Ossec Alternatives (September 2025)

OSSEC is a multiplatform, open source and free Host Intrusion Detection System (HIDS). You can tailor OSSEC for your security needs through its extensive configuration options, adding custom alert rules and writing scripts.

4.8/5

16+ reviews

Reviewed on:

G2
Getapp
Softwareadvice
Facebook
Capterra
1.
Enhance Security with OSSIM | LevelBlue
https://cybersecurity.at
.com/products/ossim/

Elevate your security game with OSSIM. The open-source platform that optimizes threat detection, incident response, & compliance management.

2.
Snort - Network Intrusion Detection & Prevention System
https://www.snor
.org/

Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats.

3.
SIEM Solutions & Tools | Get Best Enterprise SIEM Software | FortiSIEM
https://www.fortine
.com/products/siem/fortisiem/

FortiSIEM - Fortinet's SIEM solution offers advanced threat protection to organizations. Explore more about Security Information and Event Management (SIEM) Software

4.
SIEM + Endpoint Visibility + XDR For SMB | Blumira
https://www.blumir
.com/

Blumira helps lean IT teams protect their organizations against ransomware and breaches with an open SIEM + XDR platform.

5.
ESET PROTECT Platform | ESET
https://www.ese
.com/me/business/protect-platform/

The world’s most formidable cybersecurity based on superior research that’s easy to use. A unique balance of prevention, detection and response.

6.
Directory Services Protector - Semperis
https://www.semperi
.com/active-directory-security/

Directory Services Protector (DSP) provides continuous Active Directory threat detection and response, including automated remediation.

7.
Wazuh - Open Source XDR. Open Source SIEM.
https://wazu
.com/

Wazuh is a free and open source security platform that unifies XDR and SIEM protection for endpoints and cloud workloads.

8.
Network Security Monitoring | LevelBlue
https://cybersecurity.at
.com/solutions/network-security-monitoring/

Stay vigilant with LevelBlue's Network Security Monitoring. Real-time insights and proactive defense against threats targeting your network.

9.
Streamlined and Converged Cyber Security - Logpoint
https://www.logpoin
.com/

Streamlined Cyber Security Operations, Converged on One Platform. Logpoint's award winning SIEM software is simple, flexible, and scalable.

10.
PCI Compliance Solution | Qualys, Inc.
https://www.qualy
.com/solutions/pci-compliance/

Discover our complete, efficient, integrated PCI compliance solution that delivers one holistic view of your IT assets and PCI compliance posture.

11.
Adlumin Cybersecurity | XDR, MDR, SIEM
https://adlumi
.com/

Elevate your security with Adlumin XDR and MDR. Get continuous threat detection, incident response, and proactive threat hunting, all with full transparency.

12.
OpenText ArcSight Enterprise Security Manager
https://www.opentex
.com/products/arcsight-enterprise-security-manager/

ArcSight Enterprise Security Manager (ESM) is a powerful SIEM tool that empowers your security operations team with real-time threat detection and native SOAR.

13.
Securonix - Unified Defense SIEM, TDIR, UEBA & SOAR Solutions
https://www.securoni
.com/

Explore Securonix for comprehensive cybersecurity across SIEM, TDIR, UEBA, and SOAR on a scalable cloud platform. Proven effectiveness with top customer ratings.

14.
CrowdSec | Curated Threat Intelligence Powered by the Crowd
https://crowdse
.net/

We turn crowd-powered intelligence into tactical intelligence with actionable blocklists to maximize your SOC efficiency and reduce your costs.

15.
UnderDefense MAXI - Security-as-a-Service Platform
https://underdefens
.com/platform/

One holistic solution to automate cybersecurity routines. Create incident response plan playbooks and stop breaches immediately.

16.
Nmap: the Network Mapper - Free Security Scanner
https://nma
.org/

Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.

18.
SIEM | Server Monitoring | Compliance Training
https://www.cornerbowlsoftwar
.com/

Maximize your security and uptime with Corner Bowl Software, offering cost-effective SIEM, server monitoring, auditing software and compliance training for IT.

