Introducing G2.ai, the future of software buying.Try now

Best Network Detection and Response (NDR) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Network detection and response (NDR) software is used to document business network activity for security threats and alert relevant parties or automate threat remediation. These tools work by monitoring east-west traffic and comparing them to established baselines. When traffic behavior deviates from normal functionality, the solution will detect the issue and assist in forensic investigation. Many tools include or integrate with other solutions that automate incident response processes to minimize the threat’s impact.

These tools are used by security professionals and IT staff to observe network traffic and detect anomalies related to user behavior. Other, older technologies may offer one component of network threat detection or incident response, but NDR combines the functionality of numerous security solutions. These tools use artificial intelligence and machine learning to analyze user behavior as well as existing security data; security professionals can then use that data to develop streamlined discovery and response workflows.

Network traffic analysis (NTA) is a similar emerging technology related to NDR. NTA is the core technology behind NDR; it refers to the analytical and monitoring capabilities used to develop baselines and response frameworks as NDR. But NTA solutions do not have the same level of response automation and end-user, behavioral anomaly detection used to trigger incident response. Endpoint detection and response (EDR) has a similar name, but products within that category only detect issues at the device level while NDR provides visibility to threats across the entire network.

To qualify for inclusion in the Network Detection and Response (NDR) category, a product must:

Analyze network traffic in real time
Utilize AI or ML to develop baselines for network behavior
Automate threat and anomaly detection across the network
Deploy network forensics upon detection for investigation and remediation

Best Network Detection and Response (NDR) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
62 Listings in Network Detection and Response (NDR) Available
(205)4.7 out of 5
2nd Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Trend Vision One Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    41
    Ease of Use
    36
    Detection Efficiency
    30
    Features
    26
    Protection
    25
    Cons
    Insufficient Information
    18
    Confusing Documentation
    12
    Limited Features
    12
    Integration Issues
    11
    Expensive
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trend Vision One features and usability ratings that predict user satisfaction
    8.6
    Metadata Enrichment
    Average: 8.5
    8.7
    Quality of Support
    Average: 8.8
    8.1
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk acros

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Trend Vision One Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
41
Ease of Use
36
Detection Efficiency
30
Features
26
Protection
25
Cons
Insufficient Information
18
Confusing Documentation
12
Limited Features
12
Integration Issues
11
Expensive
10
Trend Vision One features and usability ratings that predict user satisfaction
8.6
Metadata Enrichment
Average: 8.5
8.7
Quality of Support
Average: 8.8
8.1
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Network Detection and Response is a cloud-delivered network security platform that helps you take action against threats and identify future threats with speed, accuracy and scale.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Small-Business
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Verizon Network Detection and Response features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    9.0
    Quality of Support
    Average: 8.8
    8.5
    Multi-Network Monitoring
    Average: 8.4
    8.7
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Verizon
    Year Founded
    1983
    HQ Location
    Basking RIdge, NJ
    Twitter
    @Verizon
    1,538,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96,304 employees on LinkedIn®
    Ownership
    NYSE:VZ
Product Description
How are these determined?Information
This description is provided by the seller.

Network Detection and Response is a cloud-delivered network security platform that helps you take action against threats and identify future threats with speed, accuracy and scale.

Users
No information available
Industries
No information available
Market Segment
  • 44% Small-Business
  • 31% Mid-Market
Verizon Network Detection and Response features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
9.0
Quality of Support
Average: 8.8
8.5
Multi-Network Monitoring
Average: 8.4
8.7
Network Visibility
Average: 8.7
Seller Details
Seller
Verizon
Year Founded
1983
HQ Location
Basking RIdge, NJ
Twitter
@Verizon
1,538,284 Twitter followers
LinkedIn® Page
www.linkedin.com
96,304 employees on LinkedIn®
Ownership
NYSE:VZ

