Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and log monitoring. It allows staff members to automatically compare data across multiple systems and generate alerts based on perceived threat priority.
Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$5,093.00/one-time

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$0.00/one-time

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.7 /5
(9)

Ease of Use

3.9/ 5

Features

4.3/ 5

Customer Service

4.4/ 5

Value for Money

4.4/ 5

Overall rating

4.9 /5
(12)

Ease of Use

4.8/ 5

Features

4.5/ 5

Customer Service

5/ 5

Value for Money

4.9/ 5

Total features 46

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualization
  • Diagnostic Tools
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • HIPAA Compliant
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • PCI Assessment
  • PCI Compliance
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Web Traffic Monitoring
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 62

  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualization
  • Diagnostic Tools
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • HIPAA Compliant
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Intrusion Detection System
  • Log Analysis Software
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • PCI Assessment
  • PCI Compliance
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Reporting
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Web Traffic Monitoring
  • Whitelisting/Blacklisting
  • Workflow Management
Not provided by vendor
  • AWS CloudTrail
  • Amazon CloudWatch
  • Carbon Black App Control
  • Carbon Black Cloud Workload
  • Carbon Black EDR
  • Carbon Black Endpoint
  • Cisco Meraki
  • Cisco Umbrella
  • CylanceENDPOINT
  • Duo Security
  • ESET Endpoint Security
  • F5 BIG-IP DNS
  • FortiGate Next-Generation Firewall
  • Google Workspace
  • LastPass
  • Malwarebytes for Teams
  • Microsoft 365
  • Microsoft 365 Defender
  • Microsoft Azure
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Office 365
  • Microsoft Intune
  • MimeCast Email Security
  • Okta
  • SentinelOne
  • Symantec Endpoint Detection and Response
  • Symantec Endpoint Security
  • Trend Micro
  • VMware Carbon Black Cloud
  • WatchGuard Firebox
  • Webroot Business Endpoint Protection
  • Webroot DNS Protection
  • Webroot SecureAnywhere
  • vCenter Server
  • vSphere