Introducing G2.ai, the future of software buying.Try now

Best Incident Response Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Incident response software automates the process of and/or provides users with the tools necessary to find and resolve security breaches. Companies utilize the tools to monitor networks, infrastructure, and endpoints for intrusions and abnormal activity. They then use the programs to inspect and resolve intrusions and malware in the system. These products provide capabilities to resolve issues that arise after threats have bypassed firewalls and other security mechanisms. They alert administrators of unapproved access of applications and networks. They also have the ability to detect a variety of malware variants. Many tools automate the process of remedying these issues, but others guide users through known resolution processes.

Many incident response solutions function similarly to security information and event management (SIEM) software, but SIEM products provide a larger scope of security and IT management features.

To qualify for inclusion in the Incident Response category, a product must:

Monitor for anomalies within an IT system
Alert users of abnormal activity and detected malware
Automate or guide users through remediation process
Store incident data for analytics and reporting

Best Incident Response Software At A Glance

Highest Performer:
Best Free Software:
Show LessShow More
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
102 Listings in Incident Response Available
(524)4.6 out of 5
1st Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:$0.75
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PhishER Plus is a FedRAMP Moderate certified, lightweight SOAR product that automatically analyzes and prioritizes reported email messages to identify and quarantine malicious emails across your organ

    Users
    • IT Manager
    • IT Director
    Industries
    • Financial Services
    • Primary/Secondary Education
    Market Segment
    • 75% Mid-Market
    • 13% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KnowBe4 PhishER/PhishER Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Phishing Prevention
    92
    Email Security
    72
    Ease of Use
    62
    Automation
    45
    Security
    40
    Cons
    Ineffective Email Security
    20
    False Positives
    17
    Difficult Setup
    15
    Poor Accuracy
    11
    Setup Difficulty
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
    8.5
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    7.9
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Clearwater, FL
    Twitter
    @KnowBe4
    16,179 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,071 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PhishER Plus is a FedRAMP Moderate certified, lightweight SOAR product that automatically analyzes and prioritizes reported email messages to identify and quarantine malicious emails across your organ

Users
  • IT Manager
  • IT Director
Industries
  • Financial Services
  • Primary/Secondary Education
Market Segment
  • 75% Mid-Market
  • 13% Enterprise
KnowBe4 PhishER/PhishER Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Phishing Prevention
92
Email Security
72
Ease of Use
62
Automation
45
Security
40
Cons
Ineffective Email Security
20
False Positives
17
Difficult Setup
15
Poor Accuracy
11
Setup Difficulty
11
KnowBe4 PhishER/PhishER Plus features and usability ratings that predict user satisfaction
8.5
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
7.9
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Clearwater, FL
Twitter
@KnowBe4
16,179 Twitter followers
LinkedIn® Page
www.linkedin.com
2,071 employees on LinkedIn®
(630)4.4 out of 5
Optimized for quick response
14th Easiest To Use in Incident Response software
View top Consulting Services for Datadog
Save to My Lists
Entry Level Price:$0 Per host, per month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infra

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Datadog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    111
    Monitoring
    78
    Real-time Monitoring
    68
    Integrations
    62
    Easy Integrations
    61
    Cons
    Expensive
    61
    Pricing Issues
    50
    Learning Curve
    47
    Difficult Learning
    42
    Cost
    40
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datadog features and usability ratings that predict user satisfaction
    7.9
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    8.4
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Datadog
    Company Website
    Year Founded
    2010
    HQ Location
    New York
    Twitter
    @datadoghq
    50,036 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,820 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. The SaaS platform integrates and automates infra

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 35% Enterprise
Datadog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
111
Monitoring
78
Real-time Monitoring
68
Integrations
62
Easy Integrations
61
Cons
Expensive
61
Pricing Issues
50
Learning Curve
47
Difficult Learning
42
Cost
40
Datadog features and usability ratings that predict user satisfaction
7.9
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
8.4
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Datadog
Company Website
Year Founded
2010
HQ Location
New York
Twitter
@datadoghq
50,036 Twitter followers
LinkedIn® Page
www.linkedin.com
8,820 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(1,333)4.5 out of 5
Optimized for quick response
21st Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:Starts at $69 per mon...
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dynatrace is advancing observability for today’s digital businesses, helping to transform the complexity of modern digital ecosystems into powerful business assets. By leveraging AI-powered insights,

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 69% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dynatrace Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    96
    Debugging
    63
    Insights
    51
    Features
    45
    Debugging Efficiency
    41
    Cons
    Learning Curve
    48
    Missing Features
    45
    UX Improvement
    33
    Poor UI
    32
    Complexity
    29
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dynatrace features and usability ratings that predict user satisfaction
    7.8
    Threat Intelligence
    Average: 8.7
    8.7
    Quality of Support
    Average: 8.8
    8.2
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dynatrace
    Company Website
    Year Founded
    2005
    HQ Location
    Waltham, MA
    Twitter
    @Dynatrace
    18,721 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,375 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dynatrace is advancing observability for today’s digital businesses, helping to transform the complexity of modern digital ecosystems into powerful business assets. By leveraging AI-powered insights,

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 69% Enterprise
  • 23% Mid-Market
Dynatrace Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
96
Debugging
63
Insights
51
Features
45
Debugging Efficiency
41
Cons
Learning Curve
48
Missing Features
45
UX Improvement
33
Poor UI
32
Complexity
29
Dynatrace features and usability ratings that predict user satisfaction
7.8
Threat Intelligence
Average: 8.7
8.7
Quality of Support
Average: 8.8
8.2
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Seller
Dynatrace
Company Website
Year Founded
2005
HQ Location
Waltham, MA
Twitter
@Dynatrace
18,721 Twitter followers
LinkedIn® Page
www.linkedin.com
5,375 employees on LinkedIn®
(254)4.8 out of 5
2nd Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Build, run, and monitor your most important workflows with Tines. Tines’ AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, o

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tines Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Automation
    47
    Customer Support
    33
    Features
    27
    Time-saving
    23
    Cons
    Missing Features
    12
    Lack of Features
    11
    Learning Curve
    11
    Poor Interface Design
    9
    Complexity
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tines features and usability ratings that predict user satisfaction
    8.2
    Threat Intelligence
    Average: 8.7
    9.7
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tines
    Company Website
    Year Founded
    2018
    HQ Location
    Dublin, IE
    LinkedIn® Page
    www.linkedin.com
    403 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Build, run, and monitor your most important workflows with Tines. Tines’ AI-enabled, secure workflow platform empowers your whole team regardless of their coding abilities, environment complexities, o

Users
  • Security Engineer
  • Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 38% Mid-Market
Tines Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Automation
47
Customer Support
33
Features
27
Time-saving
23
Cons
Missing Features
12
Lack of Features
11
Learning Curve
11
Poor Interface Design
9
Complexity
8
Tines features and usability ratings that predict user satisfaction
8.2
Threat Intelligence
Average: 8.7
9.7
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Tines
Company Website
Year Founded
2018
HQ Location
Dublin, IE
LinkedIn® Page
www.linkedin.com
403 employees on LinkedIn®
(101)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Torq Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    63
    Ease of Use
    63
    Easy Integrations
    39
    Security
    38
    Customer Support
    36
    Cons
    Learning Curve
    23
    Difficult Learning
    22
    Expensive
    10
    Poor Customer Support
    9
    Improvement Needed
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Torq features and usability ratings that predict user satisfaction
    8.7
    Threat Intelligence
    Average: 8.7
    9.5
    Quality of Support
    Average: 8.8
    7.6
    Database Management
    Average: 8.4
    7.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    torq
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @torq_io
    1,869 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    286 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Torq is transforming cybersecurity with its AI-first enterprise-grade hyperautomation platform. By connecting the entire security infrastructure stack, Torq empowers organizations to instantly and pre

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 32% Enterprise
Torq Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
63
Ease of Use
63
Easy Integrations
39
Security
38
Customer Support
36
Cons
Learning Curve
23
Difficult Learning
22
Expensive
10
Poor Customer Support
9
Improvement Needed
8
Torq features and usability ratings that predict user satisfaction
8.7
Threat Intelligence
Average: 8.7
9.5
Quality of Support
Average: 8.8
7.6
Database Management
Average: 8.4
7.7
Incident Logs
Average: 8.8
Seller Details
Seller
torq
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@torq_io
1,869 Twitter followers
LinkedIn® Page
www.linkedin.com
286 employees on LinkedIn®
(216)4.7 out of 5
Optimized for quick response
7th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cynet - All-in-One Cybersecurity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Security
    39
    Features
    38
    Threat Detection
    38
    Cybersecurity
    28
    Cons
    UX Improvement
    14
    Missing Features
    13
    Slow Performance
    12
    Limited Features
    11
    Alert Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    8.9
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Security
39
Features
38
Threat Detection
38
Cybersecurity
28
Cons
UX Improvement
14
Missing Features
13
Slow Performance
12
Limited Features
11
Alert Issues
10
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
8.9
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integration Capabilities
    8
    Integration Support
    7
    Ease of Use
    5
    Implementation Ease
    5
    Incident Management
    5
    Cons
    Difficult Setup
    3
    Integration Issues
    3
    Expensive
    2
    Learning Curve
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    8.6
    Threat Intelligence
    Average: 8.7
    9.1
    Quality of Support
    Average: 8.8
    8.6
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    51,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30,776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 21% Small-Business
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integration Capabilities
8
Integration Support
7
Ease of Use
5
Implementation Ease
5
Incident Management
5
Cons
Difficult Setup
3
Integration Issues
3
Expensive
2
Learning Curve
2
Licensing Issues
2
ServiceNow Security Operations features and usability ratings that predict user satisfaction
8.6
Threat Intelligence
Average: 8.7
9.1
Quality of Support
Average: 8.8
8.6
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
51,662 Twitter followers
LinkedIn® Page
www.linkedin.com
30,776 employees on LinkedIn®
(392)4.4 out of 5
Optimized for quick response
15th Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:Starting at $18.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Instana’s Enterprise Observability Platform, powered by automated Application Performance Monitoring, discovers and maps all services, infrastructure, and their inter-dependencies automatically. Insta

    Users
    • Software Engineer
    • System Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 43% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Instana Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    80
    Monitoring
    65
    Real-time Monitoring
    63
    Monitoring Capabilities
    54
    Monitoring Services
    37
    Cons
    User Interface Issues
    24
    Expensive
    22
    Missing Features
    22
    Difficult Learning
    21
    Learning Curve
    19
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Instana features and usability ratings that predict user satisfaction
    7.5
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Company Website
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Instana’s Enterprise Observability Platform, powered by automated Application Performance Monitoring, discovers and maps all services, infrastructure, and their inter-dependencies automatically. Insta

Users
  • Software Engineer
  • System Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 43% Mid-Market
  • 40% Enterprise
IBM Instana Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
80
Monitoring
65
Real-time Monitoring
63
Monitoring Capabilities
54
Monitoring Services
37
Cons
User Interface Issues
24
Expensive
22
Missing Features
22
Difficult Learning
21
Learning Curve
19
IBM Instana features and usability ratings that predict user satisfaction
7.5
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
IBM
Company Website
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
(474)4.3 out of 5
18th Easiest To Use in Incident Response software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.2
    Quality of Support
    Average: 8.8
    8.2
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.2
Quality of Support
Average: 8.8
8.2
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(128)4.3 out of 5
Optimized for quick response
6th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYREBRO Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Customer Support
    32
    Response Time
    27
    Alerts
    21
    Alerting System
    20
    Cons
    Communication Issues
    15
    Poor Customer Support
    15
    Inefficient Alert System
    14
    Integration Issues
    14
    Ineffective Alerts
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYREBRO features and usability ratings that predict user satisfaction
    8.6
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYREBRO
    Company Website
    Year Founded
    2013
    HQ Location
    Tel Aviv, IL
    Twitter
    @CYREBRO_IO
    322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYREBRO is an AI-native Managed Detection and Response solution, providing the core foundation and capabilities of a state-level Security Operations Center delivered through its cloud-based, interacti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 24% Small-Business
CYREBRO Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Customer Support
32
Response Time
27
Alerts
21
Alerting System
20
Cons
Communication Issues
15
Poor Customer Support
15
Inefficient Alert System
14
Integration Issues
14
Ineffective Alerts
13
CYREBRO features and usability ratings that predict user satisfaction
8.6
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Seller
CYREBRO
Company Website
Year Founded
2013
HQ Location
Tel Aviv, IL
Twitter
@CYREBRO_IO
322 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,284 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
(167)4.3 out of 5
Optimized for quick response
20th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resolver Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Customization
    39
    Customer Support
    38
    Customizability
    37
    Features
    36
    Cons
    Complexity
    31
    Improvement Needed
    21
    Limited Features
    19
    Difficult Learning
    17
    Difficulty
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resolver features and usability ratings that predict user satisfaction
    5.9
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Resolver
    Company Website
    HQ Location
    Toronto, Canada
    Twitter
    @Resolver
    5,023 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    436 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 49% Enterprise
  • 38% Mid-Market
Resolver Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Customization
39
Customer Support
38
Customizability
37
Features
36
Cons
Complexity
31
Improvement Needed
21
Limited Features
19
Difficult Learning
17
Difficulty
17
Resolver features and usability ratings that predict user satisfaction
5.9
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Resolver
Company Website
HQ Location
Toronto, Canada
Twitter
@Resolver
5,023 Twitter followers
LinkedIn® Page
www.linkedin.com
436 employees on LinkedIn®
(69)4.4 out of 5
11th Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Mid-Market
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Easy Integrations
    1
    Cons
    Cloud Dependency
    1
    Cost
    1
    Expensive
    1
    High Resource Usage
    1
    Inadequate Monitoring
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    8.8
    Database Management
    Average: 8.4
    9.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Mid-Market
  • 30% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Easy Integrations
1
Cons
Cloud Dependency
1
Cost
1
Expensive
1
High Resource Usage
1
Inadequate Monitoring
1
InsightIDR features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
8.8
Database Management
Average: 8.4
9.1
Incident Logs
Average: 8.8
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
(97)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Incident Response software
Save to My Lists
$500 Off
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SpinOne is an all-in-one SaaS security platform designed to protect critical SaaS data across various applications, including Google Workplace, Microsoft 365, Salesforce, and Slack. SpinOne comprehens

    Users
    • CEO
    Industries
    • Marketing and Advertising
    • Non-Profit Organization Management
    Market Segment
    • 49% Mid-Market
    • 46% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • SpinOne is a product from spin.ai that is used for data management, backup, and recovery, with features for risk assessments and user monitoring.
    • Reviewers appreciate the user-friendly interface, easy integration with Google Drive, the reliability of the backup and recovery features, and the exceptional customer support that provides swift and clear solutions.
    • Reviewers mentioned issues with the software licensing interface when adding more licenses, a lack of dashboards for reporting, a slight learning curve for advanced features, and a desire for unlimited storage instead of preallocated pooled storage.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SpinOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    37
    Customer Support
    32
    Backup Features
    22
    User Interface
    21
    Features
    20
    Cons
    Backup Issues
    8
    Expensive
    7
    Lack of Backup
    7
    Limited Storage
    5
    Access Limitations
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SpinOne features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    9.6
    Quality of Support
    Average: 8.8
    9.2
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SpinAI
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, California
    Twitter
    @spintechinc
    769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    89 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SpinOne is an all-in-one SaaS security platform designed to protect critical SaaS data across various applications, including Google Workplace, Microsoft 365, Salesforce, and Slack. SpinOne comprehens

Users
  • CEO
Industries
  • Marketing and Advertising
  • Non-Profit Organization Management
Market Segment
  • 49% Mid-Market
  • 46% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • SpinOne is a product from spin.ai that is used for data management, backup, and recovery, with features for risk assessments and user monitoring.
  • Reviewers appreciate the user-friendly interface, easy integration with Google Drive, the reliability of the backup and recovery features, and the exceptional customer support that provides swift and clear solutions.
  • Reviewers mentioned issues with the software licensing interface when adding more licenses, a lack of dashboards for reporting, a slight learning curve for advanced features, and a desire for unlimited storage instead of preallocated pooled storage.
SpinOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
37
Customer Support
32
Backup Features
22
User Interface
21
Features
20
Cons
Backup Issues
8
Expensive
7
Lack of Backup
7
Limited Storage
5
Access Limitations
4
SpinOne features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
9.6
Quality of Support
Average: 8.8
9.2
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Seller
SpinAI
Company Website
Year Founded
2017
HQ Location
Palo Alto, California
Twitter
@spintechinc
769 Twitter followers
LinkedIn® Page
www.linkedin.com
89 employees on LinkedIn®
(14)4.5 out of 5
3rd Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda Incident Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    5
    Cybersecurity
    4
    Email Security
    3
    Incident Management
    3
    Automation
    2
    Cons
    Expensive
    1
    Inefficient Alerts
    1
    Insufficient Information
    1
    Lack of Features
    1
    Limited Accessibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda Incident Response features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    9.3
    Quality of Support
    Average: 8.8
    8.5
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

No email defense technology can protect against increasingly advanced email threats 100 percent of the time. Some advanced social engineering attacks like business email compromise will reach users’ m

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 29% Small-Business
Barracuda Incident Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
5
Cybersecurity
4
Email Security
3
Incident Management
3
Automation
2
Cons
Expensive
1
Inefficient Alerts
1
Insufficient Information
1
Lack of Features
1
Limited Accessibility
1
Barracuda Incident Response features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
9.3
Quality of Support
Average: 8.8
8.5
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
(342)4.3 out of 5
Optimized for quick response
23rd Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

    Users
    • Software Engineer
    • Senior Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Mid-Market
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sumo Logic Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Log Management
    23
    Monitoring
    23
    Real-time Monitoring
    21
    Easy Integrations
    19
    Cons
    Difficult Learning
    13
    Learning Curve
    10
    Learning Difficulty
    10
    UX Improvement
    9
    Expensive
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sumo Logic features and usability ratings that predict user satisfaction
    7.8
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    Redwood City, CA
    Twitter
    @SumoLogic
    6,569 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    935 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec