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(67)4.6 out of 5
4th Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
Entry Level Price:$5.04 HOUR
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Transportation/Trucking/Railroad
    Market Segment
    • 70% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ExtraHop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Reliability
    5
    Visibility
    5
    Customer Support
    3
    Features
    3
    Cons
    False Positives
    3
    Expensive
    2
    Inadequate Monitoring
    2
    Missing Features
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExtraHop features and usability ratings that predict user satisfaction
    9.2
    Metadata Enrichment
    Average: 8.5
    9.0
    Quality of Support
    Average: 8.8
    9.2
    Multi-Network Monitoring
    Average: 8.4
    9.8
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle, Washington
    Twitter
    @ExtraHop
    10,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    725 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ExtraHop is the cybersecurity partner enterprises trust to reveal cyber risk and build business resilience. The ExtraHop RevealX platform for network detection and response and network performance man

Users
No information available
Industries
  • Hospital & Health Care
  • Transportation/Trucking/Railroad
Market Segment
  • 70% Enterprise
  • 25% Mid-Market
ExtraHop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Reliability
5
Visibility
5
Customer Support
3
Features
3
Cons
False Positives
3
Expensive
2
Inadequate Monitoring
2
Missing Features
2
Alert Issues
1
ExtraHop features and usability ratings that predict user satisfaction
9.2
Metadata Enrichment
Average: 8.5
9.0
Quality of Support
Average: 8.8
9.2
Multi-Network Monitoring
Average: 8.4
9.8
Network Visibility
Average: 8.7
Seller Details
Company Website
Year Founded
2007
HQ Location
Seattle, Washington
Twitter
@ExtraHop
10,915 Twitter followers
LinkedIn® Page
www.linkedin.com
725 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
    8.9
    Metadata Enrichment
    Average: 8.5
    8.9
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    9.7
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 33% Small-Business
Cisco Secure Network Analytics features and usability ratings that predict user satisfaction
8.9
Metadata Enrichment
Average: 8.5
8.9
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
9.7
Network Visibility
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Adaptive Wireless IPS Software features and usability ratings that predict user satisfaction
    8.5
    Metadata Enrichment
    Average: 8.5
    8.2
    Quality of Support
    Average: 8.8
    8.3
    Multi-Network Monitoring
    Average: 8.4
    8.7
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fu

Users
No information available
Industries
No information available
Market Segment
  • 63% Mid-Market
  • 25% Enterprise
Cisco Adaptive Wireless IPS Software features and usability ratings that predict user satisfaction
8.5
Metadata Enrichment
Average: 8.5
8.2
Quality of Support
Average: 8.8
8.3
Multi-Network Monitoring
Average: 8.4
8.7
Network Visibility
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Muninn specializes in mitigating potential cybersecurity risks within IT and OT network, providing one of the leading European Network Detection and Response (NDR) solutions on the market.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Muninn AI Detect features and usability ratings that predict user satisfaction
    8.9
    Metadata Enrichment
    Average: 8.5
    8.5
    Quality of Support
    Average: 8.8
    8.6
    Multi-Network Monitoring
    Average: 8.4
    9.2
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Muninn
    Year Founded
    2016
    HQ Location
    Kongens Lyngby, DK
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Muninn specializes in mitigating potential cybersecurity risks within IT and OT network, providing one of the leading European Network Detection and Response (NDR) solutions on the market.

Users
No information available
Industries
No information available
Market Segment
  • 64% Mid-Market
  • 36% Small-Business
Muninn AI Detect features and usability ratings that predict user satisfaction
8.9
Metadata Enrichment
Average: 8.5
8.5
Quality of Support
Average: 8.8
8.6
Multi-Network Monitoring
Average: 8.4
9.2
Network Visibility
Average: 8.7
Seller Details
Seller
Muninn
Year Founded
2016
HQ Location
Kongens Lyngby, DK
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
(27)4.4 out of 5
6th Easiest To Use in Network Detection and Response (NDR) software
View top Consulting Services for Darktrace/Detect
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace/Detect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    1
    Reliability
    1
    Scalability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace/Detect features and usability ratings that predict user satisfaction
    8.9
    Metadata Enrichment
    Average: 8.5
    9.1
    Quality of Support
    Average: 8.8
    9.4
    Multi-Network Monitoring
    Average: 8.4
    9.4
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,684 employees on LinkedIn®
    Ownership
    LON: DARK
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monito

