks, Enginsight provides real-time insights into website availability, encryption, and security levels.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f4c9feb-2874-42ea-8d73-f275223c7f0c.png","url":"https://www.softwareadvice.co.nz/software/288516/enginsight","@type":"ListItem"},{"name":"ManageEngine EventLog Analyzer","position":11,"description":"ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology,  health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. \n\nWith network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.  \n\nEventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats. And with an automated incident response system, SOCs can mitigate potential threats. \n\nThe solution also helps users to comply with various IT compliance standards such as PCI DSS, ISO 27001, GLBA, SOX, HIPAA, CCPA, GDPR and more. Subscription based services are offered depending upon the number of log sources for monitoring. Support is made available to the users via phone, product videos and an online knowledge base.\n\nManageEngine also offers Onboarding for EventLog Analyzer which is our holistic solution implementation service by experts for your unique business requirements. Get onboarding services here \nhttps://www.manageengine.com/onboarding/iam-and-siem-onboarding.html?utm_source=Softwareadvice&utm_medium=onboardingl&utm_campaign=product_listing_default","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/624c8988-321b-4e2a-9bf0-f3eff8aa872e.png","url":"https://www.softwareadvice.co.nz/software/69829/manageengine-eventlog-analyzer","@type":"ListItem"},{"name":"Threat Detection Marketplace","position":12,"description":"Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats. Professionals can conduct automated audits and generate technical reports related to data quality issues, detection rules coverage and more.\n\n\nIT technicians can access MITRE ATT&CK, a global repository of resources and techniques, to create use cases for cloud security monitoring, data integration with Amazon Elastic Container Service (ECS) and other processes. Threat Detection Marketplace provides a dashboard, which can be utilized by enterprises to gain an overview of impacted devices and audit results.\n\n\nThreat Detection Marketplace facilitates integration with several third-party cybersecurity applications including Elastic Stack, Qradar, Splunk and ArcSight. Pricing is available on request and support is extended via live chat and an inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8bcf7c9-a8c4-44ce-b54b-ba2cfa5200fd.png","url":"https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace","@type":"ListItem"},{"name":"MixMode","position":13,"description":"MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. We deliver a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses. Trusted by global entities in banking, public utilities and government sectors, industry cyber leaders rely on MixMode to protect their most critical assets. The platform dramatically improves the efficiency of SOC teams previously burdened with writing and tuning rules and manually searching for attacks.\n\nMixMode’s Third Wave AI is uniquely effective at addressing blindspots in enterprise security\n- Detect Novel Attacks\n- Monitor voluminous data streams\n- Reduce disparate tools\n\nKnown and Novel Attack Detection:  80% of successful attacks are novel attacks (per Ponemon Institute) designed to bypass legacy rules-based systems, rendering tools that rely on rules, labeling, human operators, and training data useless in detecting such attacks before the damage is done. MixMode uses a breakthrough, real-time approach based in dynamical systems with no reliance on rules to detect and defend against known and novel cyber-attacks, enabling your security team to stop the attack before damage or destabilization. \n\nGain Visibility via Efficient Alert Triage:  With the increase in the volume of data across multiple environments, one of the most common concerns we hear from SOC teams is they have no way to triage alerts from the multiple cybersecurity tools and data sources they are currently managing.  MixMode solves this problem by applying our technology at the raw signal level.  This allows our customers to automate identification, notification, and context for high risk threats across all data types through their entire organization (cloud, flow, API, network, log, IoT, etc.).\n\nAutomation → Real-Time Detection:  MixMode’s AI platform is a self-learning system that builds an understanding of complex environments to create an evolving forecast of what’s expected in a given context like time of day, day of week and how entities and users communicate. As a result, we can detect anomalies that are breadcrumbs, or precursors to a breach in real-time.  This evolving forecast of what’s expected and real-time identification of deviations is essential to detecting and combating novel attacks that rules-based systems consistently miss.  