Software Alternatives, Accelerators & Startups

Top 9 Ethical Hacking Products in Log Management

The best Ethical Hacking Products within the Log Management category - based on our collection of reviews & verified products.

Forcepoint Web Security Suite NSFOCUS insightIDR McAfee Threat Intelligence Exchange Nessus TheHive Invicti (formerly Netsparker) Falcon Intelligence CyberSponse

Summary

The top products on this list are Forcepoint Web Security Suite, NSFOCUS, and insightIDR. All products here are categorized as: Ethical Hacking. Systems for managing and analyzing log files. One of the criteria for ordering this list is the number of mentions that products have on reliable external sources. You can suggest additional sources through the form here.
  1. Internet Security

    #Bug Bounty As A Service #Network Security #Cyber Security

  2. NSFOCUS provides comprehensive, end-to-end protection from the debilitating effects of DDoS attacks.

    #Bug Bounty As A Service #Network Security #Cyber Security

  3. insightIDR is an incident detection and response tool.

    #Bug Bounty As A Service #Network Security #Cyber Security

  4. NOTE: McAfee Threat Intelligence Exchange has been discontinued.
    McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment.

    #Cyber Security #Web Security #Security & Privacy

  5. 5
    Nessus Professional is a security platform designed for businesses who want to protect the security of themselves, their clients, and their customers.

    #Web Application Security #Security #Monitoring Tools

  6. The Hive is a scalable, open source, and free security incident response platform.
    Pricing:
    • Open Source

    #Bug Bounty As A Service #Network Security #Cyber Security 9 social mentions

  7. Netsparker Security Scanner is a simple-yet-powerful web-based security scanner that automatically identifies XSS, SQL Injection, and all the other vulnerabilities and security flaws in sites, web apps, and web services.

    #Log Management #Monitoring Tools #Incident Management

  8. Falcon X is a customizable cyber threat intelligence platform that automates incident investigation, finds malware, speeds up breach response, and makes predictive security a reality.

    #Bug Bounty As A Service #Operating Systems #Cyber Security

  9. CyberSponse is a enterprise automation and orchestration platform that combines both cyber security solutions with human intuition.

    #Bug Bounty As A Service #Network Security #Cyber Security

Related categories

Recently added products

If you want to make changes on any of the products, you can go to its page and click on the "Suggest Changes" link. Alternatively, if you are working on one of these products, it's best to verify it and make the changes directly through the management page. Thanks!