19.
Cimcor | File Integrity Monitoring
https://www.cimco
.com/

Cimcor’s File Integrity Monitoring solution, CimTrak, helps enterprise IT and security teams secure critical assets and simplify compliance by enabling...

20.
Secure and Compliant Workloads Anywhere
https://www.runecas
.com/

Identify, manage, and remediate vulnerabilities and misconfigurations on-prem, in your cloud or containerized infrastructure in a unified view

21.
ManageEngine ADAudit Plus | A UBA-driven change auditor
https://www.manageengin
.com/products/active-directory-audit/

ADAudit Plus helps keep your Active Directory, file servers, Windows servers and workstations secure and compliant. Download a 30-day trial now.

22.
Enterprise Patch Management Software | ManageEngine Patch Manager Plus
https://www.manageengin
.com/patch-management/

Patch Manager Plus, an all-around patching solution, offers automated patch deployment for Windows, macOS, and Linux endpoints. Try ManageEngine's Enterprise patch management software for free!

23.
Cyber Security Experts & Solution Providers USA | Top Cybersecurity Specialists Companies New York, Boston, Massachusetts, USA, India, South Korea, Japan, United Kingdom, Dubai, Sri Lanka, Bangladesh, Turkey, Germany, South Africa & Hong Kong
https://www.seceo
.com/

Top Cyber Security Company USA - Seceon is a comprehensive top cybersecurity Specialists Companies provides Online managed IT security services in New York, Boston, Massachusetts, USA, India, South Korea, Japan, United Kingdom, Dubai, Sri Lanka, Bangladesh, Turkey, Germany and South Africa & Hong Kong.

24.
Top-Rated Endpoint Detection & Response | Advanced Threat Protection | WithSecure™
https://www.withsecur
.com/en/solutions/software-and-services/elements-endpoint-detection-and-response/

WithSecure™ Elements Endpoint Detection and Response solution provides enhanced detection capabilities and security against cyber attacks and data breaches.

25.
Cyber Risk Analytics Management Platform - QOMPLX
https://www.qompl
.com/os/

QOMPLX enables customers to analyze, model, manage, and transfer complex cyber risks. Learn how to identify attackers before they have a chance to do harm.

26.
Heimdal® - One Platform. Total Cyber Security.
https://heimdalsecurit
.com/

From endpoints and networks to emails, identities, and beyond, Heimdal has you covered with advanced detection and response capabilities.

27.
Intezer - Autonomous Security Operations
https://inteze
.com/

Streamline time-consuming alert triage & incident response tasks with Intezer’s platform automatically investigating every alert and escalating serious threats.

28.
Log management solution | IT compliance tool - ManageEngine EventLog Analyzer
https://www.manageengin
.com/products/eventlog/

EventLog Analyzer is an affordable log management & IT compliance software that collects, analyzes, correlates, and archives log data from different devices and application to ensure network security.

29.
ExtraHop: Cloud-Native Network Detection and Response
https://www.extraho
.com/

ExtraHop provides cloud-native cybersecurity solutions to help enterprises detect and respond to advanced threats—before they compromise your business.

30.
Vulnerability Management Tool - VMDR | Qualys
https://www.qualy
.com/apps/vulnerability-management-detection-response/

Discover Qualys VMDR, the powerful, cloud-based, vulnerability management software redefining cyber risk management. Try it today!

31.
Syspeace | Preventing brute force attacks on servers | HIPS
https://syspeac
.com/

Syspeace is the ultimate tool in preventing brute force attacks. Get secure with the leading software for blocking brute force hacking.

32.
SIEM, Event Log Monitoring & Server Monitoring
https://www.eventsentr
.com/

EventSentry offers affordable SIEM functionality, rock-solid server monitoring, event log monitoring with AD changes and cyber security tracking.

33.
Logsign: Unified SecOps Platform | SIEM, UEBA, Incident Response
https://www.logsig
.com/

Logsign's Unified SecOps Platform integrates Next-GEN SIEM, TI, UEBA, and Automated Incident Response to improve enterprise cyber resilience proactively.

34.
EDR Solution | Endpoint Detection and Response Solution with FortiEDR
https://www.fortine
.com/products/endpoint-security/fortiedr/

Unified endpoint and extended detection solutions offering advanced threat protection, rapid response, and comprehensive visibility. FortiEDR is the premier EDR solution tool to eliminate and prevent threats.