And the majority of attack detection claims in the marketplace that mention ML or AI are reliant on rules-based detection versus MixMode’s patented, Third Wave AI technology.  \n\nNo Assembly Required:  By removing the inefficiencies that rules-based alerts and constant tuning can place on your security team, MixMode’s self-learning AI’s understanding of normal and expected behavior positions you to effectively detect novel and known attacks in real-time. You can quickly augment your overwhelmed SOC team by deploying MixMode alongside your existing security stack, or you may decide to consider tool consolidation with MixMode as the primary interface for your team.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/514d9156-e063-45f0-992e-bf522df3106b.png","url":"https://www.softwareadvice.co.nz/software/266675/mixmode","@type":"ListItem"},{"name":"Quadrant XDR","position":14,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWith intelligent action and rapid response, XDR's proprietary technology is operated by seasoned security analysts around the clock and combines the best security technology and talent in a single XDR solution. Combining a roster of expert analysts and a powerful stack of security solutions into one complete ecosystem the platform allows for users to monitor and protect our networks, eliminating time wasted through escalation, and providing a full suite of security solutions, no matter the vertical or size and much.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.softwareadvice.co.nz/software/417889/sagan","@type":"ListItem"},{"name":"BIMA","position":15,"description":"BIMA brings a cutting-edge security framework that blends EDR, NDR, XDR, and SIEM for robust protection. Its smart integration ensures a proactive shield against cyber threats, boosting organizational resilience. \n\nWith streamlined operations and quicker incident responses, BIMA crafts a secure, vibrant digital space.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7367a3f6-d166-4e8b-90a3-ebc9cf001fd1.png","url":"https://www.softwareadvice.co.nz/software/442516/bima","@type":"ListItem"},{"name":"SEKOIA.IO","position":16,"description":"Sekoia.IO is a cloud-based cybersecurity platform designed to help organizations anticipate, detect and respond to cyber threats. The platform caters to security teams across industries looking to improve their defense capabilities. \n\nThe solution provides a Sekoia.IO XDR (Extended Detection and Response) module that combines real-time threat intelligence with automation. This allows the system to identify and react to attacks faster. Its CTI (Cyber Threat Intelligence) module provides actionable intelligence on emerging and known threats targeting the organization.\n\nSekoia.IO also offers TIP (Threat Intelligence Platform) that manages the entire threat intelligence lifecycle. The platform has a catalog of integrations with various security tools to consolidate alerts and data. Companies of all sizes use Sekoia.IO globally to gain visibility across their environment, accelerate threat detection and response, and empower security teams.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81db853a-e6ff-409a-bf93-b48401671d56.jpeg","url":"https://www.softwareadvice.co.nz/software/366386/sekoia-io","@type":"ListItem"},{"name":"TEHTRIS XDR Platform","position":17,"description":"Create your playbooks and interconnect your cyber solutions: \n\nOrchestrate all your cyber tools from a single console and get quicker responses to attacks. Automate your processes, create on-call scenarios, and group your alerts into single incidents.\n\nUnmatched detection of known and unknown threats: \n\nDetect all types of threats, even threats from weak signals or spotted by different solutions with the TEHTRIS XDR Platform and prevent security breaches.\n\nReal-time remediation: \n\nThe TEHTRIS XDR Platform hyperautomates your response to attacks and coordinates all your solutions, in addition to ingesting your security events.\n\nAll your cybersecurity in a single console: \n\nUnify your cybersecurity by bringing together all your solutions in a single console for hyperautomated detections and responses. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.\nOrchestrate all your cybersecurity tools simultaneously, including your existing solutions such as Zscaler and Proofpoint, with the TEHTRIS XDR Platform. Our platform is available in our secured cloud or on-prem. Easily deploy it in your ecosystem with in & out APIs. With its customizable playbooks and its hyperautomation capabilities you will get immediate responses to cyberattacks.\n\nAll of TEHTRIS’ augmented technology included:\n\nGet all of TEHTRIS’ augmented technology directly with our XDR Platform. In addition to unifying all your cyber solutions to accelerate your detections and responses to attacks, the TEHTRIS XDR Platform offers you all its analytic intelligence. Each module of the TEHTRIS XDR Platform uses the TEHTRIS augmented technology to achieve quicker detections, investigations and remediations. You will get: \n\n- Our CTI (Cyber Threat Intelligence): a continuously updated Cyber Warehouse. With it, you will have the right tools for instant analysis, sandboxing and hunting.