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 44% Mid-Market
Darktrace/Detect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
1
Reliability
1
Scalability
1
Cons
This product has not yet received any negative sentiments.
Darktrace/Detect features and usability ratings that predict user satisfaction
8.9
Metadata Enrichment
Average: 8.5
9.1
Quality of Support
Average: 8.8
9.4
Multi-Network Monitoring
Average: 8.4
9.4
Network Visibility
Average: 8.7
Seller Details
Seller
Darktrace
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,684 employees on LinkedIn®
Ownership
LON: DARK
(21)4.6 out of 5
5th Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Mid-Market
    • 48% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Corelight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Analytics
    2
    Detection
    2
    Cons
    Complexity
    3
    Complex Coding
    2
    Learning Curve
    2
    Training Deficiency
    2
    Complex Configuration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Corelight features and usability ratings that predict user satisfaction
    8.6
    Metadata Enrichment
    Average: 8.5
    9.0
    Quality of Support
    Average: 8.8
    8.9
    Multi-Network Monitoring
    Average: 8.4
    9.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Corelight's Open Network Detection and Response (NDR) Platform improves network detection coverage, accelerates incident response, and reduces operational costs by consolidating NDR, intrusion detecti

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Mid-Market
  • 48% Enterprise
Corelight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Threat Detection
3
Cybersecurity
2
Data Analytics
2
Detection
2
Cons
Complexity
3
Complex Coding
2
Learning Curve
2
Training Deficiency
2
Complex Configuration
1
Corelight features and usability ratings that predict user satisfaction
8.6
Metadata Enrichment
Average: 8.5
9.0
Quality of Support
Average: 8.8
8.9
Multi-Network Monitoring
Average: 8.4
9.3
Network Visibility
Average: 8.7
Seller Details
Seller
Corelight
Company Website
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Mid-Market
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Easy Integrations
    1
    Cons
    Cloud Dependency
    1
    Cost
    1
    Expensive
    1
    High Resource Usage
    1
    Inadequate Monitoring
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    8.9
    Quality of Support
    Average: 8.8
    8.0
    Multi-Network Monitoring
    Average: 8.4
    9.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Mid-Market
  • 30% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Easy Integrations
1
Cons
Cloud Dependency
1
Cost
1
Expensive
1
High Resource Usage
1
Inadequate Monitoring
1
InsightIDR features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
8.9
Quality of Support
Average: 8.8
8.0
Multi-Network Monitoring
Average: 8.4
9.0
Network Visibility
Average: 8.7
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
(45)4.6 out of 5
3rd Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 42% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Threat Detection
    2
    Alert Notifications
    1
    Alerts
    1
    Antivirus Protection
    1
    Cons
    Compatibility Issues
    1
    Complexity
    1
    Expensive
    1
    Feature Limitations
    1
    Installation Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex XDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex XDR is the industry’s first extended detection and response platform that stops modern attacks by integrating data from any source. With Cortex XDR, you can harness the power of AI, analytics a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 42% Enterprise
  • 38% Mid-Market
Cortex XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Threat Detection
2
Alert Notifications
1
Alerts
1
Antivirus Protection
1
Cons
Compatibility Issues
1
Complexity
1
Expensive
1
Feature Limitations
1
Installation Difficulties
1
Cortex XDR features and usability ratings that predict user satisfaction
0.0
No information available
9.0
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(24)4.1 out of 5
7th Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYBERShark takes BlackStratus’ proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud. Build a sustainable SOC-as-a-service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Small-Business
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberShark SOC-as-a-Service features and usability ratings that predict user satisfaction
    7.8
    Metadata Enrichment
    Average: 8.5
    8.4
    Quality of Support
    Average: 8.8
    7.8
    Multi-Network Monitoring
    Average: 8.4
    8.2
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Brookhaven, Mississippi
    Twitter
    @BlackStratusInc
    2,358 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYBERShark takes BlackStratus’ proven security and compliance platform, trusted by thousands of customers, and delivers it at a fraction of the cost in the cloud. Build a sustainable SOC-as-a-service

Users
No information available
Industries
No information available
Market Segment
  • 46% Small-Business
  • 29% Enterprise
CyberShark SOC-as-a-Service features and usability ratings that predict user satisfaction
7.8
Metadata Enrichment
Average: 8.5
8.4
Quality of Support
Average: 8.8
7.8
Multi-Network Monitoring
Average: 8.4
8.2
Network Visibility
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Brookhaven, Mississippi
Twitter
@BlackStratusInc
2,358 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arista NDR is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full f

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arista NDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    AI Automation
    1
    Alerting
    1
    Data Visualization
    1
    Ease of Use
    1
    Features
    1
    Cons
    Limited Features
    2
    Poor Security Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arista NDR features and usability ratings that predict user satisfaction
    8.1
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    8.2
    Multi-Network Monitoring
    Average: 8.4
    8.7
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Santa Clara, US
    Twitter
    @arista_channels
    2,476 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,862 employees on LinkedIn®
    Ownership
    NYSE:ANET
Product Description
How are these determined?Information
This description is provided by the seller.

Arista NDR is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full f

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
Arista NDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
AI Automation
1
Alerting
1
Data Visualization
1
Ease of Use
1
Features
1
Cons
Limited Features
2
Poor Security Features
1
Arista NDR features and usability ratings that predict user satisfaction
8.1
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
8.2
Multi-Network Monitoring
Average: 8.4
8.7
Network Visibility
Average: 8.7
Seller Details
Year Founded
2004
HQ Location
Santa Clara, US
Twitter
@arista_channels
2,476 Twitter followers
LinkedIn® Page
www.linkedin.com
4,862 employees on LinkedIn®
Ownership
NYSE:ANET
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • B1 Platform by CloudCover Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Network Security
    7
    Ease of Use
    6
    Reliability
    5
    Risk Management
    5
    Cons
    Not User-Friendly
    4
    Poor Customer Support
    4
    Poor Usability
    3
    UX Improvement
    3
    Lack of Mobile Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • B1 Platform by CloudCover features and usability ratings that predict user satisfaction
    8.5
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Minneapolis, US
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A network security platform, years in the making, leveraging mathematics to continuously learn, predict, and defend against attacks.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
B1 Platform by CloudCover Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Network Security
7
Ease of Use
6
Reliability
5
Risk Management
5
Cons
Not User-Friendly
4
Poor Customer Support
4
Poor Usability
3
UX Improvement
3
Lack of Mobile Support
2
B1 Platform by CloudCover features and usability ratings that predict user satisfaction
8.5
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
8.3
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Year Founded
2007
HQ Location
Minneapolis, US
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(117)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Customer Support
    17
    Setup Ease
    15
    Deployment Ease
    13
    Easy Setup
    12
    Cons
    Limited Customization
    7
    Expensive
    4
    Lack of Customization
    4
    Limited Reporting
    4
    Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    6.7
    Metadata Enrichment
    Average: 8.5
    9.5
    Quality of Support
    Average: 8.8
    8.9
    Multi-Network Monitoring
    Average: 8.4
    7.9
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira provides the only cybersecurity platform that can help SMBs prevent a breach. We help lean IT teams protect their organizations against ransomware and breaches with an open SIEM+XDR platfor

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Customer Support
17
Setup Ease
15
Deployment Ease
13
Easy Setup
12
Cons
Limited Customization
7
Expensive
4
Lack of Customization
4
Limited Reporting
4
Alert System
3
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
6.7
Metadata Enrichment
Average: 8.5
9.5
Quality of Support
Average: 8.8
8.9
Multi-Network Monitoring
Average: 8.4
7.9
Network Visibility
Average: 8.7
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vectra AI is the leader in hybrid attack detection, investigation and response. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a sin

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vectra AI Platform features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    8.1
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vectra AI
    Year Founded
    2011
    HQ Location
    San Jose, CA
    Twitter
    @Vectra_AI
    3,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    644 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vectra AI is the leader in hybrid attack detection, investigation and response. The Vectra AI Platform delivers integrated signal across public cloud, SaaS, identity, and data center networks in a sin

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 17% Mid-Market
Vectra AI Platform features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
8.1
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Seller
Vectra AI
Year Founded
2011
HQ Location
San Jose, CA
Twitter
@Vectra_AI
3,227 Twitter followers
LinkedIn® Page
www.linkedin.com
644 employees on LinkedIn®
(26)4.5 out of 5
8th Easiest To Use in Network Detection and Response (NDR) software
Save to My Lists
Entry Level Price:Starting at $595.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
    5.8
    Metadata Enrichment
    Average: 8.5
    7.3
    Quality of Support
    Average: 8.8
    6.7
    Multi-Network Monitoring
    Average: 8.4
    5.8
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 38% Mid-Market
ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
5.8
Metadata Enrichment
Average: 8.5
7.3
Quality of Support
Average: 8.8
6.7
Multi-Network Monitoring
Average: 8.4
5.8
Network Visibility
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green inf

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flowmon Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Analysis
    6
    Network Security
    5
    Monitoring
    4
    Real-time Monitoring
    4
    Cons
    Expensive
    3
    Complex Configuration
    2
    Complexity
    2
    Cost
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flowmon Platform features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    8.8
    Quality of Support
    Average: 8.8
    7.8
    Multi-Network Monitoring
    Average: 8.4
    7.5
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1981
    HQ Location
    Burlington, MA.
    Twitter
    @ProgressSW
    49,683 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,691 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Flowmon is a professional NPMD tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green inf

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 24% Enterprise
Flowmon Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Analysis
6
Network Security
5
Monitoring
4
Real-time Monitoring
4
Cons
Expensive
3
Complex Configuration
2
Complexity
2
Cost
2
Difficult Learning
2
Flowmon Platform features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
8.8
Quality of Support
Average: 8.8
7.8
Multi-Network Monitoring
Average: 8.4
7.5
Network Visibility
Average: 8.7
Seller Details
Company Website
Year Founded
1981
HQ Location
Burlington, MA.
Twitter
@ProgressSW
49,683 Twitter followers
LinkedIn® Page
www.linkedin.com
3,691 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetWitness Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetWitness Platform features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    7.4
    Quality of Support
    Average: 8.8
    6.7
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Bedford, MA
    Twitter
    @Netwitness
    1,639 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
NetWitness Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation
1
Threat Detection
1
Cons
Integration Issues
1
NetWitness Platform features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
7.4
Quality of Support
Average: 8.8
6.7
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Year Founded
1997
HQ Location
Bedford, MA
Twitter
@Netwitness
1,639 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Hawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Ease of Use
    2
    Monitoring
    2
    Threat Detection
    2
    Cloud Security
    1
    Cons
    Expensive
    2
    Pricing Issues
    2
    Slow Performance
    2
    High Resource Usage
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Hawk features and usability ratings that predict user satisfaction
    9.0
    Metadata Enrichment
    Average: 8.5
    7.9
    Quality of Support
    Average: 8.8
    8.7
    Multi-Network Monitoring
    Average: 8.4
    9.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cyber Hawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Ease of Use
2
Monitoring
2
Threat Detection
2
Cloud Security
1
Cons
Expensive
2
Pricing Issues
2
Slow Performance
2
High Resource Usage
1
Network Issues
1
Cyber Hawk features and usability ratings that predict user satisfaction
9.0
Metadata Enrichment
Average: 8.5
7.9
Quality of Support
Average: 8.8
8.7
Multi-Network Monitoring
Average: 8.4
9.3
Network Visibility
Average: 8.7
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LMNTRIX features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    9.6
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LMNTRIX
    Year Founded
    2015
    HQ Location
    Orange, California
    Twitter
    @lmntrixlabs
    76 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we c

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Enterprise
LMNTRIX features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
9.6
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Seller
LMNTRIX
Year Founded
2015
HQ Location
Orange, California
Twitter
@lmntrixlabs
76 Twitter followers
LinkedIn® Page
www.linkedin.com
56 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A proficient cybersecurity operation requires a fast, precise response. Lumu lets you measure compromise in real time and automate the mitigation and remediation of confirmed compromise incidents.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lumu features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    10.0
    Quality of Support
    Average: 8.8
    8.9
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A proficient cybersecurity operation requires a fast, precise response. Lumu lets you measure compromise in real time and automate the mitigation and remediation of confirmed compromise incidents.

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Mid-Market
Lumu features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
10.0
Quality of Support
Average: 8.8
8.9
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We believe genuinely effective cybersecurity is based on a holistic cybersecurity strategy. To enable this, a single platform is essential—a fully integrated platform out-of-the-box. That platform mus

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sensato Nightingale features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    7.8
    Multi-Network Monitoring
    Average: 8.4
    7.2
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1991
    HQ Location
    Marlborough, US
    LinkedIn® Page
    www.linkedin.com
    190 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We believe genuinely effective cybersecurity is based on a holistic cybersecurity strategy. To enable this, a single platform is essential—a fully integrated platform out-of-the-box. That platform mus

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
Sensato Nightingale features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
7.8
Multi-Network Monitoring
Average: 8.4
7.2
Network Visibility
Average: 8.7
Seller Details
Year Founded
1991
HQ Location
Marlborough, US
LinkedIn® Page
www.linkedin.com
190 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WatchTower Security Management App monitors network and quickly mitigate security threats on the go with mobile phone.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchTower Security Management App features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

WatchTower Security Management App monitors network and quickly mitigate security threats on the go with mobile phone.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Small-Business
WatchTower Security Management App features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BluSapphire XDR Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    9
    Easy Integrations
    7
    Customer Support
    6
    Features
    6
    Ease of Use
    5
    Cons
    Difficult Learning
    3
    Learning Curve
    3
    Difficult Navigation
    2
    Pricing Issues
    2
    Communication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BluSapphire XDR Platform features and usability ratings that predict user satisfaction
    9.2
    Metadata Enrichment
    Average: 8.5
    9.0
    Quality of Support
    Average: 8.8
    8.3
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Hyderabad, Telegana
    Twitter
    @BluSapphire_net
    124 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BluSapphire is a comprehensive cyber defense platform crafted meticulously from the ground up by BluSapphire Labs. Each aspect of our platform embodies innovation without reliance on third-party tools

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
BluSapphire XDR Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
9
Easy Integrations
7
Customer Support
6
Features
6
Ease of Use
5
Cons
Difficult Learning
3
Learning Curve
3
Difficult Navigation
2
Pricing Issues
2
Communication Issues
1
BluSapphire XDR Platform features and usability ratings that predict user satisfaction
9.2
Metadata Enrichment
Average: 8.5
9.0
Quality of Support
Average: 8.8
8.3
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
Hyderabad, Telegana
Twitter
@BluSapphire_net
124 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Open XDR Security Operations Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    AI Automation
    1
    AI Technology
    1
    Continuous Monitoring
    1
    Customer Support
    1
    Cybersecurity
    1
    Cons
    Expertise Required
    1
    Implementation Challenges
    1
    Integration Issues
    1
    Time-Consuming
    1
    Time Consumption
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    133 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Stellar Cyber Open XDR platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill to successfully secure their environments. With Stellar Cyb