35.
Intruder | Vulnerability Management Made Easy
https://intrude
.io/

Secure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.

36.
InsightIDR | Cloud-Based, Next-Gen SIEM Solution | Rapid7
https://www.rapid
.com/products/insightidr/

Explore InsightIDR - Rapid7's next-gen security information and event management (SIEM) solution for a cloud-first era. Start your free trial today!

37.
Network detection and response (NDR) solutions - IBM Security
https://www.ib
.com/products/qradar-siem/ndr/

Catch hidden threats on your networks before it's too late with network visibility and advanced analytics from IBM QRadar NDR

38.
PT MultiScanner – advanced malware threat detection and prevention system
https://www.ptsecurit
.com/ww-en/products/multiscanner/

PT MultiScanner provides multiple levels of anti-malware protection to detect and block infections on corporate infrastructure, uncover hidden threats, and facilitate investigation of malware-related security incidents.

39.
IBM QRadar SIEM
https://www.ib
.com/products/qradar-siem/

Learn about intelligent security information and event management (SIEM) with IBM QRadar SIEM for actionable insight into your most critical threats.

40.
CNAPP for Hybrid Cloud Security | Uptycs
https://www.uptyc
.com/

Uptycs protects workloads wherever they run and gives you security visibility from dev to runtime. Reduce risk, vulns & misconfigurations from a single UI.

41.
Active Defense, XDR, MDR & Active Threat Hunting | LMNTRIX
https://lmntri
.com/

Detect threats in minutes, and not days with LMNTRIX Active Defense. LMNTRIX offers XDR, MDR, SOC as a Service, Continuous Monitoring, Threat Hunting & Response

42.
AI-Powered DAST, Malware Scanner & Pen-testing | Indusface WAS
https://www.indusfac
.com/web-application-scanning.php/

Discover Indusface WAS, our AI-powered DAST scanner ensuring ZERO false positives, scans OWASP top 10 & zero-day threats and integrates with DevSecOps CI/CD.

43.
Cyber Triage - Digital Forensics Specialized For Incident Response
https://www.cybertriag
.com/

Cyber Triage is automated Digital Forensics and Incident Response (DFIR) software that allows cybersecurity professionals like you to quickly answer intrusion questions related to malware, ransomware, and account takeover.

44.
LogRhythm SIEM | UEBA, SOAR, & NDR
https://logrhyth
.com/products/logrhythm-siem/

Learn how the LogRhythm SIEM platform effectively unifies log management, security analytics, case management, and incident response.

45.
Free Automated Malware Analysis Service - powered by Falcon Sandbox
https://www.hybrid-analysi
.com/

Submit malware for free analysis with Falcon Sandbox and Hybrid Analysis technology. Hybrid Analysis develops and licenses analysis tools to fight malware.

46.
Endpoint Detection & Response Tools | Qualys
https://www.qualy
.com/apps/endpoint-detection-response/

Get the Qualys EDR tool - our dynamic endpoint detection and response software powered by the Enterprise TruRisk Platform. Try it today!

47.
Corelight: Evidence-Based NDR and Threat Hunting Platform
https://coreligh
.com/

Disrupt future attacks with complete network visibility, next-level analytics, faster investigations, and expert threat hunting.

48.
EnCase Endpoint Security | OpenText
https://www.opentex
.com/products/encase-endpoint-security/

OpenText EnCase Endpoint Security empowers security analysts with 360-degree endpoint visibility to detect, triage and respond to threats.

49.
HCL AppScan: Advanced Application Security Testing
https://www.hcl-softwar
.com/appscan/

Enhance security with HCL AppScan's Application Security Testing suite. Find vulnerabilities, automate workflows and protect your software.

50.
Fastest protection for WordPress security vulnerabilities - Patchstack
https://patchstac
.com/

Detect vulnerabilities for free with the fastest vulnerability mitigation for WordPress. Protect sites with vPatching. Start for free!

