Average Ratings 2 Ratings
Average Ratings 0 Ratings
Description
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments.
SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date.
Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
Description
Shoreline is the only cloud reliability platform that allows DevOps engineers to build automations in a matter of minutes and fix problems forever. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud.
Debugging and repairing issues is easy with advanced tooling for your best SREs, Jupyter style notebooks for the broader team, and a platform that makes building automations 30X faster by allowing operators to manage their entire fleet as if it were a single box. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Docker
Microsoft Azure
ServiceNow
VMware vSphere
Akeyless Identity Security Platform
CentOS
Chocolatey
Chronosphere
GitHub
Integrations
Amazon Web Services (AWS)
Docker
Microsoft Azure
ServiceNow
VMware vSphere
Akeyless Identity Security Platform
CentOS
Chocolatey
Chronosphere
GitHub
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
SaltStack
Founded
2012
Country
Utah, United States
Website
saltproject.io
Vendor Details
Company Name
Shoreline.io
Founded
2019
Country
United States
Website
www.shoreline.io
Product Features
Build Automation
Automated Testing
Build Cache
Build Management Tools
Build Metrics
Change Only Compiling
Debugging Tools
Dependency Management
IDE Compatibility
Parallel Testing
Plugin Library
Source Code Management
Version Conflict Resolution
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Center Management
Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Automation
Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Patch Management
Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
Software Configuration Management (SCM)
Automated Cleanup
Branch Merging
Code Review
Concurrency Management
Defect Tracking
Flexible Branching
Rapid Hotfix
Rapid Rebuilds
Regulatory Compliance
Version Control / Management
Workflow / Process Automation
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Cloud Management
Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval
DevOps
Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
Issue Tracking
Assignment Management
Dashboard
Escalation Management
Issue Auditing
Issue Scheduling
Knowledge Base
Project Management
Recurring Issues
Scheduling
Task Management
Log Management
Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs
Network Monitoring
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
IP Address Monitoring
Internet Usage Monitoring
Real Time Analytics
Resource Management
SLA Monitoring
Server Monitoring
Uptime Monitoring
Web Traffic Reporting
Server Management
CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring