search
Join or Log In

Monitoring

Browse 13 cybersecurity tools tagged with "Monitoring"

DuskRise Security Dashboard

DuskRise Security Dashboard

language

Security Information and Event Management

DuskRise Security Dashboard on SecurityListing: Security dashboard for remote network visibility and policy enforcement

4.7(2)
FortiRecon

FortiRecon

language

Threat Intelligence Platforms

FortiRecon on SecurityListing: FortiRecon is a SaaS-based Continuous Threat Exposure Management service that combines Attack Surface Management, Brand Protection, and Adversary Centric Intelligence to provide visibility into internal and external risks for early threat detection and response.

4.7(2)
Logz.io Distributed Tracing

Logz.io Distributed Tracing

language

Security Information and Event Management

Logz.io Distributed Tracing on SecurityListing: Distributed tracing platform for monitoring microservices performance

4.5(3)
Miggo Security

Miggo Security

language

Dynamic Application Security Testing

Miggo Security on SecurityListing: Application monitoring and security platform that provides runtime visibility, threat detection, and automated response capabilities for application-layer security

4.5(1)
Wotan Monitoring

Wotan Monitoring

Austria flag

Security Operations

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring. Business processes are increasingly digitally controlled. You lo

4.5(1)
Proofpoint Insider Threat Management

Proofpoint Insider Threat

language

Data Loss Prevention

Proofpoint Insider Threat Management on SecurityListing: A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.

4.5(1)
NinjaOne RMM

NinjaOne RMM

language

Endpoint Protection Platform

NinjaOne RMM on SecurityListing: RMM platform for automating IT management and technician operations

4.5(1)
bluedog Security Monitoring

bluedog Security Monitoring

United Kingdom flag

Security Operations

Our goal is to provide businesses with a level of network protection typically only afforded by large corporations. We aim to bring high quality technology, support and service to the small to medium

4.5(1)
Phone Monitoring Service

Phone Monitoring Service

United States flag

Penetration Testing

Phone Monitoring Service provides cyber security services, ethical hacking services, social media hacking services in the USA, Canada, Europe. As a cyber security company, we offer one-stop phone sec

4.3(2)
Satori

Satori

language

Data Security Posture Management

Satori on SecurityListing: A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.

SOCRadar Digital Risk Protection Platform

SOCRadar Digital Risk

language

Threat Intelligence Platforms

SOCRadar Digital Risk Protection Platform on SecurityListing: A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.

Resecurity Risk Digital Risk Monitoring Platform

Resecurity Risk Digital

language

Threat Intelligence Platforms

Resecurity Risk Digital Risk Monitoring Platform on SecurityListing: A digital risk monitoring platform that provides automated security posture assessment, threat intelligence, and continuous monitoring of enterprise digital assets across multiple risk vectors.

Suped

Suped

language

Email Security Platforms

Suped on SecurityListing: Suped is an email deliverability platform that provides DMARC monitoring, email authentication management, and deliverability optimization tools to protect domains from spoofing and improve inbox placement rates.