51.
Top SaaS Security Platform | Adaptive Shield
https://www.adaptive-shiel
.com/

Gain control of your SaaS Security with Adaptive Shield, the best-of-breed SSPM to ensure the highest SaaS security hygiene for your organization.

52.
Cuckoo Sandbox - Automated Malware Analysis
https://cuckoosandbo
.org/

Cuckoo Sandbox is the leading open source automated malware analysis system.

53.
Network Threat Detection & Cyber Security | NetWitness
https://www.netwitnes
.com/

Professional network threat detection & cyber security monitoring services are offered by NetWitness. Accelerate threat detection and cyber attack response for your organization's SOC with unparalleled visibility, analytics and automation. Contact us today!

54.
Bitdefender Network Traffic Security Analytics
https://www.bitdefende
.com/business/gravityzone-platform/network-traffic-analytics.html/

Network Traffic Analytics module, a key component of XDR, detects breaches and provides insights into advanced attacks by analyzing network traffic.

55.
Endor Labs | Software Supply Chain Security Solutions
https://www.endorlab
.com/

Software supply chain security that doesn’t make you choose between developer productivity and fixing risks.

56.
Enterprise Security Simplified | BluSapphire
https://www.blusapphir
.com/

The best in business choose BluSapphire for their cybersecurity needs, with threat detection, analysis, response, and remediation, all on one platform. Achieve the highest cybersecurity ops maturity in a matter of days. BluSapphire is fully agentless and automated.

57.
OpenCV - Open Computer Vision Library
https://openc
.org/

OpenCV provides a real-time optimized Computer Vision library, tools, and hardware. It also supports model execution for Machine Learning (ML) and Artificial Intelligence (AI).

58.
FOSSA: Comprehensive Open Source Security and SBOM Management
https://foss
.com/

Stop open source vulnerabilities, automate compliance, and mitigate third-party risk in your applications.

59.
BitNinja Server Security Platform - Elevate Your Linux Server Security
https://bitninj
.io/

A server security suite with centralized dashboard containing an AI-powered Linux malware scanner, robust IP reputation, WAF, Spam Detection.

60.
Beyond GRC Tools | Integrated Security & Risk Management | Ostendio
https://www.ostendi
.com/

Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people.

62.
Smart Cloud Security and Compliance Platform - Cloudnosys
https://cloudnosy
.com/

Cloudnosys: Smart cloud security and compliance platform secures your cloud against vulnerabilities, get visibility & control of cloud security & compliance in AWS, Azure & GCP.

64.
Enhancing Modern App Security: Introducing F5 Distributed Cloud App Infrastructure Protection | F5 Blog
https://www.f
.com/company/blog/distributed-cloud-app-infrastructure-protection-intro/

Powered by technology from Threat Stack, F5 Distributed Cloud AIP delivers comprehensive telemetry and high-efficacy intrusion detection for cloud-native workloads. Customers can now better address a larger threat surface with increased visibility and support in securing both modern applications and the infrastructure they run on.

65.
Metasploit | Penetration Testing Software, Pen Testing Security | Metasploit
https://www.metasploi
.com/

Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the world's best penetration testing software now.

66.
Splunk SOAR | Splunk
https://www.splun
.com/en_us/products/splunk-security-orchestration-and-automation.html/

Splunk SOAR lets you automate repetitive tasks, investigate and respond to security incidents in seconds, and increase productivity to better protect your business.

67.
DNIF HYPERCLOUD - SIEM, UEBA and SOAR | DNIF
https://www.dni
.it/

DNIF HYPERCLOUD is a cloud native SIEM, UEBA and SOAR platform that can perform search-analytics at scale.

68.
Security and Compliance Automation Platform - Compyl
https://compy
.com/

Compyl is an end-to-end security and compliance platform. We enable automated continuous security and compliance for your business!

69.
Tripwire Solutions | Tripwire
https://www.tripwir
.com/products/tripwire-enterprise/

Tripwire Enterprise helps accurately identify security misconfigurations and indicators of compromise to reduce your attack surface.

70.
Metomic | Data Security Software for SaaS, GenAI and Cloud
https://metomi
.io/

Metomic's human-centric data security solution integrates instantly with your SaaS apps to help you detect, protect and secure sensitive data hiding in your SaaS apps. The go-to software for data security teams worldwide, Metomic enables professionals to remediate any policy violations and educate their team to build a human firewall.

