• Graylog
  • Graylog

    Graylog is a log management and reporting platform designed for IT security and operations teams. It enables real-time log analysis, anomaly detection, and compliance monitoring, improving system performance and security.

Relevant Sub categories Relevant Products
Infor CloudSuite Public Sector Infor CloudSuite Public Sector
Exabeam Exabeam
OpenText AI and Analytics OpenText AI and Analytics
Bandit Bandit
Brakeman Brakeman
CoreOS flannel CoreOS flannel
CoreOS Ignition CoreOS Ignition
Flexera Software Vulnerability Management Flexera Software Vulnerability Management
JFrog Xray JFrog Xray
Metasploit Metasploit
OpenVAS OpenVAS
OWASP Zed Attack Proxy (ZAP) OWASP Zed Attack Proxy (ZAP)
Test Data Manager Test Data Manager
AWS Control Tower AWS Control Tower
BMC Helix Discovery BMC Helix Discovery
Honeywell Pro-Watch Honeywell Pro-Watch
IBM Security Privileged Identity Manager IBM Security Privileged Identity Manager
McAfee Enterprise Security Manager McAfee Enterprise Security Manager
Microsoft Defender ATP Microsoft Defender ATP
Netwrix (All Products) Netwrix (All Products)
Tenable.io Tenable.io
VMware Carbon Black Cloud Endpoint Standard VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black EDR VMware Carbon Black EDR
Traction TeamPage Traction TeamPage
CA Earl CA Earl
SAP Crystal Dashboard SAP Crystal Dashboard
Now Platform Now Platform
Amazon Reserved Instance (RI) Reporting Amazon Reserved Instance (RI) Reporting
AWS Cost & Usage Report AWS Cost & Usage Report
EasyMorph EasyMorph
SAP HANA Live SAP HANA Live
SAP Sybase InfoMaker SAP Sybase InfoMaker
Splunk Enterprise Splunk Enterprise
eReportal eReportal
IBM Cognos Impromptu IBM Cognos Impromptu
Oracle Enterprise Performance Reporting Cloud Oracle Enterprise Performance Reporting Cloud
QueBIT FrameWORQ QueBIT FrameWORQ
ReportsNow ReportsNow
SAP Crystal Reports SAP Crystal Reports
SRS ReportSmith SRS ReportSmith
Menlo Security Menlo Security
Accertify Accertify
BeyondTrust Remote Support BeyondTrust Remote Support
Bot Management Bot Management
Castle Castle
Allgress Allgress
AWS Artifact AWS Artifact
Bottomline Fraud and Financial Crime Management Bottomline Fraud and Financial Crime Management
CA Risk Authentication CA Risk Authentication
ControlPanelGRC ControlPanelGRC
Fastpath Assure Fastpath Assure
Fusion Framework System Fusion Framework System
HighBond HighBond
JupiterOne JupiterOne
LexisNexis InstantID LexisNexis InstantID
LogicManager LogicManager
McAfee Risk Advisor McAfee Risk Advisor
MetricStream IT Risk Management App MetricStream IT Risk Management App
OneTrust DataGovernance OneTrust DataGovernance
OneTrust GRC OneTrust GRC
Oracle Risk Management Cloud Oracle Risk Management Cloud
Prevalent Prevalent
Privacera Privacera
Resolver GRC Resolver GRC
SafePaaS SafePaaS
SAP GRC SAP GRC
Security Weaver Security Weaver
SureCloud SureCloud
Vanguard Analyzer Vanguard Analyzer
Venminder Venminder
Veritas Data Insight Veritas Data Insight
Veritas Risk Advisor Veritas Risk Advisor
Brinqa Brinqa
Oracle Hospitality Reporting and Analytics Oracle Hospitality Reporting and Analytics
NetSuite SuiteBuilder NetSuite SuiteBuilder
Avast Managed Workplace Avast Managed Workplace
Datto RMM Datto RMM
NinjaRMM NinjaRMM
SolarWinds RMM SolarWinds RMM
Anixter Anixter
JD Edwards EnterpriseOne One View JD Edwards EnterpriseOne One View
Gremlin Gremlin
IBM QRadar Vulnerability Manager IBM QRadar Vulnerability Manager
Nmap Nmap
Nikto Nikto
ApeSoft DataCycle ApeSoft DataCycle
Aquant Aquant
ASG Safari ASG Safari
Google Cloud Connect Google Cloud Connect
Oracle Business Intelligence Publisher Oracle Business Intelligence Publisher
SAS Scalable Performance Data Server SAS Scalable Performance Data Server
ServiceNow Reporting ServiceNow Reporting
Brainwave Identity GRC Brainwave Identity GRC
LeaseTerm LeaseTerm
ConnectWise Automate ConnectWise Automate
ASG Report.Web ASG Report.Web
Beeline Report Builder Beeline Report Builder
BMC Control-D BMC Control-D
CA Dispatch CA Dispatch
