Overview
SPiDER ExD is an integrated security information and event detection analysis (SIEM) solution. With the introduction of SPiDER ExD, which integrates advanced collection-analyzing-response-extension capabilities, security organizations can take a centralized form of security process from a single workflow to the next level of visibility across the enterprise and take responsiveness to ever-evolving security threats. SPiDER ExD is the most comprehensive SIEM solution that supports the free expansion and integration of security features. With platform and UI integration centered around container services, you can build an scalable detection response (XDIR) architecture. Collection of vast amounts of security data, high-accuracy analysis, automated response processes, and broad security connectivity and expansion enable integrated visibility across the entire attack surface and proactive response to changing IT environments. SPiDER ExD helps you build stronger and more effective security systems by maximizing security operational efficiency from a comprehensive perspective.
If you wish to subscribe, please contact us by supporters e-mail and we will help you issue a license. You can register and use it after issuing a license. After you receive the license key file, you can register the key value in the license entry box.
This product extends the functionality of <rocky linux 9.2> and without it, this product has very limited utility. Please note that <rocky linux 9.2> might require its own license for full functionality with this listing.
Highlights
- High availability - Leveraging cluster-based big data architecture and Replica function to ensure service reliability
- Enhancing convenience of data retrieval and accuracy of analysis - Securing a high level of data analysis accuracy based on one-step enhanced loading and retrieval capabilities
- Extensive Scalability - Easy functional extension through platform-based architecture
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please discuss it at the time of the contract
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
1.0.0 ExD 1.0.7.0-8
Additional details
Usage instructions
- Deploy AMI
- ssh user name is 'rocky'. Log in to the new instance via ssh login using the 'rocky'
- Configure Security group to allow access to 10011/tcp for Agent data
- Configure Security group to allow access to 443/tcp, 7443/tcp, 22443/tcp, 11443/tcp for for web page access
- Log into to new instance via SSH
Resources
Vendor resources
Support
Vendor support
cloud@igloo.co.kr If you wish to subscribe, please contact us by supporters e-mail and we will help you issue a license. You can register and use it after issuing a license. After you receive the license key file, you can register the key value in the license entry box.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products