\n- XDR / SOAR: to orchestrate all your cyber solutions, including partners of the TEHTRIS XDR Platform. It lets you create your own playbooks to get hyperautomated detections and responses. \n- Our artificial intelligence Cyberia: developed and edited directly by TEHTRIS, it works with all the modules of the platform to get you the most effective detection and response, thanks to its neural network (Deep Learning). \n- Our UEBA: a behavioral analysis engine based on Machine Learning, integrated in XDR / SIEM. It automatically detects irregular behaviors. \n- Our Soc in the box: prioritizes EDR alerts, detects anomalies and automatically groups events to facilitate the work of your analysts. \n\nStrengthened collaboration within your teams:\n\nYour team responsiveness is the key to a successful protection. At TEHTRIS, we believe that this needed reactivity comes from a close-knit team, which has been given the best technical tools to collaborate easily, quickly, and effectively in the event of an alert. To support your teams, address the current shortage of analysts and reduce MTTD and MTTR, the TEHTRIS XDR Platform offers several features: \n- Hyperautomated response to attacks \n- Contextualization of events directly on the platform \n- Alerts for your analysts during an attack \n- Possibility to create investigative groups within the XDR Platform \n- Enhanced filter management and co-publishing capabilities\n\nStay in control of your data:\n\nMore and more customers are alerting us: competing cyber solutions are retrieving and backing up all their data. To protect your company against industrial espionage, wherever you are, we have designed the TEHTRIS XDR Platform and its modules in a way that ensures that your files cannot be accessed. Choosing a cybersecurity solution that protects your data has become a strategic decision for business leaders in today's cyber and geopolitical context.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1c85258-a895-43fc-afdc-c06e52be60fb.jpeg","url":"https://www.softwareadvice.co.nz/software/421726/tehtris-xdr","@type":"ListItem"},{"name":"InsightIDR","position":18,"description":"insightIDR is a cloud-based security information and event management (SIEM) solution that enables businesses to streamline processes related to endpoint detection, behavior analytics, incident response and more. Professionals can utilize log entry query language (LEQL), visual charts/graphs to find and view anomalies.\n\n\nKey features of insightIDR include file integrity or network monitoring, auditing, threat intelligence and compliance management. It allows businesses to analyze data, manage logs and detect risks or threats using attacker behavior analytics. Additionally, it helps users secure credentials or detect insider threats using machine learning technologies and user behavior analytics (UBA).\n\n\ninsightIDR facilitates integration with various third-party systems such as Microsoft Azure, Microsoft Office 365, Amazon Web Services (AWS), FireEye, Salesforce and more. The solution is available on monthly subscriptions and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e882035b-e2b2-4909-94fa-0ec411f53ff7.png","url":"https://www.softwareadvice.co.nz/software/98135/insightidr","@type":"ListItem"},{"name":"Exabeam New-Scale Fusion","position":19,"description":"New-Scale Fusion combines New-Scale SIEM and New-Scale Analytics to form the cloud-native New-Scale Security Operations Platform. Fusion applies AI and automation to security operations workflows to deliver the industry’s premier platform for threat detection, investigation and response (TDIR).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/db7e6c86-5bac-493d-9bf9-35c40325b3cf.png","url":"https://www.softwareadvice.co.nz/software/307624/exabeam","@type":"ListItem"},{"name":"Versio.io","position":20,"description":"Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated. The Versio.io platform supports a wide range of ready-made detection and import integrations and technologies in the form of operating systems, software products and frameworks, network devices and hardware devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12bb47c7-cafc-4c74-88cc-c29dfff3ccbf.png","url":"https://www.softwareadvice.co.nz/software/344207/versio-io-cmdb","@type":"ListItem"},{"name":"Panther","position":21,"description":"The software has automation tools that support teams in identifying and categorizing incidents to enable experts to analyze events effectively, driving informed decision-making. It supports IT experts in processing and retaining comprehensive security data with zero-ops and cloud-first workflow tools. \n\nPanther also provides system analysis tools to help teams identify suspicious activity as soon as it happens across an on-premises environment. Experts can use the platform to build a high-fidelity alerting pipeline with Python, version control, unit tests, and CI/CD.