Users
  • Software Engineer
  • Senior Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Mid-Market
  • 40% Enterprise
Sumo Logic Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Log Management
23
Monitoring
23
Real-time Monitoring
21
Easy Integrations
19
Cons
Difficult Learning
13
Learning Curve
10
Learning Difficulty
10
UX Improvement
9
Expensive
8
Sumo Logic features and usability ratings that predict user satisfaction
7.8
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Company Website
Year Founded
2010
HQ Location
Redwood City, CA
Twitter
@SumoLogic
6,569 Twitter followers
LinkedIn® Page
www.linkedin.com
935 employees on LinkedIn®
(102)4.5 out of 5
16th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneTrust Tech Risk & Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Compliance Management
    5
    Security
    4
    Automation
    3
    Features
    3
    Cons
    Difficult Customization
    3
    Difficult Setup
    3
    UX Improvement
    3
    Complex Implementation
    2
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    9.2
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneTrust
    Company Website
    Year Founded
    2016
    HQ Location
    Atlanta, Georgia
    Twitter
    @OneTrust
    6,539 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,567 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 42% Small-Business
OneTrust Tech Risk & Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Compliance Management
5
Security
4
Automation
3
Features
3
Cons
Difficult Customization
3
Difficult Setup
3
UX Improvement
3
Complex Implementation
2
Complex Setup
2
OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
9.2
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
OneTrust
Company Website
Year Founded
2016
HQ Location
Atlanta, Georgia
Twitter
@OneTrust
6,539 Twitter followers
LinkedIn® Page
www.linkedin.com
2,567 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 65% Mid-Market
    • 23% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UnderDefense MAXI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    9
    Cybersecurity
    5
    Visibility
    5
    24/7 Availability
    4
    Alerting System
    4
    Cons
    Complex Setup
    2
    Learning Curve
    2
    Dashboard Issues
    1
    Implementation Challenges
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UnderDefense MAXI features and usability ratings that predict user satisfaction
    9.7
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    9.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, NY
    Twitter
    @underdefense
    158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 65% Mid-Market
  • 23% Small-Business
UnderDefense MAXI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
9
Cybersecurity
5
Visibility
5
24/7 Availability
4
Alerting System
4
Cons
Complex Setup
2
Learning Curve
2
Dashboard Issues
1
Implementation Challenges
1
Lack of Automation
1
UnderDefense MAXI features and usability ratings that predict user satisfaction
9.7
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
9.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, NY
Twitter
@underdefense
158 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
(117)4.6 out of 5
Optimized for quick response
13th Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    17
    Setup Ease
    15
    Deployment Ease
    13
    Easy Setup
    12
    Cons
    Limited Customization
    7
    Expensive
    4
    Lack of Customization
    4
    Limited Reporting
    4
    Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    9.5
    Quality of Support
    Average: 8.8
    7.9
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
17
Setup Ease
15
Deployment Ease
13
Easy Setup
12
Cons
Limited Customization
7
Expensive
4
Lack of Customization
4
Limited Reporting
4
Alert System
3
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
9.5
Quality of Support
Average: 8.8
7.9
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
(17)4.6 out of 5
19th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Threat Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    2
    Automated Response
    1
    Phishing Prevention
    1
    Security
    1
    Threat Detection
    1
    Cons
    Email Management
    1
    False Positives
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Enterprise
Proofpoint Threat Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
2
Automated Response
1
Phishing Prevention
1
Security
1
Threat Detection
1
Cons
Email Management
1
False Positives
1
Learning Curve
1
Proofpoint Threat Response features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(50)4.6 out of 5
17th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk On-Call features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 34% Enterprise
Splunk On-Call features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(89)4.3 out of 5
22nd Easiest To Use in Incident Response software
Save to My Lists
Entry Level Price:Starting at €1.67
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Learning
    1
    Ease of Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Information Deficiency
    1
    Lack of Features
    1
    Limited Accessibility
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.4
    Threat Intelligence
    Average: 8.7
    9.1
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Learning
1
Ease of Management
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Expensive
1
Information Deficiency
1
Lack of Features
1
Limited Accessibility
1
Limited Features
1
Logpoint features and usability ratings that predict user satisfaction
8.4
Threat Intelligence
Average: 8.7
9.1
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.7
Incident Logs
Average: 8.8
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
996 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
(151)4.2 out of 5
26th Easiest To Use in Incident Response software
View top Consulting Services for LogRhythm SIEM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning LogRhythm SIEM platform delivers comprehensive security

    Users
    • Information Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LogRhythm SIEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Confusing Documentation
    1
    Insufficient Information
    1
    Limited Information
    1
    Log Management
    1
    Software Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogRhythm SIEM features and usability ratings that predict user satisfaction
    8.7
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.8
    8.7
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LogRhythm empowers more than 4,000 customers across the globe to measurably mature their security operations program. LogRhythm's award-winning LogRhythm SIEM platform delivers comprehensive security

Users
  • Information Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
LogRhythm SIEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Confusing Documentation
1
Insufficient Information
1
Limited Information
1
Log Management
1
Software Performance
1
LogRhythm SIEM features and usability ratings that predict user satisfaction
8.7
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.8
8.7
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity® Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    3
    Scanning Efficiency
    3
    Threat Detection
    3
    Affordable
    2
    Automated Scanning
    2
    Cons
    Integration Issues
    1
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity® Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
3
Scanning Efficiency
3
Threat Detection
3
Affordable
2
Automated Scanning
2
Cons
Integration Issues
1
Poor Integration
1
Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Automation
    2
    Ease of Use
    2
    Implementation Ease
    2
    Security
    2
    Cons
    Complexity
    1
    Expensive
    1
    Learning Curve
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Automation
2
Ease of Use
2
Implementation Ease
2
Security
2
Cons
Complexity
1
Expensive
1
Learning Curve
1
Poor Customer Support
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(14)4.4 out of 5
29th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Mid-Market
    • 7% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace/Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    Cybersecurity
    3
    Implementation Ease
    3
    Artificial Intelligence
    2
    Monitoring
    2
    Cons
    Learning Curve
    4
    Expensive
    2
    Poor Customer Support
    2
    Training Deficiency
    2
    Complex Implementation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace/Network features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    7.5
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,684 employees on LinkedIn®
    Ownership
    LON: DARK
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

Users
No information available
Industries
No information available
Market Segment
  • 86% Mid-Market
  • 7% Enterprise
Darktrace/Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
Cybersecurity
3
Implementation Ease
3
Artificial Intelligence
2
Monitoring
2
Cons
Learning Curve
4
Expensive
2
Poor Customer Support
2
Training Deficiency
2
Complex Implementation
1
Darktrace/Network features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
7.5
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Darktrace
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,684 employees on LinkedIn®
Ownership
LON: DARK
(192)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    3
    Features
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complex Interface
    2
    Improvements Needed
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    7.8
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Company Website
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
3
Features
3
Customer Support
2
Cybersecurity
2
Cons
Complex Interface
2
Improvements Needed
2
Poor Interface Design
2
UX Improvement
2
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
7.8
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Seller
Intezer
Company Website
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,270 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Synthetic Monitoring Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Monitoring
    8
    Easy Integrations
    5
    Performance Efficiency
    5
    Real-time Monitoring
    5
    Cons
    Expensive
    7
    Learning Difficulty
    4
    Learning Curve
    3
    Limited Features
    2
    Log Management Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
    8.1
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 43% Small-Business
Splunk Synthetic Monitoring Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Monitoring
8
Easy Integrations
5
Performance Efficiency
5
Real-time Monitoring
5
Cons
Expensive
7
Learning Difficulty
4
Learning Curve
3
Limited Features
2
Log Management Issues
2
Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
8.1
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(27)4.7 out of 5
8th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.8
    Database Management
    Average: 8.4
    9.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.8
Database Management
Average: 8.4
9.5
Incident Logs
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    7.4
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,756 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 33% Mid-Market
Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
7.4
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,886 Twitter followers
LinkedIn® Page
www.linkedin.com
4,756 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Mozilla Enterprise Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mozilla Enterprise Defense Platform features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    7.1
    Quality of Support
    Average: 8.8
    8.5
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mozilla
    Year Founded
    2005
    HQ Location
    San Francisco, CA
    Twitter
    @mozilla
    270,332 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,774 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Mozilla Enterprise Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
Mozilla Enterprise Defense Platform features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
7.1
Quality of Support
Average: 8.8
8.5
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Mozilla
Year Founded
2005
HQ Location
San Francisco, CA
Twitter
@mozilla
270,332 Twitter followers
LinkedIn® Page
www.linkedin.com
1,774 employees on LinkedIn®
(30)4.5 out of 5
27th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resolve is creating the future of agentic automation and orchestration for IT teams to drive resilience, agility, and innovation across the business. The Resolve platform gives IT and network opera

    Users
    No information available
    Industries
    • Information Technology and Services
    • Telecommunications
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resolve features and usability ratings that predict user satisfaction
    9.0
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    8.9
    Database Management
    Average: 8.4
    6.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Campbell, California
    Twitter
    @ResolveSystems
    404 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resolve is creating the future of agentic automation and orchestration for IT teams to drive resilience, agility, and innovation across the business. The Resolve platform gives IT and network opera

Users
No information available
Industries
  • Information Technology and Services
  • Telecommunications
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Resolve features and usability ratings that predict user satisfaction
9.0
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
8.9
Database Management
Average: 8.4
6.7
Incident Logs
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Campbell, California
Twitter
@ResolveSystems
404 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
(59)4.5 out of 5
28th Easiest To Use in Incident Response software
View top Consulting Services for Wazuh - The Open Source Security Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

    Users
    • SOC Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 46% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wazuh - The Open Source Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Threat Detection
    10
    Integrations
    9
    Deployment Ease
    6
    Features
    6
    Cons
    Learning Curve
    7
    Difficult Learning
    4
    Poor Support Services
    4
    Unclear Documentation
    4
    Complex Setup
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.2
    Quality of Support
    Average: 8.8
    7.8
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Campbell, US
    Twitter
    @wazuh
    7,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

Users
  • SOC Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 46% Small-Business
  • 39% Mid-Market
Wazuh - The Open Source Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Threat Detection
10
Integrations
9
Deployment Ease
6
Features
6
Cons
Learning Curve
7
Difficult Learning
4
Poor Support Services
4
Unclear Documentation
4
Complex Setup
3
Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.2
Quality of Support
Average: 8.8
7.8
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Campbell, US
Twitter
@wazuh
7,262 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
(19)4.2 out of 5
12th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A scalable, Security Incident Response Platform, tightly integrated with MISP (Malware Information Sharing Platform), designed to make life easier for SOCs, CSIRTs, CERTs and any information security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TheHive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Automation
    1
    Customization
    1
    Features
    1
    Incident Management
    1
    Cons
    Complex Setup
    1
    Lack of Guidance
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TheHive features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    7.9
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TheHive
    Year Founded
    2018
    HQ Location
    Paris, FR
    Twitter
    @TheHive_Project
    9,685 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A scalable, Security Incident Response Platform, tightly integrated with MISP (Malware Information Sharing Platform), designed to make life easier for SOCs, CSIRTs, CERTs and any information security

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 37% Mid-Market
TheHive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Automation
1
Customization
1
Features
1
Incident Management
1
Cons
Complex Setup
1
Lack of Guidance
1
Learning Curve
1
TheHive features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
7.9
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Seller
TheHive
Year Founded
2018
HQ Location
Paris, FR
Twitter
@TheHive_Project
9,685 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    D3 stands at the forefront of AI-powered security, providing real-time, autonomous SOC solutions that help organizations stay ahead of cyber threats. By merging autonomous investigation and triage wit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 49% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • D3 Security features and usability ratings that predict user satisfaction
    9.0
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    8.9
    Database Management
    Average: 8.4
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Vancouver, British Columbia
    Twitter
    @D3Security
    1,123 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

D3 stands at the forefront of AI-powered security, providing real-time, autonomous SOC solutions that help organizations stay ahead of cyber threats. By merging autonomous investigation and triage wit