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Open XDR Security Operations Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
AI Automation
1
AI Technology
1
Continuous Monitoring
1
Customer Support
1
Cybersecurity
1
Cons
Expertise Required
1
Implementation Challenges
1
Integration Issues
1
Time-Consuming
1
Time Consumption
1
Open XDR Security Operations Platform features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
10.0
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
133 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Secureworks Taegis XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    2
    Alerting
    1
    Alerts
    1
    Customer Support
    1
    Easy Integrations
    1
    Cons
    Expensive
    1
    False Positives
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis XDR features and usability ratings that predict user satisfaction
    7.5
    Metadata Enrichment
    Average: 8.5
    10.0
    Quality of Support
    Average: 8.8
    6.7
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Secureworks Taegis XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
2
Alerting
1
Alerts
1
Customer Support
1
Easy Integrations
1
Cons
Expensive
1
False Positives
1
UX Improvement
1
Secureworks Taegis XDR features and usability ratings that predict user satisfaction
7.5
Metadata Enrichment
Average: 8.5
10.0
Quality of Support
Average: 8.8
6.7
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatWarrior is a leader in cloud-native network detection and response, helping organizations see, learn about, and act to stop cyber threats before they cause damage. The cyber defense platform del

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatWarrior Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    1
    Cons
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatWarrior features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.7
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin
    Twitter
    @ThreatWarrior
    79 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatWarrior is a leader in cloud-native network detection and response, helping organizations see, learn about, and act to stop cyber threats before they cause damage. The cyber defense platform del

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
ThreatWarrior Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
1
Cons
Update Issues
1
ThreatWarrior features and usability ratings that predict user satisfaction
0.0
No information available
8.7
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Austin
Twitter
@ThreatWarrior
79 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Delta AI NDR is the Next Generation Hybrid NDR Solution, Designed to Monitor, Detect and Mitigate risks in network infrastructure. Delta Detection System combined different methodologies of detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Delta Threat features and usability ratings that predict user satisfaction
    8.3
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Multi-Network Monitoring
    Average: 8.4
    7.5
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Milan, IT
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Delta AI NDR is the Next Generation Hybrid NDR Solution, Designed to Monitor, Detect and Mitigate risks in network infrastructure. Delta Detection System combined different methodologies of detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Delta Threat features and usability ratings that predict user satisfaction
8.3
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
8.3
Multi-Network Monitoring
Average: 8.4
7.5
Network Visibility
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Milan, IT
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gradient Cyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Continuous Monitoring
    1
    Customer Support
    1
    Customization
    1
    Dashboard Customization
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gradient Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Southlake, Texas
    Twitter
    @GradientCyber
    122 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

​Gradient Cyber’s Managed Extended Detection and Response (MXDR) service offers mid-market organizations comprehensive, 24/7/365 protection across their entire IT environment, including networks, endp

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Gradient Cyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Continuous Monitoring
1
Customer Support
1
Customization
1
Dashboard Customization
1
Cons
This product has not yet received any negative sentiments.
Gradient Cyber features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Southlake, Texas
Twitter
@GradientCyber
122 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Security
    1
    Threat Detection
    1
    Vulnerability Detection
    1
    Cons
    Limited Features
    2
    Asset Management
    1
    Complexity
    1
    Limited Detection
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable OT Security features and usability ratings that predict user satisfaction
    4.2
    Metadata Enrichment
    Average: 8.5
    5.8
    Quality of Support
    Average: 8.8
    5.8
    Multi-Network Monitoring
    Average: 8.4
    5.8
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tenable OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Security
1
Threat Detection
1
Vulnerability Detection
1
Cons
Limited Features
2
Asset Management
1
Complexity
1
Limited Detection
1
Missing Features
1
Tenable OT Security features and usability ratings that predict user satisfaction
4.2
Metadata Enrichment
Average: 8.5
5.8
Quality of Support
Average: 8.8
5.8
Multi-Network Monitoring
Average: 8.4
5.8
Network Visibility
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatBook TDP features and usability ratings that predict user satisfaction
    9.2
    Metadata Enrichment
    Average: 8.5
    9.2
    Quality of Support
    Average: 8.8
    9.2
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Hong Kong, HK
    Twitter
    @ThreatBookLabs
    3,890 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatBook TDP features and usability ratings that predict user satisfaction
9.2
Metadata Enrichment
Average: 8.5
9.2
Quality of Support
Average: 8.8
9.2
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Hong Kong, HK
Twitter
@ThreatBookLabs
3,890 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ARIA SDS Packet Intelligence (PI) application provides complete visibility into internal network traffic, including east-west data flows.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARIA SDS Packet Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Lowell, MA
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ARIA SDS Packet Intelligence (PI) application provides complete visibility into internal network traffic, including east-west data flows.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ARIA SDS Packet Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Lowell, MA
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cyber_reveal features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    9.2
    Quality of Support
    Average: 8.8
    0.0
    No information available
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Falls Church, US
    Twitter
    @BAES_Careers
    1,915 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,960 employees on LinkedIn®
    Ownership
    LON: BA
Product Description
How are these determined?Information
This description is provided by the seller.

