What is Rapid7 Security Information And Event Management SIEM?
Show Less- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Security Information And Event Management (Siem) Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Rapid7 Security Information And Event Management SIEM Pricing View vendors pricing
Check out our offers for each of our packages to get best out of the software
InsightIDR Advanced
$5.61
per month, per asset
Visit us on our website to know more
Get a custom quote
Rapid7 Security Information And Event Management SIEM Features
Primary Features
User Activity Monitoring
User Activity Monitoring (UAM) tracks the behavior of internal end-users—employees, subcontractors, partners, and so on—on a company’s networks,
Endpoint Management
Unified Endpoint Management (UEM) allows IT to manage, secure, and deploy corporate resources and applications on any device from a single console.
Behavioral Analytics
User behavior analytics (UBA) is the tracking, collecting and assessing of user data and activities using monitoring systems.
Network Monitoring
Network Monitoring is the process of discovering, mapping, and monitoring a computer network to ensure optimal availability and performance.
Log Management
A Log Management System (LMS) is a software solution that gathers, sorts and stores log data and event logs from a variety of sources in one centralized location.
Real Time Monitoring
Real-time monitoring is a technique that allows you to determine the current state of queues and channels within a queue manager.
Threat Intelligence
Threat intelligence, or cyber threat intelligence, is information an organization uses to understand the threats that have, will, or are currently targeting the organization.
File Integrity Monitoring
File integrity monitoring, or FIM, is a technology that monitors and detects file changes that could be indicative of a cyberattack.
Remediation Management
Remediation risk management (RRM) is the process for managing uncontrollable project activities or circumstances that may result in negative consequences to remediation system performance.
Secondary Features
- Alerts/Notifications
Compare with Similar Products
SolarWinds SIEM
ManageEngine EventLog Analyzer SIEM
Securonix Next-Generation SIEM
LogPoint SIEM
LogRhythm Security Information And Event Management SIEM
McAfee SIEM
IBM QRadar Incident Forensics SIEM
RSA NetWitness SIEM
Datadog SIEM
OSSEC Security Information And Event Management (Siem) Software