Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and log monitoring. It allows staff members to automatically compare data across multiple systems and generate alerts based on perceived threat priority.
Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins,...

Platforms Supported

  • Web Based
  • iPhone App
  • Android App
  • Windows App

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • Chat

Starting from

US$1 200,00/month

  • Subscription

Starting from

US$35,00/month

  • Subscription

Overall rating

5 /5
(4)
Ease of Use
5/5
Features & Functionality
4,8/5
Customer Service
5/5
Value for Money
5/5

Overall rating

5 /5
(1)
Ease of Use
5/5
Features & Functionality
5/5
Customer Service
5/5
Value for Money
5/5

Total features 49

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Application Security
  • Archiving & Retention
  • Asset Management
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customizable Reports
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • FTP Monitoring
  • File Integrity Monitoring
  • Forensic Analysis
  • Fraud Detection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Log Collection
  • Log Management
  • Monitoring
  • Network Monitoring
  • Network Security Software
  • Order Tracking
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritization
  • Purchasing & Receiving
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Role-Based Permissions
  • Rules-Based Workflow
  • Search/Filter
  • Security Auditing
  • Server Logs
  • Signature Matching
  • Spam Blocker
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Activity Monitoring
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 22

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Application Security
  • Archiving & Retention
  • Asset Management
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customizable Reports
  • Data Visualization
  • Email Alerts
  • Endpoint Management
  • Event Logs
  • FTP Monitoring
  • File Integrity Monitoring
  • Forensic Analysis
  • Fraud Detection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Log Collection
  • Log Management
  • Monitoring
  • Network Monitoring
  • Network Security Software
  • Order Tracking
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritization
  • Purchasing & Receiving
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Role-Based Permissions
  • Rules-Based Workflow
  • Search/Filter
  • Security Auditing
  • Server Logs
  • Signature Matching
  • Spam Blocker
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Activity Monitoring
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management
  • Cisco Meraki
  • Duo Security
  • ESET Endpoint Security
  • Google Workspace
  • LastPass
  • Malwarebytes Endpoint Protection
  • Microsoft 365
  • Microsoft Azure
  • Okta
  • Symantec Endpoint Protection
  • Cisco Meraki
  • Duo Security
  • ESET Endpoint Security
  • Google Workspace
  • LastPass
  • Malwarebytes Endpoint Protection
  • Microsoft 365
  • Microsoft Azure
  • Okta
  • Symantec Endpoint Protection