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 49% Enterprise
  • 41% Mid-Market
D3 Security features and usability ratings that predict user satisfaction
9.0
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
8.9
Database Management
Average: 8.4
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Vancouver, British Columbia
Twitter
@D3Security
1,123 Twitter followers
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical incidents and operations. Our customers automatically see, share, and respond to events in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Activu vis|ability features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    9.6
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Activu
    Year Founded
    1983
    HQ Location
    Rockaway, US
    Twitter
    @Activu
    265 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    88 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical incidents and operations. Our customers automatically see, share, and respond to events in

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
Activu vis|ability features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
9.6
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Activu
Year Founded
1983
HQ Location
Rockaway, US
Twitter
@Activu
265 Twitter followers
LinkedIn® Page
www.linkedin.com
88 employees on LinkedIn®
(49)4.8 out of 5
25th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DERDACK Enterprise Alert® is enterprise-class alert notification and mobile response software. Unique in the market, it is designed for on-premises and private cloud installation. It increases agility

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DERDACK Enterprise Alert features and usability ratings that predict user satisfaction
    7.4
    Threat Intelligence
    Average: 8.7
    9.6
    Quality of Support
    Average: 8.8
    8.9
    Database Management
    Average: 8.4
    9.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Derdack
    Year Founded
    1999
    HQ Location
    Potsdam, Germany
    Twitter
    @Derdack
    10,430 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DERDACK Enterprise Alert® is enterprise-class alert notification and mobile response software. Unique in the market, it is designed for on-premises and private cloud installation. It increases agility

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Enterprise
  • 27% Mid-Market
DERDACK Enterprise Alert features and usability ratings that predict user satisfaction
7.4
Threat Intelligence
Average: 8.7
9.6
Quality of Support
Average: 8.8
8.9
Database Management
Average: 8.4
9.3
Incident Logs
Average: 8.8
Seller Details
Seller
Derdack
Year Founded
1999
HQ Location
Potsdam, Germany
Twitter
@Derdack
10,430 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Triage™ is an automated incident response software any organization can use to rapidly investigate its endpoints. Cyber Triage investigates the endpoint by pushing the collection tool over the

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Triage Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Cybersecurity
    1
    Incident Management
    1
    Response Time
    1
    Support
    1
    Cons
    Poor Customer Support
    1
    System Errors
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Triage features and usability ratings that predict user satisfaction
    9.0
    Threat Intelligence
    Average: 8.7
    8.7
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1995
    HQ Location
    Somerville, US
    Twitter
    @basistechnology
    2,892 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    57 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Triage™ is an automated incident response software any organization can use to rapidly investigate its endpoints. Cyber Triage investigates the endpoint by pushing the collection tool over the

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 35% Mid-Market
Cyber Triage Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Cybersecurity
1
Incident Management
1
Response Time
1
Support
1
Cons
Poor Customer Support
1
System Errors
1
Cyber Triage features and usability ratings that predict user satisfaction
9.0
Threat Intelligence
Average: 8.7
8.7
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Year Founded
1995
HQ Location
Somerville, US
Twitter
@basistechnology
2,892 Twitter followers
LinkedIn® Page
www.linkedin.com
57 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Accelerate your forensic analysis and supercharge your detection with Nextron's compromise assessment tools

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ASGARD Mangement System features and usability ratings that predict user satisfaction
    8.1
    Threat Intelligence
    Average: 8.7
    7.5
    Quality of Support
    Average: 8.8
    7.4
    Database Management
    Average: 8.4
    8.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Dietzenbach, Hessen
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Accelerate your forensic analysis and supercharge your detection with Nextron's compromise assessment tools

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 36% Mid-Market
ASGARD Mangement System features and usability ratings that predict user satisfaction
8.1
Threat Intelligence
Average: 8.7
7.5
Quality of Support
Average: 8.8
7.4
Database Management
Average: 8.4
8.1
Incident Logs
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
Dietzenbach, Hessen
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogicHub features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Devo
    Year Founded
    2011
    HQ Location
    Boston, US
    Twitter
    @devo_Inc
    6,240 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    604 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Try our Free SOAR today! https://info.logichub.com/soar-free-edition-2022 About us: Founded in 2016 by seasoned cybersecurity veterans from ArcSight and Sumo Logic, LogicHub is built on the principl

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 27% Mid-Market
LogicHub features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Devo
Year Founded
2011
HQ Location
Boston, US
Twitter
@devo_Inc
6,240 Twitter followers
LinkedIn® Page
www.linkedin.com
604 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiEDR identifies and stops breaches in real time automatically and efficiently with a lightweight agent. Part of the Fortinet Security Operations platform, it proactively shrinks the attack surface

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiEDR features and usability ratings that predict user satisfaction
    7.8
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    7.5
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiEDR identifies and stops breaches in real time automatically and efficiently with a lightweight agent. Part of the Fortinet Security Operations platform, it proactively shrinks the attack surface

Users
No information available
Industries
No information available
Market Segment
  • 46% Mid-Market
  • 31% Enterprise
FortiEDR features and usability ratings that predict user satisfaction
7.8
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
7.5
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 30% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pondurance features and usability ratings that predict user satisfaction
    9.5
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.8
    Database Management
    Average: 8.4
    9.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Indianapolis, US
    LinkedIn® Page
    www.linkedin.com
    132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 30% Enterprise
Pondurance features and usability ratings that predict user satisfaction
9.5
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.8
Database Management
Average: 8.4
9.5
Incident Logs
Average: 8.8
Seller Details
Company Website
Year Founded
2008
HQ Location
Indianapolis, US
LinkedIn® Page
www.linkedin.com
132 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SmartEvent Event Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reporting
    2
    Reporting Ease
    2
    Threat Detection
    2
    Customization
    1
    Features
    1
    Cons
    Difficult Learning
    2
    Deployment Difficulties
    1
    Learning Curve
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SmartEvent Event Management features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    7.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, comp

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
SmartEvent Event Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reporting
2
Reporting Ease
2
Threat Detection
2
Customization
1
Features
1
Cons
Difficult Learning
2
Deployment Difficulties
1
Learning Curve
1
Licensing Cost
1
Licensing Issues
1
SmartEvent Event Management features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
7.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

    Users
    No information available
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 75% Small-Business
    • 15% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
    • Reviewers like the user-friendly interface, the ease of implementation and integration with other devices, the prompt customer service, and the comprehensive training offered by Belkasoft.
    • Users mentioned difficulties in finding some features, occasional slow response times, issues with mobile extractions, high pricing for some, and the lack of an overall search option.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Belkasoft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Features
    18
    Training
    9
    Customer Support
    8
    Performance Efficiency
    7
    Cons
    Expensive
    6
    Slow Performance
    3
    Difficult Setup
    2
    Not User-Friendly
    2
    Poor Navigation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Belkasoft features and usability ratings that predict user satisfaction
    7.9
    Threat Intelligence
    Average: 8.7
    9.4
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Belkasoft
    Year Founded
    2002
    HQ Location
    Sunnyvale, California
    Twitter
    @Belkasoft
    11,095 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

Users
No information available
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 75% Small-Business
  • 15% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
  • Reviewers like the user-friendly interface, the ease of implementation and integration with other devices, the prompt customer service, and the comprehensive training offered by Belkasoft.
  • Users mentioned difficulties in finding some features, occasional slow response times, issues with mobile extractions, high pricing for some, and the lack of an overall search option.
Belkasoft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Features
18
Training
9
Customer Support
8
Performance Efficiency
7
Cons
Expensive
6
Slow Performance
3
Difficult Setup
2
Not User-Friendly
2
Poor Navigation
2
Belkasoft features and usability ratings that predict user satisfaction
7.9
Threat Intelligence
Average: 8.7
9.4
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Belkasoft
Year Founded
2002
HQ Location
Sunnyvale, California
Twitter
@Belkasoft
11,095 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Intelligence Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Insights
    4
    Detailed Analysis
    3
    Features
    3
    Accuracy of Information
    2
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Curve
    3
    Additional Costs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Small-Business
Splunk Intelligence Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Insights
4
Detailed Analysis
3
Features
3
Accuracy of Information
2
Cons
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Curve
3
Additional Costs
1
Splunk Intelligence Management features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Threat Intelligence Ops Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    3
    Threat Detection
    3
    Cybersecurity
    2
    Implementation Ease
    2
    Cons
    Inadequate Reporting
    1
    Navigation Issues
    1
    Poor Navigation
    1
    Poor Reporting
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    7.3
    Database Management
    Average: 8.4
    7.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Enterprise
  • 50% Mid-Market
ThreatConnect Threat Intelligence Ops Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
3
Threat Detection
3
Cybersecurity
2
Implementation Ease
2
Cons
Inadequate Reporting
1
Navigation Issues
1
Poor Navigation
1
Poor Reporting
1
Software Bugs
1
ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
7.3
Database Management
Average: 8.4
7.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,337 Twitter followers
LinkedIn® Page
www.linkedin.com
167 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    7.8
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    5.0
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
7.8
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
5.0
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
(18)4.4 out of 5
View top Consulting Services for Cybereason Defense Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Enterprise
    • 22% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybereason Defense Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Cybersecurity
    2
    Easy Setup
    2
    Features
    2
    Integrations
    2
    Cons
    Poor Customer Support
    2
    Poor Interface Design
    2
    Poor Support Services
    2
    Poor Usability
    2
    UX Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybereason Defense Platform features and usability ratings that predict user satisfaction
    7.8
    Threat Intelligence
    Average: 8.7
    7.9
    Quality of Support
    Average: 8.8
    9.2
    Database Management
    Average: 8.4
    7.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    La Jolla, San Diego, US
    Twitter
    @cybereason
    15,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    675 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Mos

Users
No information available
Industries
No information available
Market Segment
  • 61% Enterprise
  • 22% Small-Business
Cybereason Defense Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Cybersecurity
2
Easy Setup
2
Features
2
Integrations
2
Cons
Poor Customer Support
2
Poor Interface Design
2
Poor Support Services
2
Poor Usability
2
UX Improvement
2
Cybereason Defense Platform features and usability ratings that predict user satisfaction
7.8
Threat Intelligence
Average: 8.7
7.9
Quality of Support
Average: 8.8
9.2
Database Management
Average: 8.4
7.8
Incident Logs
Average: 8.8
Seller Details
Year Founded
2012
HQ Location
La Jolla, San Diego, US
Twitter
@cybereason
15,846 Twitter followers
LinkedIn® Page
www.linkedin.com
675 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    9.6
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
9.6
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ORNA is an end-to-end incident response automation platform for lean teams in midsize businesses that helps streamline or automate detection, response, and even prevention of cyberattacks on the organ

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Small-Business
    • 14% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ORNA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Integration Support
    2
    Monitoring
    2
    Automation Ease
    1
    Cloud Services
    1
    Cons
    Information Deficiency
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ORNA features and usability ratings that predict user satisfaction
    9.4
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ORNA
    Year Founded
    2021
    HQ Location
    Toronto, Canada
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ORNA is an end-to-end incident response automation platform for lean teams in midsize businesses that helps streamline or automate detection, response, and even prevention of cyberattacks on the organ

Users
No information available
Industries
No information available
Market Segment
  • 71% Small-Business
  • 14% Enterprise
ORNA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Integration Support
2
Monitoring
2
Automation Ease
1
Cloud Services
1
Cons
Information Deficiency
1
Insufficient Information
1
ORNA features and usability ratings that predict user satisfaction
9.4
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
ORNA
Year Founded
2021
HQ Location
Toronto, Canada
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    To date, organizations have lacked an efficient process for gathering, organizing, and analyzing user reports of suspicious emails that may indicate early stages of a cyber attack. Cofense Reporter pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cofense Reporter features and usability ratings that predict user satisfaction
    9.4
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cofense
    Year Founded
    2011
    HQ Location
    Leesburg, Virginia
    Twitter
    @Cofense
    6,033 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    306 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

To date, organizations have lacked an efficient process for gathering, organizing, and analyzing user reports of suspicious emails that may indicate early stages of a cyber attack. Cofense Reporter pr

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
Cofense Reporter features and usability ratings that predict user satisfaction
9.4
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Cofense
Year Founded
2011
HQ Location
Leesburg, Virginia
Twitter
@Cofense
6,033 Twitter followers
LinkedIn® Page
www.linkedin.com
306 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DATEV in one sentence: tax consultants, lawyers, auditors, small and medium-sized enterprises, municipalities, and founders using DATEV software that meets all requirements at high standards regarding

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 79% Small-Business
    • 21% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Datev Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Simple
    3
    Useful
    3
    Data Management
    2
    Data Privacy
    2
    Cons
    Complexity Issues
    5
    Expensive
    4
    Complexity
    3
    Learning Curve
    3
    Learning Difficulty
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datev features and usability ratings that predict user satisfaction
    0.0
    No information available
    5.5
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Datev
    Year Founded
    1966
    HQ Location
    Germany
    Twitter
    @DATEV
    7,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,706 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DATEV in one sentence: tax consultants, lawyers, auditors, small and medium-sized enterprises, municipalities, and founders using DATEV software that meets all requirements at high standards regarding

Users
No information available
Industries
No information available
Market Segment
  • 79% Small-Business
  • 21% Mid-Market
Datev Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Simple
3
Useful
3
Data Management
2
Data Privacy
2
Cons
Complexity Issues
5
Expensive
4
Complexity
3
Learning Curve
3
Learning Difficulty
3
Datev features and usability ratings that predict user satisfaction
0.0
No information available
5.5
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Datev
Year Founded
1966
HQ Location
Germany
Twitter
@DATEV
7,804 Twitter followers
LinkedIn® Page
www.linkedin.com
4,706 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Small-Business
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DomainTools Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Detailed Analysis
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    False Positives
    2
    Complexity
    1
    Data Management
    1
    Expensive
    1
    Incomplete Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DomainTools features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    6.9
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Seattle, WA, Washington
    Twitter
    @DomainTools
    13,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    149 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know. The world's most advanced security teams use our solutions to identify

Users
No information available
Industries
No information available
Market Segment
  • 62% Small-Business
  • 31% Enterprise
DomainTools Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Detailed Analysis
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
False Positives
2
Complexity
1
Data Management
1
Expensive
1
Incomplete Information
1
DomainTools features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
6.9
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Seattle, WA, Washington
Twitter
@DomainTools
13,238 Twitter followers
LinkedIn® Page
www.linkedin.com
149 employees on LinkedIn®
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.5
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
0.0
No information available
8.5
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.8
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,905 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    796 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Netwrix Threat Manager features and usability ratings that predict user satisfaction
0.0
No information available
8.8
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,905 Twitter followers
LinkedIn® Page
www.linkedin.com
796 employees on LinkedIn®
(11)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Integration Capabilities
    5
    Ease of Use
    4
    Threat Detection
    4
    Automation
    3
    Cons
    Poor Customer Support
    2
    Deployment Difficulties
    1
    Difficult Customization
    1
    Difficult Learning Curve
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    9.4
    Threat Intelligence
    Average: 8.7
    9.1
    Quality of Support
    Average: 8.8
    0.0
    No information available
    7.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    715 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Integration Capabilities
5
Ease of Use
4
Threat Detection
4
Automation
3
Cons
Poor Customer Support
2
Deployment Difficulties
1
Difficult Customization
1
Difficult Learning Curve
1
Lack of Automation
1
OpenCTI by Filigran features and usability ratings that predict user satisfaction
9.4
Threat Intelligence
Average: 8.7
9.1
Quality of Support
Average: 8.8
0.0
No information available
7.2
Incident Logs
Average: 8.8
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
715 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tanium Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    4
    Security
    3
    Asset Management
    2
    Easy Installation
    2
    Cons
    Complexity
    2
    Learning Curve
    2
    Difficult Learning
    1
    Inaccurate Information
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tanium Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tanium
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle area, WA
    Twitter
    @Tanium
    7,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Tanium Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
4
Security
3
Asset Management
2
Easy Installation
2
Cons
Complexity
2
Learning Curve
2
Difficult Learning
1
Inaccurate Information
1
Limited Features
1
Tanium Platform features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Tanium
Company Website
Year Founded
2007
HQ Location
Seattle area, WA
Twitter
@Tanium
7,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,178 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trellix Helix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Support
    2
    Log Management
    2
    Cons
    Information Deficiency
    1
    Information Overload
    1
    Insufficient Information
    1
    Limited Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Helix features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trellix Helix integrates your security tools and augments them with next-generation security information and event management (SIEM), orchestration, and threat intelligence capabilities to capture the

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Trellix Helix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Support
2
Log Management
2
Cons
Information Deficiency
1
Information Overload
1
Insufficient Information
1
Limited Information
1
Trellix Helix features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A robust incident communication platform that provides your users with transparent, real-time updates. It also supports more than 50 languages and seamlessly integrates with monitoring tools, making i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Site24x7 StatusIQ Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    3
    Infrastructure Monitoring
    2
    Platform Support
    2
    Real-time Monitoring
    2
    Analysis
    1
    Cons
    Difficult Navigation
    3
    Navigation Difficulty
    3
    Poor Navigation
    3
    Time-Consuming
    2
    Time Consumption
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Site24x7 StatusIQ features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    7.3
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zoho
    Year Founded
    1996
    HQ Location
    Austin, TX
    Twitter
    @Zoho
    103,834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26,328 employees on LinkedIn®
    Phone
    +1 (888) 900-9646
Product Description
How are these determined?Information
This description is provided by the seller.

A robust incident communication platform that provides your users with transparent, real-time updates. It also supports more than 50 languages and seamlessly integrates with monitoring tools, making i

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
Site24x7 StatusIQ Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
3
Infrastructure Monitoring
2
Platform Support
2
Real-time Monitoring
2
Analysis
1
Cons
Difficult Navigation
3
Navigation Difficulty
3
Poor Navigation
3
Time-Consuming
2
Time Consumption
2
Site24x7 StatusIQ features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
7.3
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Zoho
Year Founded
1996
HQ Location
Austin, TX
Twitter
@Zoho
103,834 Twitter followers
LinkedIn® Page
www.linkedin.com
26,328 employees on LinkedIn®
Phone
+1 (888) 900-9646
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Agari is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Agari Phishing Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Email Security
    1
    Features
    1
    Phishing Prevention
    1
    Reporting Ease
    1
    Cons
    Poor Analysis
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Agari Phishing Response features and usability ratings that predict user satisfaction
    7.5
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    7.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Agari is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing co

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Agari Phishing Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Email Security
1
Features
1
Phishing Prevention
1
Reporting Ease
1
Cons
Poor Analysis
1
Poor Reporting
1
Agari Phishing Response features and usability ratings that predict user satisfaction
7.5
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
7.5
Incident Logs
Average: 8.8
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Continuity Engine Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Monitoring
    1
    Performance Efficiency
    1
    Setup Ease
    1
    Time-saving
    1
    Cons
    Difficult Setup
    1
    Poor Documentation
    1
    Setup Difficulty
    1
    Unclear Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Engine features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    7.5
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Neverfail
    Year Founded
    1993
    HQ Location
    Austin, Tx
    Twitter
    @neverfail
    1,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach w