71.
DevSecOps Tool for Security Intelligence - DeployHub
https://www.deployhu
.com/

DevSecOps tool to continuously monitors, reports, and remediates vulnerabilities with non-intrusive software supply-chain surveillance.

72.
HID® DigitalPersona® | HID Global
https://www.hidgloba
.com/products/digitalpersona/

HID DigitalPersona combines security and usability to employ one of the widest arrays of authentication methods and form factors in the industry.

73.
ANY.RUN - Interactive Online Malware Sandbox
https://an
.run/

Cloud-based malware analysis service. Take your information security to the next level. Analyze suspicious and malicious activities using our innovative tools.

74.
Exabeam Security Operations Platform | Exabeam
https://logrhyth
.com/products/logrhythm-network-detection-and-response-ndr/

Discover the power of cloud-native architecture on Google Cloud. Unlock rapid data ingestion, hyper-fast query performance, and advanced analytics and AI.

75.
Snare - Security Data Engine & Event Collection
https://www.snaresolution
.com/

Snare is the leading security data engine that powers your SIEM. Snare is trusted by over 4,000 customers worldwide.

76.
Qualys Web Application Firewall | Qualys
https://www.qualy
.com/apps/web-app-firewall/

Discover Qualys Web Application Firewall, our web app firewall cloud service for scalable, simple, and powerful protection of web applications. Try it today!

77.
Panther | A Cloud SIEM Platform for Modern Security Teams
https://panthe
.com/

Panther alleviates the pain of traditional SIEM with detection-as-code, a robust security data lake, & flexible scalability. Visit our website for a demo or pricing.

78.
uberAgent: DEX & endpoint security analytics for Windows, macOS, Citrix, VMware on Splunk
https://uberagen
.com/

Innovative UX monitoring & endpoint security analytics. PCs, Macs, SBC, VDI, or RDS: uberAgent covers it all, in a single light-weight agent.

79.
InfoScale Enterprise 8.0.2
https://www.verita
.com/support/en_US/downloads/detail.REL220185/

InfoScale 8.0.2   Veritas InfoScale is a software-defined infrastructure solution that is integrated directly with applications to provide high availability and disaster recovery for critical business services, including databases, customer applications and multitiered business services. It delivers a common availability platform that supports physical, virtual, and all major public cloud environments, providing the flexibility to optimize availability for any platform based on business requirements.   To learn more about InfoScale and what it can do for you, please visit our InfoScale product page: https://www.veritas.com/availability/infoscale   What’s new in InfoScale 8.0.2   With this release, InfoScale expands on Veritas’ decades-long position as the leader in this space. InfoScale 8.0.2 introduces significant security and usability improvements while simultaneously expanding our platform support to include the latest and most widely adopted hyper-converged and multi-cloud environments.    Expanded cloud support – Oracle Cloud, AWS VMC, Google Cloud GCVE, AWS MultAttach, Azure Shared Disk, Azure Managed Identity, better support for VVR stretch clusters Enhanced security – Secure Boot support (Linux), Windows Volume Encryption, SecureFS ransomware protection, support for the latest updates to OS, database and virtualization platforms Improved ease of use – simplified deployment using Ansible templates and native CPI installers, VIOM improvements for ransomware protection and VVR, Windows wizards for shared-storage configuration in cloud Core functionality enhancements – Support S3 target, OpenStack Manila and Cinder support, improved DMP performance (FPIN), NVMe fencing (AFA), FSS resync improvements   See Release Notes for details

80.
DefectDojo | CI/CD and DevSecOps Automation
https://www.defectdoj
.org/

DefectDojo is an open-source application vulnerability management correlation and security orchestration tool. Scale security by creating an AppSecPipeline with DefectDojo.

81.
Enterprise Cybersecurity Solutions | ThreatLocker
https://www.threatlocke
.com/

We are an endpoint protection platform that offers top enterprise security software and solutions. Keep your business safe with zero trust endpoint security!

