Seer DocsContactContact (opens in a new tab)
GitHubGitHub (opens in a new tab)
  • Introduction
    • What should I get?
      • What's Active Defense?
      • Threat Intelligence: MISP, OpenCTI
      • Incident Response: TheHive, Cortex
      • Active Monitoring: Snort, Suricata
      • Deception Technologies: Honeyd, Dionaea
      • Countermeasures: Suricata, iptables
      • Honeypots: Honeyd, Glastopf
      • Network Segmentation: pfSense, VyOS
      • Sandboxing: Cuckoo Sandbox, Joe Sandbox
      • Threat Hunting: OSquery, GRR
      • Behavioral Analytics: Wazuh, OSSEC
      • DNS Filtering: Pi-hole, BIND
      • Endpoint Detection and Response (EDR): Osquery, Kolide Fleet
      • Security Information and Event Management (SIEM): ELK Stack (Elasticsearch, Logstash, Kibana), Graylog
      • Security Automation: TheHive, MISP
      • User and Entity Behavior Analytics (UEBA): Open Source Security Information Management (OSSIM)
      • Email Security: SpamAssassin, ClamAV
      • Web Application Firewalls (WAF): ModSecurity, NAXSI
      • Identity and Access Management (IAM): FreeIPA, Keycloak
      • Cloud Security: OpenSCAP, Lynis
      • Encryption: OpenSSL, GnuPG (GPG)
      • Identity and Access Management Services
      • Security Architecture Review
      • Penetration Testing
      • Security Training and Awareness Programs
      • Network Security Monitoring
      • Data Loss Prevention
      • Endpoint Protection
      • Application Security Testing
      • Incident Response Planning
    • Peneteration Testing
    • Documentation
  • About
Question? Give us feedback → (opens in a new tab)Edit this page
About

About

This is the about page! This page is shown on the navbar.

Documentation

Seer Documentation, made with 💚 & Nextra