Logsign Unified SO Platform vs CloudJacket
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Logsign Unified SO Platform delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intelligence, UEBA, and SOAR capabilities.
Logsign Unified SO Platform delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
Images
Pricing
Starting from
US$18,000.00/year
- Free Version
- Free Trial
- Subscription
Starting from
US$10.00/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.9/ 5Features
4.8/ 5Customer Service
4.9/ 5Value for Money
4.8/ 5Ease of Use
5/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Features
Total features 82
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Analytics
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Virus
- Application Security
- Archiving & Retention
- Asset Discovery
- Audit Management
- Audit Trail
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Continuous Monitoring
- Correlation Analysis
- Customizable Dashboard
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Classification
- Data Security
- Data Visualization
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Incident Reporting
- Indexing
- Intrusion Detection System
- Investigation Management
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Multi-Channel Communication
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Patch Management
- Performance Metrics
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Process/Workflow Automation
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Status Tracking
- Tagging
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Whitelisting/Blacklisting
Total features 82
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Analytics
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Virus
- Application Security
- Archiving & Retention
- Asset Discovery
- Audit Management
- Audit Trail
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Continuous Monitoring
- Correlation Analysis
- Customizable Dashboard
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Classification
- Data Security
- Data Visualization
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Incident Reporting
- Indexing
- Intrusion Detection System
- Investigation Management
- Log Analysis Software
- Log Collection
- Log Management
- Log Parsing
- Log Rotation
- Monitoring
- Multi-Channel Communication
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Patch Management
- Performance Metrics
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Process/Workflow Automation
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Status Tracking
- Tagging
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Whitelisting/Blacklisting
Integrations
- Acronis Cyber Backup
- Acronis Files Connect
- Aruba ClearPass
- Avaya CPaaS
- Bitdefender GravityZone
- Brandefense
- Cortex XDR
- EMC
- F5 Advanced Web Application Firewall
- F5 BIG-IP DNS
- F5 SSL Orchestrator
- FortiGate Next-Generation Firewall
- Google Cloud
- GreyNoise
- IBM Security QRadar
- ManageEngine Identity360
- ManageEngine PAM360
- Mcafee Total Protection
- Microsoft 365
- Microsoft Azure
- Microsoft Teams
- MojoAuth
- NXLog
- Oracle Beehive
- Picus Security
- ServiceNow
- Telegram
- Trend Micro
- Acronis Cyber Backup
- Acronis Files Connect
- Aruba ClearPass
- Avaya CPaaS
- Bitdefender GravityZone
- Brandefense
- Cortex XDR
- EMC
- F5 Advanced Web Application Firewall
- F5 BIG-IP DNS
- F5 SSL Orchestrator
- FortiGate Next-Generation Firewall
- Google Cloud
- GreyNoise
- IBM Security QRadar
- ManageEngine Identity360
- ManageEngine PAM360
- Mcafee Total Protection
- Microsoft 365
- Microsoft Azure
- Microsoft Teams
- MojoAuth
- NXLog
- Oracle Beehive
- Picus Security
- ServiceNow
- Telegram
- Trend Micro