Software Alternatives & Reviews

Top 9 Monitoring Tools in Cyber Security

The best Monitoring Tools within the Cyber Security category - based on our collection of reviews & verified products.

Summary

The top products on this list are Zabbix, Nmap, and Qualys. All products here are categorized as: Systems for tracking and analyzing the performance and health of various digital assets and environments. Software and tools focused on protecting computer systems, networks, and data from digital attacks, unauthorized access, and other online threats. One of the criteria for ordering this list is the number of mentions that products have on reliable external sources. You can suggest additional sources through the form here.
  1. 1
    Track, record, alert and visualize performance and availability of IT resources
    Pricing:
    • Open Source
    • Free

    #Monitoring Tools #Performance Monitoring #DevOps Tools 5 social mentions

  2. 2
    Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.

    #Security #Security Monitoring #Monitoring Tools 186 social mentions

  3. 3
    Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.

    #Security #Web Application Security #File Sharing

  4. Sumo Logic is a secure, purpose-built cloud-based machine data analytics service that leverages big data for real-time IT insights

    #Monitoring Tools #Performance Monitoring #Log Management 1 social mentions

  5. LogMeIn Central is a comprehensive endpoint management software that easily helps IT professionals manage and monitor their organizationโ€™s endpoint infrastructure.

    #Office & Productivity #Monitoring Tools #Machine Data Analytics 1 user reviews

  6. 6
    Nessus Professional is a security platform designed for businesses who want to protect the security of themselves, their clients, and their customers.

    #Security #Web Application Security #Vulnerability Scanner

  7. Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.

    #Monitoring Tools #Security & Privacy #Office & Productivity

  8. Check if your account has been compromised in a data breach

    #Data Breach #Security & Privacy #Cyber Security 3664 social mentions

  9. ESET internet security solutions deliver proactive, multi-layered protection, including antivirus, anti-phishing, exploit blocker and more, to protect the business from all known and emerging malware and threats.

    #Office & Productivity #Monitoring Tools #HR

Related categories

If you want to make changes on any of the products, you can go to its page and click on the "Suggest Changes" link. Alternatively, if you are working on one of these products, it's best to verify it and make the changes directly through the management page. Thanks!