CA Raps CA Raps
Cisco Unified Intelligence Center Cisco Unified Intelligence Center
Cyberquery Cyberquery
EiS Technologies EiS Technologies
Epic Clarity Epic Clarity
IBM Tivoli Netcool/Reporter IBM Tivoli Netcool/Reporter
IBM Tivoli Output Manager IBM Tivoli Output Manager
Microsoft SQL Server Reporting Services Microsoft SQL Server Reporting Services
Sagent Data Flow Sagent Data Flow
Spreadsheet Server Spreadsheet Server
Xima Software Xima Software
CA Advantage VISION:Report CA Advantage VISION:Report
Amazon GuardDuty Amazon GuardDuty
Armis Armis
AWS Shield AWS Shield
Badger Software Badger Software
BlackStratus BlackStratus
Cofense Cofense
CyberGRX CyberGRX
Cygilant Cygilant
Frontline VM Frontline VM
GardaWorld GardaWorld
Gurucul Gurucul
HIAB HIAB
IBM QRadar SIEM IBM QRadar SIEM
InsightIDR InsightIDR
InsightVM InsightVM
Kerio Control Kerio Control
LogRhythm NextGen SIEM Platform LogRhythm NextGen SIEM Platform
ManageEngine Log360 ManageEngine Log360
MITRE ATT&CK MITRE ATT&CK
Nexpose Nexpose
NopSec NopSec
RedSeal RedSeal
RiskIQ RiskIQ
RSA enVision RSA enVision
SAP Enterprise Threat Detection SAP Enterprise Threat Detection
SecurityScorecard SecurityScorecard
Securonix Next-Gen SIEM Securonix Next-Gen SIEM
ServiceNow Security Operations ServiceNow Security Operations
Splunk Enterprise Security Splunk Enterprise Security
Suricata Suricata
Symmetry Security Platform Symmetry Security Platform
Tenable.sc Tenable.sc
ThreadFix ThreadFix
ThreatSim ThreatSim
Trustwave (All Products) Trustwave (All Products)
Uptycs Uptycs
Cygilant SOCVue Cygilant SOCVue
41st Parameter 41st Parameter
Alienvault OSSIM Alienvault OSSIM
Arctic Wolf Arctic Wolf
Authentify Authentify
Autonomy Enterprise Archive Solution (EAS) Autonomy Enterprise Archive Solution (EAS)
AWS Single Sign-On AWS Single Sign-On
BetterCloud BetterCloud
BlueVoyant BlueVoyant
BMC TrueSight Vulnerability Management BMC TrueSight Vulnerability Management
Broadcom Advanced Authentication Broadcom Advanced Authentication
CompliancePro CompliancePro
CoreOS Clair CoreOS Clair
Coupa Risk Aware Coupa Risk Aware
CrowdStrike Falcon X CrowdStrike Falcon X
Dahua Dahua
Dell SecureWorks Dell SecureWorks
DNSFilter DNSFilter
Enablon Enablon
ePrism Email Security ePrism Email Security
ExtraHop Reveal(x) ExtraHop Reveal(x)
Fidelis Cybersecurity Fidelis Cybersecurity
GBS Permessa GBS Permessa
GFI LanGuard GFI LanGuard
Google Cloud Security Scanner Google Cloud Security Scanner
Greenbone Greenbone
IDaptive IDaptive
JFrog Bintray JFrog Bintray
Lookout Lookout
ManageEngine ADAudit Plus ManageEngine ADAudit Plus
McAfee MVISION Cloud McAfee MVISION Cloud
Micro Focus Operations Manager Micro Focus Operations Manager
Micro Focus Secure Messaging Gateway Micro Focus Secure Messaging Gateway
Nexus Vulnerability Scanner Nexus Vulnerability Scanner
Nutanix Xi Beam Nutanix Xi Beam
One Identity Defender One Identity Defender
Optiv Security Optiv Security
Oracle Adaptive Access Manager Oracle Adaptive Access Manager
Oracle API Gateway Oracle API Gateway
Orbcom Orbcom
PowerTech PowerTech
Proofpoint Essentials Proofpoint Essentials
Protegrity Protegrity
Quad9 Quad9
Recorded Future Recorded Future
RiskSense RiskSense
RSA SecurID Suite RSA SecurID Suite
SafeBreach SafeBreach
SAP Ariba Supplier Risk SAP Ariba Supplier Risk
Security Key Enforcement Security Key Enforcement
ServiceNow Vulnerability Response ServiceNow Vulnerability Response
Sift Sift
SilverSky SilverSky
Splunk App for Infrastructure Splunk App for Infrastructure
Splunk Insights Splunk Insights
Splunk User Behavior Analytics Splunk User Behavior Analytics
Symantec Cloud Workload Protection Symantec Cloud Workload Protection
Tenable Nessus Tenable Nessus
Tripwire Tripwire
Tripwire IP360 Tripwire IP360
TrustArc TrustArc
Trustwave AppDetectivePRO Trustwave AppDetectivePRO
Verimatrix Verimatrix
WireWheel WireWheel
X-Ways X-Ways

User list of Graylog

Get the customer list of Graylog from our dataset by location, vertical, size or persona filters