Introducing G2.ai, the future of software buying.Try now
The Onapsis Platform
Sponsored
The Onapsis Platform
Visit Website
Product Avatar Image
Security Hub

By Swiss Security Hub

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Security Hub, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
0 out of 5 stars

How would you rate your experience with Security Hub?

The Onapsis Platform
Sponsored
The Onapsis Platform
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Security Hub Reviews & Product Details

Product Avatar Image

Have you used Security Hub before?

Answer a few questions to help the Security Hub community

Security Hub Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Security Hub for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Logpoint Logo
Logpoint
4.3
(108)
Logpoint Converged SIEM platform combines SIEM, SOAR, UEBA and SAP security monitoring to consolidate your tech stack and remove complexity. With a data-centric approach, it accelerates threat detection and response to make your Security Operations Center more efficient to protect the entirety of your organization.
2
SecurityBridge Platform Logo
SecurityBridge Platform
4.6
(44)
One Platform to address all security needs of SAP customers.
3
The Onapsis Platform Logo
The Onapsis Platform
4.3
(17)
The Onapsis Platform automates testing, change, audit and security processes so cross-functional teams can focus on improving SAP availability and performance, accelerating cloud migrations and SAP S/4HANA implementations, streamlining audit processes and hardening security on-premises and in the cloud.
4
Avantra Logo
Avantra
4.6
(12)
Avantra performance monitoring and management solution provides 24/7 real-time monitoring as well as automation of daily checks for all SAP environments whether they be on-premise, cloud or HANA based.
5
Pathlock Logo
Pathlock
4.5
(12)
Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
6
PowerConnect for SAP & Splunk Logo
PowerConnect for SAP & Splunk
4.0
(1)
POWERCONNECT sends important information about what’s going on inside your SAP system, in near real time to Splunk allowing you to meet security compliance requirements, reduces P1 issues by 30% and reduce MTTR by 70% on your mission critical applications and systems.
7
XM Cyber Exposure Management Platform Logo
XM Cyber Exposure Management Platform
3.5
(1)
XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.
8
SAP Enterprise Threat Detection Logo
SAP Enterprise Threat Detection
(0)
SAP Enterprise Threat Detection is a real-time Security Information and Event Management (SIEM solution designed to help organizations identify, analyze, and neutralize cyberattacks targeting their SAP applications as they occur, preventing significant damage. By continuously monitoring system activities, it provides immediate insights into potential threats, ensuring the security and integrity of critical business processes. Key Features and Functionality: - Log Correlation and Analysis: Aggregates and analyzes extensive log data to offer a comprehensive view of IT landscape activities, enabling forensic threat detection and the discovery of previously unknown attack variants. - Automated Threat Detection and Alerting: Utilizes predefined detection patterns to identify SAP-specific threats, allowing for the creation of custom attack detection patterns without additional coding. It also facilitates thorough attack investigations and integrates with external processes and solutions. - Straightforward Integration: Detects threats at both the application server and database levels, ensuring seamless integration across the entire IT landscape with SAP solutions. - Deployment Flexibility: Offers both on-premise and cloud deployment options, including availability as a 24/7 managed service, catering to diverse organizational needs. - Compliance Support: Assists in adhering to data protection and audit regulations by providing real-time intelligence to enforce data governance and detect both external and internal cybersecurity threats. Primary Value and Problem Solved: SAP Enterprise Threat Detection empowers organizations to proactively safeguard their SAP applications by delivering real-time insights into suspicious activities, thereby minimizing financial losses and mitigating legal and reputational risks. By enhancing transparency and simplifying the analysis of potential security incidents, it enables businesses to identify security gaps, understand the impact of threats, and ensure the continuity of operations. This comprehensive approach to threat detection and response addresses the critical need for robust cybersecurity measures in an increasingly complex digital landscape.
9
Microsoft Sentinel solutions for SAP Applications Logo
Microsoft Sentinel solutions for SAP Applications
(0)
SAP systems and applications handle massive amounts of sensitive data that is hosted on Azure, Google Cloud Platform (GCP), Amazon Web Services (AWS), or on-premises infrastructure. The SAP ecosystem is complex and difficult for security operations (SecOps) teams to effectively monitor and protect. The Microsoft Sentinel solution for SAP® applications allows you to monitor, detect, and respond to suspicious activities and guard your business-critical data against sophisticated cyberattacks.
10
bowbridge Logo
bowbridge
(0)
bowbridge Anti-Virus for SAP solutions is the leading SAP-certified virus-scanning and content security solution for SAP infrastructures. Leveraging SAP NW-VSI 2.0, it allows fast and easy integration of virus scan and content security into ABAP- and Java-based applications.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.