Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. We enable security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate build access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We'll help you find the needle in your haystack.
We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford. Gravwell is a full-stack analytics platform built to handle huge amounts of unstructured data with a pricing model that encourages, rather than punishes, keeping all of that valuable data for later analysis. Data is gold; don't throw it away to cut costs.
No features have been listed yet.
Based on our record, Gravwell seems to be more popular. It has been mentiond 1 time since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Gravwell | Go Backend Engineer; Resident Engineer & Systems Support Specialist | Remote (US) | Full-Time | https://gravwell.io Gravwell is a data analytics company with a focus on high-speed analysis of diverse data sources including binary (e.g. PCAP). Our people have extensive backgrounds in penetration testing, reverse engineering, analytics, incident response, and large scale virtualization. Our platform is... - Source: Hacker News / almost 3 years ago
GoodAccess - GoodAccess is a cloud VPN that enables secure remote access to company networks, business systems and cloud resources using zero-trust principles.
WebTitan - WebTitan is an advanced DNS based web content filter and web security layer that blocks malware, ransomware and phishing attempts as well as providing web content control. Cloud and gateway versions available.
Check Point - Check Point Infinity architecture delivers consolidated Gen V cyber security across networks, cloud, and mobile environments.
AuthAnvil - AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times. Read more about AuthAnvil.
logstash - logstash is a tool for managing events and logs.
OneLogin - On-demand SSO, directory integration, user provisioning and more