82.
Firewall Log, Policy, Rule Analysis, Change Management, Security Audit Software - Firewall Analyzer
https://www.manageengin
.com/products/firewall/

ManageEngine Firewall Analyzer is an agent-less Firewall, VPN, Proxy Server log analysis and configuration management software to detect intrusion, monitor bandwidth and Internet usage

83.
Attack Surface Management & Dark Web Monitoring | ImmuniWeb® Discovery
https://www.immuniwe
.com/products/discovery/

Attack Surface Management & Dark Web Monitoring made simple. Enter your company name to see what attackers know about you.

84.
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
https://www.veracryp
.fr/

VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.

85.
The leading GRC & Cybersecurity SaaS Platform | C1Risk | AI Powered GRC
https://c1ris
.com/

An all-in-one solution for Governance, Risk & Compliance and Cybersecurity in a single integrated AI powered platform built for any size enterprise. Learn more with a free demo or free trial.

86.
Vulnerability Management Tool & Software - ManageEngine Vulnerability Manager Plus
https://www.manageengin
.com/vulnerability-management/

Vulnerability management tool lets you manage vulnerabilities from a centralized console & offers built-in patching. Try our enterprise vulnerability management software now!

87.
Home | Foresite Cybersecurity
https://foresit
.com/

Foresite Cybersecurity is a leading provider of managed security and compliance services.

88.
Microsoft Defender for Endpoint | Microsoft Security
https://www.microsof
.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint/

Microsoft Defender for Endpoint helps stop attacks, scales endpoint security resources, and evolves defenses. Learn more about cloud-powered endpoint protection.

89.
Muninn - AI Powered Network Detection & Response (NDR)
https://www.munin
.ai/

Muninn offers AI-powered Network Detection & Response to safeguard your enterprise. Experience cutting-edge cybersecurity that evolves with your network.

90.
Full stack observability solution — built on The Elastic Search AI Platform | Elastic
https://www.elasti
.co/observability/

Learn more about Elastic Observability — the most widely deployed GenAI optimized observability solution. You get full stack visibility and actionable insights to go from real-time to proactive....

91.
Astra Security - Continuous Pentest Platform
https://www.getastr
.com/

Astra Security is a one of a kind continuous Pentest Platform that makes chaotic pentests a breeze & continuous with its hacker-style vulnerability scanner.

92.
Microsoft Windows IT Security Auditing Software | Change Auditor
https://www.ques
.com/change-auditor/

Change Auditor: Real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key user and administrator changes for Microsoft Windows environments.

93.
INLYSE / Malware Detection Using Artificial Intelligence
https://www.inlys
.com/

Secure your system with world's first visual AI-based malware detection. Our Cybersecurity solution uses Artificial Intelligence to protect you from viruses, malware and other security threats.

94.
Network Monitoring Software & Solutions - ManageEngine OpManager
https://www.manageengin
.com/network-monitoring/

ManageEngine OpManager is an easy to use network monitoring software & an affordable network monitoring solution to monitor network devices such as routers, switches, & more. Try now!

95.
Lookout | The Data-Centric Defense-in-Depth Solution
https://www.lookou
.com/

Lookout is the cybersecurity platform built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final data grab.

96.
Multi platform Installer - InstallAnywhere Download | Revenera
https://www.revener
.com/install/products/installanywhere/

InstallAnywhere delivers professional multi platform installations. Reliable installations for Windows, Linux, Apple, Solaris, AIX, HP-UX, and IBM.

97.
Falco
https://falc
.org/

Why Falco? Strengthen container security The flexible rules engine allows you to describe …

98.
Klocwork for C, C++, C#, Java, JavaScript, Python, Kotlin | Perforce
https://help.klocwor
.com/

Klocwork is a static code analysis and SAST tool. This tool for C++, C#, Python, Kotlin JavaScript, and Java static code analyzer identifies software security, quality, and reliability issues helping to enforce compliance with standards.

99.
Audit, Report, and Manage the Windows File System, Active Directory and Microsoft Cloud
https://www.visualclic
.com/

Auditing, Alerting, Management and Reporting tools for Active Directory, Windows File System, Exchange, O365, Azure Active Directory and SharePoint.