Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
No images available

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

2 /5
(1)

Ease of Use

5/ 5

Features

2/ 5

Customer Service

1/ 5

Value for Money

2/ 5

No reviews available

Already have STORM?

Write a Review!

Total features 99

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Automatic Configuration
  • Backup and Recovery
  • Behavior Tracking
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Collaboration Tools
  • Communications Management
  • Compliance Management
  • Compression
  • Configuration Management
  • Content Caching
  • Content Routing
  • DDoS Protection Software
  • Dashboard
  • Data Loss Prevention Software
  • Data Security
  • Data Visualization
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • Fraud Detection
  • HTTP Caching
  • Health Monitoring
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Issue Management
  • Load Distribution
  • Monitoring
  • Multi-Channel Communication
  • Multi-Cloud Management
  • Network Monitoring
  • Network Provisioning
  • On Call Scheduling
  • PCI Compliance
  • Password Management
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Redundancy Checking
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • SSL Decryption
  • SSL Offload
  • SSL Security
  • Safety Incident Management
  • Schedulers
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Tokenization
  • Traffic Control
  • Two-Factor Authentication
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 33

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Automatic Configuration
  • Backup and Recovery
  • Behavior Tracking
  • Behavioral Analytics
  • Bot Detection
  • Bot Mitigation
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Collaboration Tools
  • Communications Management
  • Compliance Management
  • Compression
  • Configuration Management
  • Content Caching
  • Content Routing
  • DDoS Protection Software
  • Dashboard
  • Data Loss Prevention Software
  • Data Security
  • Data Visualization
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Firewalls
  • Fraud Detection
  • HTTP Caching
  • Health Monitoring
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Issue Management
  • Load Distribution
  • Monitoring
  • Multi-Channel Communication
  • Multi-Cloud Management
  • Network Monitoring
  • Network Provisioning
  • On Call Scheduling
  • PCI Compliance
  • Password Management
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Real-time Alerts
  • Redundancy Checking
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • SSL Decryption
  • SSL Offload
  • SSL Security
  • Safety Incident Management
  • Schedulers
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Status Tracking
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Tokenization
  • Traffic Control
  • Two-Factor Authentication
  • User Management
  • VPN Software
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Monitoring
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management
Not provided by vendor
  • Bugzilla
  • OTRS
  • VMRay Analyzer
  • baramundi Management Suite