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Continuity Engine Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Monitoring
1
Performance Efficiency
1
Setup Ease
1
Time-saving
1
Cons
Difficult Setup
1
Poor Documentation
1
Setup Difficulty
1
Unclear Documentation
1
Continuity Engine features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
7.5
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Neverfail
Year Founded
1993
HQ Location
Austin, Tx
Twitter
@neverfail
1,026 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AI EdgeLabs features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Dover, Delaware
    Twitter
    @ai_edge_labs
    59 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The AI EdgeLabs platform equips security teams with best-in-class AI technology that is autonomous, effective, and immediate in identifying, responding, and remediating ongoing attacks and threats at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
AI EdgeLabs features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Dover, Delaware
Twitter
@ai_edge_labs
59 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Canary Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Affordable
    1
    Ease of Use
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Canary features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Canary Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Affordable
1
Ease of Use
1
Cons
This product has not yet received any negative sentiments.
Canary features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CimSweep features and usability ratings that predict user satisfaction
    0.0
    No information available
    3.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GitHub
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @github
    2,626,894 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,505 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
CimSweep features and usability ratings that predict user satisfaction
0.0
No information available
3.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
GitHub
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@github
2,626,894 Twitter followers
LinkedIn® Page
www.linkedin.com
6,505 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cofense Triage is the first phishing-specific incident response platform that allows security operation (SOC) and incident responders to automate the prioritization, analysis and response to phishing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cofense Triage features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cofense
    Year Founded
    2011
    HQ Location
    Leesburg, Virginia
    Twitter
    @Cofense
    6,033 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    306 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cofense Triage is the first phishing-specific incident response platform that allows security operation (SOC) and incident responders to automate the prioritization, analysis and response to phishing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Cofense Triage features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Cofense
Year Founded
2011
HQ Location
Leesburg, Virginia
Twitter
@Cofense
6,033 Twitter followers
LinkedIn® Page
www.linkedin.com
306 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    7.7
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
7.7
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GreatHorn features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GreatHorn
    HQ Location
    Waltham, US
    Twitter
    @greathorn
    803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
GreatHorn features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
GreatHorn
HQ Location
Waltham, US
Twitter
@greathorn
803 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deliver real-time messages across dispersed audiences, providing relevant information during critical incidents to ensure business continuity.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Klaxon - Incident Management features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Klaxon
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Deliver real-time messages across dispersed audiences, providing relevant information during critical incidents to ensure business continuity.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Klaxon - Incident Management features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Klaxon
LinkedIn® Page
www.linkedin.com
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Maltego Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Artificial Intelligence
    1
    Data Protection
    1
    Detailed Analysis
    1
    Easy Integrations
    1
    Cons
    Access Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    8.7
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Artificial Intelligence
1
Data Protection
1
Detailed Analysis
1
Easy Integrations
1
Cons
Access Limitations
1
Maltego features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
8.7
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,804 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Radar® Privacy is an award-winning SaaS solution that employs patented automation to streamline the management of data privacy and security incidents containing personal information to ensure complian

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Radar Privacy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Portland, OR
    Twitter
    @radarfirst
    426 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Radar® Privacy is an award-winning SaaS solution that employs patented automation to streamline the management of data privacy and security incidents containing personal information to ensure complian

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Radar Privacy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Portland, OR
Twitter
@radarfirst
426 Twitter followers
LinkedIn® Page
www.linkedin.com
61 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SAINTCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    2
    Asset Management
    1
    Coverage
    1
    Deployment Ease
    1
    Ease of Implementation
    1
    Cons
    Inadequate Reporting
    2
    Limited Features
    2
    Missing Features
    2
    Poor Reporting
    2
    Asset Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAINTCloud features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    6.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Bethesda, MD
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to i

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SAINTCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
2
Asset Management
1
Coverage
1
Deployment Ease
1
Ease of Implementation
1
Cons
Inadequate Reporting
2
Limited Features
2
Missing Features
2
Poor Reporting
2
Asset Management
1
SAINTCloud features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
6.7
Incident Logs
Average: 8.8
Seller Details
Year Founded
1998
HQ Location
Bethesda, MD
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Control your website traffic with pat. pending click and block tech.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActivShield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    Twitter
    @ActivShield
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Control your website traffic with pat. pending click and block tech.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ActivShield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
Twitter
@ActivShield
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
Entry Level Price:Starting at $4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AirMDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AirMDR
    Year Founded
    2023
    HQ Location
    Menlo Park, US
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AirMDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AirMDR
Year Founded
2023
HQ Location
Menlo Park, US
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Akmatori is an AIOps platform, designed to handle alerts effortlessly and prevent on-call burnout. Automate incident response, reduce downtime, and simplify troubleshooting.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akmatori features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Akmatori
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Akmatori is an AIOps platform, designed to handle alerts effortlessly and prevent on-call burnout. Automate incident response, reduce downtime, and simplify troubleshooting.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Akmatori features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Akmatori
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anomali features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANOMALI
    Year Founded
    2013
    HQ Location
    Redwood City, CA
    Twitter
    @Anomali
    8,805 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Anomali features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ANOMALI
Year Founded
2013
HQ Location
Redwood City, CA
Twitter
@Anomali
8,805 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Using AI and behavioural analytics to detect malware hidden within encrypted traffic without the need for decryption

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barac features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barac.io
    Twitter
    @barac_io
    98 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Using AI and behavioural analytics to detect malware hidden within encrypted traffic without the need for decryption

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Barac features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Barac.io
Twitter
@barac_io
98 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BIMA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Peris.ai
    Year Founded
    2022
    HQ Location
    Jakarta, ID
    Twitter
    @peris_ai
    140 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BIMA by Perisai: Redefining Cybersecurity with a Symphony of EDR, NDR, XDR, and SIEM. Experience digital freedom like never before, where every click is safe, and every innovation is secure. Bima - wh

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BIMA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Peris.ai
Year Founded
2022
HQ Location
Jakarta, ID
Twitter
@peris_ai
140 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BLACKPANDA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Singapore, SG
    LinkedIn® Page
    www.linkedin.com
    55 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BLACKPANDA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Singapore, SG
LinkedIn® Page
www.linkedin.com
55 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BreachRx is the leading automated incident reporting and response platform used by security and technical leaders to overcome one of their biggest challenges—reducing cybersecurity regulatory and inci

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BreachRx features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BreachRx
    HQ Location
    San Francisco, CA
    Twitter
    @BreachRx
    117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BreachRx is the leading automated incident reporting and response platform used by security and technical leaders to overcome one of their biggest challenges—reducing cybersecurity regulatory and inci

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BreachRx features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BreachRx
HQ Location
San Francisco, CA
Twitter
@BreachRx
117 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Cetas Autonomous Incident Responder is the premier cloud-native Extended Security Intelligence and Automation Management (XSIAM) platform for protecting cloud workloads and SaaS applications.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cetas features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Cetas Autonomous Incident Responder is the premier cloud-native Extended Security Intelligence and Automation Management (XSIAM) platform for protecting cloud workloads and SaaS applications.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cetas features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Codesnag is an AI augmented hacker powered attack,defense and response ready engine which can help you see your organisation from a hacker's point of view, enhancing your defense and help you respond

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Codesnag features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    New Delhi, IN
    Twitter
    @CodeSnag
    18 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Codesnag is an AI augmented hacker powered attack,defense and response ready engine which can help you see your organisation from a hacker's point of view, enhancing your defense and help you respond

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Codesnag features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2023
HQ Location
New Delhi, IN
Twitter
@CodeSnag
18 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    𝗖𝗬𝗕𝗘𝗥𝗤𝗨𝗘𝗦𝗧 𝗶𝘀 𝗮 𝘂𝗻𝗶𝗳𝗶𝗲𝗱 𝗽𝗹𝗮𝘁𝗳𝗼𝗿𝗺 𝗱𝗲𝘀𝗶𝗴𝗻𝗲𝗱 𝘁𝗼 𝘂𝗻𝗹𝗲𝗮𝘀𝗵 𝘆𝗼𝘂𝗿 𝗰𝘆𝗯𝗲𝗿 𝗿𝗲𝘀𝗶𝗹𝗶𝗲𝗻𝗰𝗲 𝗮𝗻𝗱 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗮𝗴𝗶𝗹𝗶𝘁𝘆, 𝗯𝗮𝘀𝗲𝗱 𝗼𝗻 𝗮𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗦𝗜𝗘𝗠, 𝗨𝗘𝗕𝗔 𝗮𝗻𝗱 𝗦𝗢𝗔𝗥 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀. CYBERQUEST functions as an agile, scalable busin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYBERQUEST features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Sectorul 1, Bucureşti
    Twitter
    @integryHQ
    239 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

𝗖𝗬𝗕𝗘𝗥𝗤𝗨𝗘𝗦𝗧 𝗶𝘀 𝗮 𝘂𝗻𝗶𝗳𝗶𝗲𝗱 𝗽𝗹𝗮𝘁𝗳𝗼𝗿𝗺 𝗱𝗲𝘀𝗶𝗴𝗻𝗲𝗱 𝘁𝗼 𝘂𝗻𝗹𝗲𝗮𝘀𝗵 𝘆𝗼𝘂𝗿 𝗰𝘆𝗯𝗲𝗿 𝗿𝗲𝘀𝗶𝗹𝗶𝗲𝗻𝗰𝗲 𝗮𝗻𝗱 𝗼𝗽𝗲𝗿𝗮𝘁𝗶𝗼𝗻𝗮𝗹 𝗮𝗴𝗶𝗹𝗶𝘁𝘆, 𝗯𝗮𝘀𝗲𝗱 𝗼𝗻 𝗮𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗦𝗜𝗘𝗠, 𝗨𝗘𝗕𝗔 𝗮𝗻𝗱 𝗦𝗢𝗔𝗥 𝗰𝗮𝗽𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀. CYBERQUEST functions as an agile, scalable busin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CYBERQUEST features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Sectorul 1, Bucureşti
Twitter
@integryHQ
239 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyber_reveal features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Falls Church, US
    Twitter
    @BAES_Careers
    1,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,960 employees on LinkedIn®
    Ownership
    LON: BA
Product Description
How are these determined?Information
This description is provided by the seller.

CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
cyber_reveal features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Falls Church, US
Twitter
@BAES_Careers
1,915 Twitter followers
LinkedIn® Page
www.linkedin.com
15,960 employees on LinkedIn®
Ownership
LON: BA
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cydarm features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cydarm
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cydarm features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cydarm
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our Content Threat Removal Platform is the world's first cyber security solution that mitigates the risk of stegware attacks that hide from detection using steganography techniques.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deep Secure Content Threat Removal Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Malvern, GB
    Twitter
    @DeepSecureLtd
    1,433 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our Content Threat Removal Platform is the world's first cyber security solution that mitigates the risk of stegware attacks that hide from detection using steganography techniques.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Deep Secure Content Threat Removal Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Malvern, GB
Twitter
@DeepSecureLtd
1,433 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dropzone Al offers a pre-trained Al SOC analyst that autonomously handles Tier 1 alert triage and investigation for every alert. It replicates the investigative process and techniques of expert analys

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dropzone AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    Seattle, US
    Twitter
    @DropzoneAI
    254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dropzone Al offers a pre-trained Al SOC analyst that autonomously handles Tier 1 alert triage and investigation for every alert. It replicates the investigative process and techniques of expert analys

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Dropzone AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2023
HQ Location
Seattle, US
Twitter
@DropzoneAI
254 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    When you license the eRiskHub® portal, powered by NetDiligence®, you provide your clients with a go-to resource for all things cyber, helping them shore up their defenses and respond effectively to da

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • eRiskHub features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Gladwyne, PA
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

When you license the eRiskHub® portal, powered by NetDiligence®, you provide your clients with a go-to resource for all things cyber, helping them shore up their defenses and respond effectively to da

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
eRiskHub features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Gladwyne, PA
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eye Security protects small and medium-sized European enterprises from cyber threats and insures businesses from the high costs that follow after a successful attack. One platform to control cyber r

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Eye Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Den Haag, Zuid-Holland
    Twitter
    @eyesecurity_
    125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eye Security protects small and medium-sized European enterprises from cyber threats and insures businesses from the high costs that follow after a successful attack. One platform to control cyber r

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Eye Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Den Haag, Zuid-Holland
Twitter
@eyesecurity_
125 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HYAS Insight provides threat and fraud response teams with never-before-seen visibility into everything you need to know about an attack. This includes the origin, current infrastructure being used, a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HYAS Insight features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HYAS
    Twitter
    @hyasinc
    1,159 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HYAS Insight provides threat and fraud response teams with never-before-seen visibility into everything you need to know about an attack. This includes the origin, current infrastructure being used, a

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
HYAS Insight features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
HYAS
Twitter
@hyasinc
1,159 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security QRadar NDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IBM Security QRadar NDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mitiga features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mitiga
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Mitiga bolsters organizations’ security resiliency by navigating them through the Fog of War of an incident, and accelerates their bounce-back to Business-as-Usual, from days, down to hours.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Mitiga features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Mitiga
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NC4 integrates technology and resources around all-hazards information collection and analysis into its proactive risk management application, NC4 Risk Center. NC4 Risk Center enhances member's capabi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NC4 Risk Center features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NC4
    Year Founded
    2002
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NC4 integrates technology and resources around all-hazards information collection and analysis into its proactive risk management application, NC4 Risk Center. NC4 Risk Center enhances member's capabi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NC4 Risk Center features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
NC4
Year Founded
2002
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astrix Security's Non-Human Identity Threat Detection and Response (ITDR) solution is designed to secure and manage non-human identities (NHIs) such as service accounts, API keys, OAuth tokens, and ot

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Non-human ITDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    New York, New York, United States
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astrix Security's Non-Human Identity Threat Detection and Response (ITDR) solution is designed to secure and manage non-human identities (NHIs) such as service accounts, API keys, OAuth tokens, and ot

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Non-human ITDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
New York, New York, United States
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Powered by AI, Prophet AI SOC Analyst (Prophet AI) enhances SecOps productivity and lowers risks by autonomously triaging and investigating every alert or security event. Also known as an AI cyber

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prophet AI SOC Analyst features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2024
    HQ Location
    Palo Alto, US
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Powered by AI, Prophet AI SOC Analyst (Prophet AI) enhances SecOps productivity and lowers risks by autonomously triaging and investigating every alert or security event. Also known as an AI cyber

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Prophet AI SOC Analyst features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2024
HQ Location
Palo Alto, US
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PT Industrial Security Incident Manager is designed to detect hacker attacks on ICS/SCADA systems and help to investigate cybersecurity incidents at critical sites.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PT ISIM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @PTsecurity_UK
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    664 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PT Industrial Security Incident Manager is designed to detect hacker attacks on ICS/SCADA systems and help to investigate cybersecurity incidents at critical sites.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PT ISIM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
N/A
Twitter
@PTsecurity_UK
5 Twitter followers
LinkedIn® Page
www.linkedin.com
664 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedCarbon is a Swiss company specialised in AI-powered cybersecurity. Founded in 2020 by experienced cybersecurity professionals with over two decades of industry expertise, the company focuses on de

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedCarbon features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Lugano, CH
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedCarbon is a Swiss company specialised in AI-powered cybersecurity. Founded in 2020 by experienced cybersecurity professionals with over two decades of industry expertise, the company focuses on de

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
RedCarbon features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Lugano, CH
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReliaQuest GreyMatter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Tampa, FL
    Twitter
    @ReliaQuest
    2,490 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    254 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ReliaQuest GreyMatter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2007
HQ Location
Tampa, FL
Twitter
@ReliaQuest
2,490 Twitter followers
LinkedIn® Page
www.linkedin.com
254 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truth Technologies provides a complete risk compliance platform including sanction screening, anti-money laundering (AML) protection, and supplementary reporting. We also provide additional informatio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sentinel features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Truth Technologies provides a complete risk compliance platform including sanction screening, anti-money laundering (AML) protection, and supplementary reporting. We also provide additional informatio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sentinel features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sequretek MDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Woodbridge, US
    LinkedIn® Page
    www.linkedin.com
    396 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Defines organizational security posture. Determines type, level, volume of sources. Collects, collates, correlates and analyzes telemetry data. Overlays cyber threat intelligence. Derives actionable c

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Sequretek MDR features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Woodbridge, US
LinkedIn® Page
www.linkedin.com
396 employees on LinkedIn®
Entry Level Price:$399.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ShadowHQ is a cyber incident response center. It gives companies a secure and virtual place to alert the response team, and action the response plan from. It is detached from your IT network, ensurin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ShadowHQ features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ShadowHQ
    Year Founded
    2021
    HQ Location
    Hamilton, Ontario
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ShadowHQ is a cyber incident response center. It gives companies a secure and virtual place to alert the response team, and action the response plan from. It is detached from your IT network, ensurin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ShadowHQ features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ShadowHQ
Year Founded
2021
HQ Location
Hamilton, Ontario
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®

Learn More About Incident Response Software

What is Incident Response Software?

Incident response software, sometimes called security incident management software, is a security technology used to remediate cybersecurity issues as they arise in real time. These tools discover incidents and alert the relevant IT and security staff to resolve the security issue. Additionally, the tools allow teams to develop workflows, delegate responsibilities, and automate low-level tasks to optimize response time and minimize the impact of security incidents.

These tools also document historical incidents and help provide context to the users attempting to understand the root cause to remediate security issues. When new security issues arise, users can take advantage of forensic investigation tools to root out the cause of the incident and see if it will be an ongoing or larger overall issue. Many incident response software also integrate with other security tools to simplify alerting, string together workflows, and provide additional threat intelligence.

What Types of Incident Response Software Exist?

Pure incident response solutions

Pure incident response solutions are the last line of defense in the security ecosystem. Only once threats go unseen and vulnerabilities are exposed, do incident response systems come into play. Their main focus is facilitating the remediation of compromised accounts, system penetrations, and other security incidents. These products store information related to common and emerging threats while documenting each occurrence for retrospective analysis. Some incident response solutions are also connected to live feeds to gather global information related to emerging threats.

Incident management and response

Incident management products offer many similar administrative features to incident response products, but other tools combine incident management, alerting, and response capabilities. These tools are often used in DevOps environments to document, track, and source security incidents from their emergence to their remediation.

Incident management tracking and service tools

Other incident management tools have more of a service management focus. These tools will track security incidents, but won’t allow users to build security workflows, remediate issues, or provide forensic investigation features to determine the root cause of the incident.

What are the Common Features of Incident Response Software?

Incident response software can provide a wide range of features, but some of the most common include:

Workflow management: Workflow management features let administrators organize workflows that help guide remediation staff and provide information related to specific situations and incident types.

Workflow automation: Workflow automation allows teams to streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Incident database: Incident databases document historical incident activity. Administrators can access and organize data related to incidents to produce reports or make data more navigable.

Incident alerting: Alerting features inform relevant individuals when incidents happen in real time. Some responses may be automated but users will still be informed.

Incident reporting: Reporting features produce reports detailing trends and vulnerabilities related to their network and infrastructure.

Incident logs: Historical incident logs are stored in the incident database and is used for user reference and analytics while remediating security incidents.

Threat intelligence: Threat intelligence tools, which are often combined with forensic tools, provide an integrated information feed detailing the cybersecurity threats as they’re discovered across the world. This information is gathered either internally or by a third-party vendor and is used to provide further information on remedies.

Security orchestration: Orchestration refers to the integration of security solutions and automation of processes in a response workflow.

Automated remediation: Automation addresses security issues in real time and reduces the time spent remedying issues manually. It also helps resolve common network and system security incidents quickly.

What are the Benefits of Incident Response Software?

The main value of incident response technology is an increased ability to discover and resolve cybersecurity incidents. These are a few valuable components of the incident response process.

Threat modeling: Information security and IT departments can use these tools to gain familiarity with the incident response process and develop workflows before security incident occurrences. This allows companies to stand prepared to quickly discover, resolve, and learn from security incidents and how they impact business-critical systems.

Alerting: Without proper alerting and communication channels, many security threats can penetrate networks and remain undetected for extended periods. During that time, hackers, internal threat actors, and other cybercriminals can steal sensitive and other business-critical data and wreak havoc on IT systems. Proper alerting and communication can greatly shorten the time necessary to discover, inform relevant staff, and eradicate incidents.

Isolation: Incident response platforms allow security teams to contain incidents quickly when alerted properly. Isolating infected systems, networks, and endpoints can greatly reduce an incident’s scope of impact. If isolated properly, security professionals can monitor the activity of affected systems to learn more about the threat actors, their capabilities, and their goals.

Remediation: Remediation is the key to incident response and refers to the actual removal of threats such as malware and escalated privileges, among others. Incident response tools will facilitate the removal and allow teams to verify recovery before reintroducing infected systems or returning to normal operations.

