This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Sungard Managed SIEM Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of Sungard Managed SIEM for G2 to provide buying insight. Below are some alternatives with more reviews:
1
GSI, Inc.
4.9
(47)
GSI, Inc. specializes in providing a broad spectrum of business, functional, and technical consulting services for Oracle JD Edwards, Oracle NetSuite, Oracle Cloud, ServiceNow, HubSpot and other enterprise applications. GSI also offers an extensive array of cloud/hosting solutions using Oracle Cloud (OCI), Amazon Web Services (AWS), Microsoft Azure and private cloud options.
2
Huntress Managed SIEM
4.7
(38)
Huntress Managed SIEM was built from the ground up to solve the problem of data overload, unfiltered sources, and alert fatigue. Our Managed SIEM redefines the industry standard by applying Smart Filtering capabilities at the log source to only capture threat-specific logs. This simplifies the workload toward threat discovery and data retention. Managed SIEM is also built to collect Windows-based events and syslog using the same proprietary agent you’re familiar with. Supported by our AWS backend, your data is stored, safely and reliably.
3
Cybriant
4.7
(34)
Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services.
4
Corsica Technologies
4.5
(31)
Consistently recognized as one of the top managed IT and cybersecurity providers, Corsica Technologies helps companies leverage technology as a competitive business advantage. We bring cohesion to your technology strategy, addressing all your needs from one integrated partner. Through our specialized knowledge of IT and cybersecurity, we are a collaborative partner in driving your business forward.
5
Trustwave Managed SIEM
4.2
(20)
Trustwave Managed SIEM helps enterprises see through data noise easily, respond to emerging threats quickly, and cost-effectively maximize protection while proving compliance. Whether your challenge is choosing the right SIEM, fully staffing it, containing costs, or keeping up with new threats and compliance requirements, Trustwave can help.
6
Netsurion
4.6
(18)
Netsurion’s Managed Threat Protection solution provides the necessary synergy between people, process, and technology to truly deliver world-class cybersecurity today.
7
CyberDuo
4.9
(15)
CyberDuo provides IT and Cloud consulting services to small, medium and large organizations. Our main focus is AWS consulting and support.
8
Velstadt
5.0
(11)
At Velstadt, we empower organisations with cutting-edge cybersecurity services that ensure resilience against evolving cyber threats. Our expertise lies in delivering tailored security strategies in line with international standards such as ISO/IEC 27001, GDPR, NIS2 and others, helping organisations protect their critical information systems and maintain compliance.
Why Velstadt?
→ Tailor-made Security Solutions - We adapt our approach to meet your unique business needs.
→ Innovative Technology - Leveraging the industry-leading tools, including our proprietary Threat Intelligence Platform.
→ Proven Expertise - Comprehensive hands-on experience securing organisations across all industries.
Our Core Services:
→ SOC-as-a-Service - 24/7 threat monitoring, incident detection, and automated response.
→ Penetration Testing - Identifying and mitigating/remediating vulnerabilities before attackers can exploit them.
→ Threat Intelligence - Delivering real-time insights on emerging threats, APT, IOCs, and IOAs, while our Threat Hunting proactively identifies and remediates hidden threats within the infrastructure before they escalate.
→ Dark Web Monitoring - Detecting leaks and exposure of sensitive data on hidden dark web platforms, forums, and other sources.
→ Cloud Security - Robust protection for your cloud infrastructure on AWS, Azure, and GCP.
→ Vulnerability Management - Detecting and addressing vulnerabilities to maintain a secure environment.
→ Security Consulting & Virtual CISO - Providing expert guidance to help organisations develop and implement robust cybersecurity strategies, manage incidents, and ensure regulatory compliance.
At Velstadt, we don't just mitigate threats - we build security ecosystems that drive long-term resilience. Contact us today for a tailored security strategy that will keep your organisation ahead of cyber risks.
9
ITECS Outsourcing
4.9
(11)
ITECS is a distinguished Managed Service Provider (MSP) that offers unparalleled IT solutions and services to its esteemed clientele. Our unwavering commitment lies in providing our clients with the robust support necessary to thrive in an increasingly digital landscape.
Based in Dallas, iTecs builds long-lasting and fruitful partnerships with every client through attentive collaboration. We provide a comprehensive range of services, including IT support, consultation, managed IT services (MSP), cybersecurity, and cloud hosting offerings, to businesses of all sizes within Dallas and beyond.
Our sophisticated, customer-centric approach emphasizes delivering IT support that exceeds our clients' expectations. We assign a proficient team of experienced Network and System Administrators to your organization so that you can access remote and onsite assistance. Additionally, Brian Desmot, ITECS' esteemed founder, shares his expertise as a fractional CIO/CTO, providing cybersecurity and consultative services.
10
CyberSecOp
5.0
(10)
CyberSecOp Managed SIEM help businesses achieve compliance with regulations and requirements, including the Payment Card Industry Data Security Standard (PCI DSS).
Pricing
Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.
