Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cortex XSIAM, developed by Palo Alto Networks, represents a cutting-edge security operations platform aimed at transforming the landscape of threat detection, management, and response. This innovative solution leverages AI-powered analytics, automation, and extensive visibility to significantly boost the performance and efficiency of Security Operations Centers (SOCs). By assimilating data from various sources such as endpoints, networks, and cloud environments, Cortex XSIAM delivers real-time insights along with automated workflows that expedite threat detection and mitigation. Its advanced machine learning technologies help to minimize distractions by effectively correlating and prioritizing alerts, allowing security teams to concentrate on the most pressing incidents. Additionally, the platform's scalable design and proactive threat-hunting capabilities enable organizations to remain vigilant against the ever-changing nature of cyber threats, all while optimizing operational workflows. As a result, Cortex XSIAM not only enhances security posture but also promotes a more agile and responsive operational environment.

Description

ITrust operates the Control and Supervision Center, known as the Security Operation Center (SOC), which is dedicated to overseeing the security measures of an organization, either in full or in part. By relying on our IT security experts, you can focus on your primary business objectives while we handle the cybersecurity of your information systems. Often referred to as a Managed Security Services Provider (MSSP) or Managed Detection and Response (MDR), we specialize in safeguarding your company and effectively responding to any security incidents that may arise. The SOC established and/or managed by ITrust enhances your cyber defense capabilities while ensuring that your services remain accessible at the most economical rate, all while adhering to necessary compliance regulations. Our user-friendly graphical interface is not only clear but also customizable, providing an in-depth view of activities and enabling comprehensive monitoring of the security across your servers, routers, applications, databases, and websites, ensuring you remain informed about your organization's cybersecurity status at all times.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Palo Alto Networks

Founded

2005

Country

United States

Website

www.paloaltonetworks.com/cortex/cortex-xsiam

Vendor Details

Company Name

ITrust

Country

France

Website

www.itrust.fr/en/security-control-centre-soc/

Product Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Product Features

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives

BIMA Reviews

BIMA

Peris.ai