Investigation: Investigation allows teams and companies to learn more about why they were attacked, how they were attacked, and what systems, applications, and data were negatively impacted. This information can help companies respond to compliance information requests, bolster security in vulnerable areas, and resolve similar, future issues, in less time.

Who Uses Incident Response Software?

Information security (InfoSec) professionals: InfoSec professionals use incident response software to monitor, alert, and remediate security threats to a company. Using incident response software, InfoSec professionals can automate and quickly scale their response to security incidents, above and beyond what teams can do manually.

IT professionals: For companies without dedicated information security teams, IT professionals may take on security roles. Professionals with limited security backgrounds may rely on incident response software with the more robust functionality to assist them in identifying threats, their decision making when security incidents arise, and threat remediation.

Incident response service providers: Practitioners at incident response service providers use incident response software to actively manage their client’s security, as well as other providers of managed security services.

What are the Alternatives to Incident Response Software?

Companies that prefer to string together open-source or other various software tools to achieve the functionality of incident response software can do so with a combination of log analysis, SIEM, intrusion detection systems, vulnerability scanners, backup, and other tools. Conversely, companies may wish to outsource the management of their security programs to managed service providers.

Endpoint detection and response (EDR) software: They combine both endpoint antivirus and endpoint management solutions to detect, investigate, and remove any malicious software that penetrates a network’s devices. 

Managed detection and response (MDR) software: They proactively monitor networks, endpoints, and other IT resources for security incidents. 

Extended detection and response (XDR) software: They are tools used to automate the discovery and remediation of security issues across hybrid systems. 

Incident response services providers: For companies that do not want to purchase and manage their incident response in-house or develop their open-source solutions, they can employ incident response services providers.

Log analysis software: Log analysis software helps enable the documentation of application log files for records and analytics.

Log monitoring software: By detecting and alerting users to patterns in these log files, log monitoring software helps solve performance and security issues.

Intrusion detection and prevention systems (IDPS): IDPS is used to inform IT administrators and security staff of anomalies and attacks on IT infrastructure and applications. These tools detect malware, socially engineered attacks, and other web-based threats. 

Security information and event management (SIEM) software: SIEM software can offer security information alerting, along with centralizing security operations into one platform. However, SIEM software cannot automate remediation practices like some incident response software does, however. For companies that do not want to manage SIEM in-house, they can work with managed SIEM service providers.

Threat intelligence software: Threat intelligence software provides organizations with information related to the newest forms of cyber threats like zero-day attacks, new forms of malware, and exploits. Companies may wish to work with threat intelligence services providers, as well.

Vulnerability scanner software: Vulnerability scanners are tools that constantly monitor applications and networks to identify security vulnerabilities. They work by maintaining an up-to-date database of known vulnerabilities, and conduct scans to identify potential exploits. Companies may opt to work with vulnerability assessment services providers, instead of managing this in-house.

Patch management software: Patch management tools are used to ensure that the components of a company’s software stack and IT infrastructure are up to date. They then alert users of necessary updates or execute updates automatically. 

Backup software: Backup software offers protection for business data by copying data from servers, databases, desktops, laptops, and other devices in case user error, corrupt files, or physical disaster render a business’ critical data inaccessible. In the event of data loss from a security incident, data can be restored to its previous state from a backup.

Software Related to Incident Response Software

The following technology families are either closely related to incident response software products or have significant overlap between product functionality.

Security information and event management (SIEM) software: SIEM platforms go together with incident response solutions. Incident response may be facilitated by SIEM systems but these tools are specifically designed to streamline the remediation process or add investigative capabilities during security workflow processes. Incident response solutions will not provide the same level of compliance maintenance or log storage capabilities but can be used to increase a team’s ability to tackle threats as they emerge.

Data breach notification software: Data breach notification software helps companies document the impacts of data breaches to inform regulatory authorities and notify impacted individuals. These solutions automate and operationalize the data breach notification process to adhere to strict data disclosure laws and privacy regulations within mandated timelines, which in some instances can be as few as 72 hours.

Digital forensics software: Digital forensics tools are used to investigate and examine security incidents and threats after they’ve occurred. They don’t facilitate the actual remediation of security incidents but they can provide additional information on the source and scope of a security incident. They also may offer more in-depth investigatory information than incident response software.

Security orchestration, automation, and response (SOAR) software: SOAR is a segment of the security market focused on automating all low-level security tasks. These tools integrate with a company’s SIEM to gather security information. They then integrate with monitoring and response tools to develop an automated workflow from discovery to resolution. Some incident response solutions will allow for workflow development and automation but don’t have a wide range of integration and automation capabilities of a SOAR platform.

Insider threat management (ITM) software: Companies use ITM software to monitor and record the actions of internal system users on their endpoints, such as current and former employees, contractors, business partners, and other permissioned individuals, to protect company assets, such as customer data or intellectual property.

Challenges with Incident Response Software

Software solutions can come with their own set of challenges. The biggest challenge incident response teams may encounter with the software is ensuring that it meets the business’ unique process requirements.

False positives: Incident response software may identify a threat that turns out to be inaccurate, which is known as a false positive. Acting on false positives can waste company resources, time, and create unnecessary downtime for impacted individuals.

Decision making: Incident response software can automate remediation to some security threats, however, a security professional with knowledge of the company’s unique environment should weigh in on the decision-making process on how to handle automating these issues. This may require that companies consult with the software vendor and purchase additional professional services for deploying the software solution. Similarly, when designing workflows on who to alert in the event of a security incident and what actions to take and when, these must be designed with the organization’s specific security needs in mind.  

Changes in regulatory compliance: It is important to stay up to date with changes in regulatory compliance laws, especially concerning data breach notification requirements for who to notify and within what time frame. Companies should also ensure the software provider is providing the necessary updates to the software itself, or work to handle this task operationally.

Insider threats: Many companies focus on external threats, but may not appropriately plan for threats from insiders like employees, contractors, and others with privileged access. It’s important to ensure the Incident Response solution addresses the company’s unique security risk environment, for both external and internal incidents.

How to Buy Incident Response Software

Requirements Gathering (RFI/RFP) for Incident Response Software

It is important to gather the company’s requirements before starting the search for an incident response software solution. To have an effective incident response program, the company must utilize the right tools to support their staff and security practices. Things to consider when determining the requirements include:

Enabling staff responsible for using the software: The team that is tasked with managing this software and the company’s incident response should be heavily involved in gathering requirements and then assessing software solutions. 

Integrations: The software solution should integrate with the company’s existing software stack. Many vendors provide pre-built integrations with the most common third-party systems. The company must ensure the integrations they require are either offered pre-built by the vendor or can be built with ease.

Usability: The software should be easy to use for the incident response team. Features they may prefer in an incident response solution include, out-of-the-box workflows for common incidents, no-code automation workflow builders, decision-process visualization, communication tools, and a knowledge sharing center.

Daily volume of threats: It is important to select an incident response software solution that can meet the company’s level of need. If the volume of security threats received in a day is high, it may be better to select a tool with robust functionality in terms of automating remediation to reduce the burden on staff. For companies experiencing a low volume of threats, they may be able to get by with less robust tools that offer security incident tracking, without much automated remediation functionality.

Applicable regulations: Users should learn specific privacy, security, data breach notification, and other regulations apply to a business in advance. This may be regulation-driven, like companies operating in regulated industries like healthcare subject to HIPAA or financial services subject to the Gramm-Leach-Bliley Act (GLBA); it may be geographic like companies subject to GDPR in the European Union; or it may be industry-specific, like companies adhering to payment card industry security standards like the Payment Card Industry-Data Security Standard (PCI-DSS).  

Data breach notification requirements: It is imperative to determine what security incidents may be reportable data breaches and whether the specific data breach must be reported to regulators, affected individuals, or both. The incident response software solution selected should enable the incident response team to meet these requirements.

Compare Incident Response Software Products

Create a long list

Users can research incident response software providers on G2.com where they can find information such as verified software user reviews and vendor rankings based on user satisfaction and software segment sizes, such as small, medium, or enterprise businesses. It’s also possible to sort software solutions by languages supported.

Users can save any software products that meet their high-level requirements to their  “My List” on G2 by selecting the “favorite” heart symbol on the software’s product page. Saving the selections to the G2 My List will enable users to reference their selections again in the future. 

Create a short list

Users can visit their “My List” on G2.com to begin narrowing down their selection. G2 offers a product compare feature, where buyers can evaluate software features side by side based on real user rankings. 

They can also review G2.com’s quarterly software reports which have in-depth detail on the software user’s perception of their return on investment (in months), the time it took to implement their software solution, usability rankings, and other factors.

Conduct demos

Users can see the product they’ve narrowed down live by scheduling demonstrations. Many times, they can schedule demos directly through G2.com by clicking the “Get a quote” button on the vendor’s product profile. 

They can share their list of requirements and questions with the vendor in advance of their demo. It’s best to use a standard list of questions for each demonstration to ensure a fair comparison between each vendor on the same factors. 

Selection of Incident Response Software

Choose a selection team

Incident response software will likely be managed by InfoSec teams or IT teams. The people responsible for the day-to-day use of these tools must be a part of the selection team.

Others who may be beneficial to include on the selection team include professionals from the service desk, network operations, identity and access, application management, privacy, compliance, and legal teams. 

Negotiation

Most incident response software will be sold as a SaaS on a subscription or usage basis. Pricing will likely depend on the functions required by an organization. For example, log monitoring may be priced by the GB, while vulnerability assessments may be priced by the asset. Oftentimes, buyers can get discounts if they enter contracts for a longer duration.

Negotiating on implementation, support packages, and other professional services is also important. It is particularly important to set the incident response software up correctly when it is first deployed, especially when it comes to creating automated remediation actions and designing workflows.

Final decision

Before purchasing software, most vendors allow a free short-term trial of the product. The day-to-day users of the product must test the software’s capabilities before making a decision. If the selection team approves during the test phase and others on the selection team are satisfied with the solution, buyers can proceed with the contracting process.