Receive updated threat intelligence from multiple sources, including IP and Domain Reputation databases, to monitor for known and unknown security threats.
Collect log file information from disparate sources, and hone in on the most critical threats by rapidly assessing intent and severity.
Normalize logs from your ecosystem, and analyze them against multiple sources of threat intelligence.
One year of normalized and raw log archive is included, which can give you the ability to recall and compare past incidents with recent events.
Automatically analyze the amount and types of attacks, and use this near real-time data to create and implement actionable incident responses.
Rapidly normalize, search, and analyze thousands of logs to understand the nature of ecosystem vulnerability, threats, and attacks.
Automate intelligent responses to quickly remediate security incidents, which can remove the need for constant user threat assessment and interaction.
Multi-conditional, cross-correlated alarms work in tandem with the Active Response engine to help you identify and summarize important events.
Demonstrate audit compliance by leveraging existing report templates, or create custom reports to fit your business needs.
With multi-tenant architecture and white-labeling capabilities, safeguard your managed networks with a threat monitoring tool that was designed with the needs of MSSPs in mind.
Threat Monitor is cloud based, so it consumes a negligible amount of resources with little impact on the performance of your network.
Data processed by Threat Monitor remains with your organization. Data isn’t sent to the cloud, made public, or shared.
Threat Monitor has visibility of network traffic, helping to detect issues ranging from compliance to malicious attacks without signatures.
Threat Monitor can consume logs from sources such as Syslog, Ossec, JSON, WMI, Snare, DB Queries, RegEx plugins, and many others.
Threat Monitor is licensed on a simple “by node” model where you only pay for what you need, unlike more complex volume-based models.
Threat monitoring, response, and reporting tools for managed networks with Threat Monitor - Service Provider Edition, designed with Service Provider workflows in mind.