\n\nPanther offers entity managers a secure and centralized database to transform raw logs into a structured data warehouse, enabling users to process CSV files. It allows teams to correlate activity across operation logs data using auditing tools that encourage users to answer critical questions quickly during an investigation. It also has incident reporting tools that send high-signal alerts to operators when attacks occur.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f5647e78-d0f7-4ebf-b19b-ad4b21e06cb3.png","url":"https://www.softwareadvice.co.nz/software/192055/panther","@type":"ListItem"},{"name":"CloudJacket MXDR","position":22,"description":"CloudJacket MDR delivers a fully unified security platform that combines SIEM, XDR, and NDR into one streamlined solution—empowering you with complete threat detection and rapid response across your entire environment. Our U.S.-based Security Operations Center (SOC) operates around the clock, processing billions of alerts daily and escalating less than 0.01%. The result? Your team stays focused on real threats—not noise. CloudJacket integrates seamlessly with your existing infrastructure, whether on-prem, in the cloud, or hybrid—including AWS, Azure, and Google Cloud, and aids in meeting regulatory requirements such as HIPAA, PCI DSS, TSC, and NIST.\nLess alert fatigue. Faster response. Stronger security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.softwareadvice.co.nz/software/183664/cloudjacketx","@type":"ListItem"},{"name":"NetWitness","position":23,"description":"RSA offers managed detection and response (MDR) services to organizations of all sizes, which helps them identify, mitigate and prevent cyber threats using various risk management programs. Professionals can monitor current capabilities/gaps across processes and develop remediation strategies on a digital roadmap.\n\n\nRSA allows businesses to create tailored action plans in accordance with NIST Cybersecurity Framework's (CSF) guidelines and recommendations. Managers can perform intentional cyberattacks to monitor the performance of technical/operational controls and flag high-risk areas using multiple scoring methodologies. Additionally, users can create incident response (IR) plans and conduct walkthrough exercises for teams across security operations centers (SOC).\n\n\nRSA enables enterprises to detect endpoint threats and create IR retainer portfolios for customers. Pricing is available on request and support is extended via live chat, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbb5b6a6-b738-4611-9921-dee346cfa04b.png","url":"https://www.softwareadvice.co.nz/software/141850/netwitness","@type":"ListItem"},{"name":"CybrHawk SIEM XDR","position":24,"description":"CybrHawk XDR provides enterprise-wide protection by analyzing data from any source to detect and prevent sophisticated attacks and providing complete visibility. Simplify security operations to reduce average response time (MTTR) and reduce costs by combining tools and increasing SOC efficiency.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/74052533-80e7-420e-baf7-41358eb7a5a7.png","url":"https://www.softwareadvice.co.nz/software/231130/cybrhawk-siem-ztr","@type":"ListItem"},{"name":"Fidelis Elevate","position":25,"description":"Fidelis Elevate, an Open XDR (Extended Detection and Response) platform, enables cyber security by automating defense operations across various network architectures. It extends security controls to the cloud and endpoints and uses threat intelligence, analytics, machine learning, threat hunting, and deception technologies to gain insights into threats impacting environment. This process enables security teams to continually handle defenses and neutralize threats before they cause any damage to business operations. The solution centralizes cybersecurity intelligence for IT, IoT (Internet of Things), data centers, and cloud systems into a unified view, with full visibility and control, ensuring that end users detect post-breach attacks. \n\nFidelis Elevate is the XDR platform that offers Active Directory defense, field contextual traffic analysis, integrated deception technology, active threat detection with MITRE ATT&CK mapping, AI-based sandbox analysis, in-band traffic decryption network DLP and risk-aware terrain mapping. With integrated network, endpoint, and cloud visibility and analysis, it automatically maps cyber terrain and evaluates the risk of every asset and network path.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.softwareadvice.co.nz/software/307619/fidelis-elevate","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4725/siem/software?page=2#itemlist","numberOfItems":25}
</script>
