SIEM Tools for Mac

View 18 business solutions
SIEM Mac Clear Filters

Browse free open source SIEM tools and projects for Mac below. Use the toggles on the left to filter open source SIEM tools by OS, license, language, programming language, and project status.

  • The Secure And Reliable File Transfer Solution That You Control. Icon
    The Secure And Reliable File Transfer Solution That You Control.

    Helping IT professionals responsibly secure the world's data

    Cerberus offers a variety of secure file transfer solutions to fit businesses of any size or business sector, including finance, technology, education, publishing, law offices, local, state, and federal government agencies, hospitals and many more.
  • Simplify Time-consuming and Overly Complicated Financial Processes. Icon
    Simplify Time-consuming and Overly Complicated Financial Processes.

    Cloud Purchase Requisition, Purchase Order & Invoice Approval Software

    Zahara's cloud based platform automates budget management, suppliers, purchase requisitions, multi-level purchase approvals, deliveries and invoice reconciliation and approvals. Zahara integrates with most leading accounting software such as QuickBooks Online and Xero to give expanding SME's real time visibility and centralized control of their purchasing. Zahara can be used to control spend in an organization. We take the initial request to buy something and automate the approval process and sending of the PO to the Vendor. Deliveries can be receipted, vendors invoices matched and processed and then exported to finance. Zahara adds control yet speeds up processing.
  • 1
    syslog-ng

    syslog-ng

    Log management solution that improves the performance of SIEM

    syslog-ng is the log management solution that improves the performance of your SIEM solution by reducing the amount and improving the quality of data feeding your SIEM. With syslog-ng Store Box, you can find the answer. Search billions of logs in seconds using full text queries with Boolean operators to pinpoint critical logs. syslog-ng Store Box provides secure, tamper-proof storage and custom reporting to demonstrate compliance. syslog-ng can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others. syslog-ng flexibly routes log data from X sources to Y destinations. Instead of deploying multiple agents on hosts, organizations can unify their log data collection and management. syslog-ng Store Box provides automated archiving, tamper-proof encrypted storage, granular access controls to protect log data. The largest appliance can store up to 10TB of raw logs.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 2
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich analytics dashboards and data visualization
    Leader badge">
    Downloads: 42 This Week
    Last Update:
    See Project
  • 3
    TheHive

    TheHive

    Scalable, open source and free security incident response platform

    TheHive is a scalable 3-in-1 open source and free Security Incident Response Platform designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents that need to be investigated and acted upon swiftly. It is the perfect companion to MISP. You can synchronize it with one or multiple MISP instances to start investigations out of MISP events. You can also export an investigation's results as a MISP event to help your peers detect and react to attacks you've dealt with. Additionally, when TheHive is used in conjunction with Cortex, security analysts and researchers can easily analyze tens if not hundreds of observables. Multiple analysts from one organization can work together on the same case simultaneously. For example, an analyst may deal with malware analysis while another may work on tracking C2 beaconing activity on proxy logs as soon as IOCs have been added by their coworker.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Zeek

    Zeek

    Zeek is a powerful network analysis framework

    Zeek has a long history in the open source and digital security worlds. Vern Paxson began developing the project in the 1990s under the name “Bro” as a means to understand what was happening on his university and national laboratory networks. Vern and the project’s leadership team renamed Bro to Zeek in late 2018 to celebrate its expansion and continued development. Zeek is not an active security device, like a firewall or intrusion prevention system. Rather, Zeek sits on a “sensor,” a hardware, software, virtual, or cloud platform that quietly and unobtrusively observes network traffic. Zeek interprets what it sees and creates compact, high-fidelity transaction logs, file content, and fully customized output, suitable for manual review on disk or in a more analyst-friendly tool like a security and information event management (SIEM) system.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Lease Accounting Software Icon
    Lease Accounting Software

    Unlock financial opportunity in your leases.

    Visual Lease is lease accounting and lease administration software specifically designed to manage your company’s real estate and equipment leases. Loved by users worldwide, Visual Lease embeds decades of deep lease management and financial accounting expertise. It is intuitive, easy to use and integrates with all major ERP systems.
  • 5
    Drive Badger

    Drive Badger

    Open source platform for covert data exfiltration operations.

    Drive Badger is a software tool for data exfiltration – which means, for copying data from the computer to external USB drive. Unlike many other tools from IT security area, it's not a Proof-of-Concept kind of tool, bringing some groundbreaking techniques. Everything, what Drive Badger does, can be as well run manually, step by step. Instead, what Drive Badger really does, is doing it all better, by putting the maximum focus on:
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next