CyberReveal, a suite of products for enhancing cyber security operations and protecting your business in the connected world.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
cyber_reveal features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
9.2
Quality of Support
Average: 8.8
0.0
No information available
10.0
Network Visibility
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Falls Church, US
Twitter
@BAES_Careers
1,915 Twitter followers
LinkedIn® Page
www.linkedin.com
15,960 employees on LinkedIn®
Ownership
LON: BA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynamics is the only Next Generation (NG) Network Detection and Response (NDR) solution in the market today using standard sampling protocols built-in to every gateway, patented algorithms, as well as

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynamics features and usability ratings that predict user satisfaction
    6.7
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    6.7
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynamics
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Cynamics is the only Next Generation (NG) Network Detection and Response (NDR) solution in the market today using standard sampling protocols built-in to every gateway, patented algorithms, as well as

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Cynamics features and usability ratings that predict user satisfaction
6.7
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
6.7
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
Seller
Cynamics
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bricata is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and thr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NDR by Bricata features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bricata
    Year Founded
    2014
    HQ Location
    Columbia, US
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bricata is leading the next generation of advanced network detection and response for the enterprise. By fusing real-time visibility, advanced detection, analysis, forensics, incident response and thr

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
NDR by Bricata features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Bricata
Year Founded
2014
HQ Location
Columbia, US
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    COSGrid NetShield is an advanced Network Detect and Response (NDR) solution that utilizes big data and machine learning technologies. It offers both real-time and historical visibility into network ac

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetShield features and usability ratings that predict user satisfaction
    6.7
    Metadata Enrichment
    Average: 8.5
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Multi-Network Monitoring
    Average: 8.4
    8.3
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Chennai
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

COSGrid NetShield is an advanced Network Detect and Response (NDR) solution that utilizes big data and machine learning technologies. It offers both real-time and historical visibility into network ac

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
NetShield features and usability ratings that predict user satisfaction
6.7
Metadata Enrichment
Average: 8.5
8.3
Quality of Support
Average: 8.8
8.3
Multi-Network Monitoring
Average: 8.4
8.3
Network Visibility
Average: 8.7
Seller Details
HQ Location
Chennai
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Command is a center control product of Sangfor security solution that is called the brain of Sangfor security operation matrix. It is able to efficiently coordinate our existing Sangfor firewall

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sangfor Cyber Command features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    Shenzhen, China
    Twitter
    @SANGFOR
    13,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Command is a center control product of Sangfor security solution that is called the brain of Sangfor security operation matrix. It is able to efficiently coordinate our existing Sangfor firewall

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Sangfor Cyber Command features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
Shenzhen, China
Twitter
@SANGFOR
13,378 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecBI is a leading provider of Universal XDR (Extended Detection and Response) solutions that allow organizations to transform traditionally siloed security functions into a unified, automated, and hi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecBI XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Implementation
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecBI XDR features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecBI
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region of Denmark, Denmark
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecBI is a leading provider of Universal XDR (Extended Detection and Response) solutions that allow organizations to transform traditionally siloed security functions into a unified, automated, and hi

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SecBI XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Implementation
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
SecBI XDR features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
10.0
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Seller
SecBI
Year Founded
2001
HQ Location
Copenhagen, Capital Region of Denmark, Denmark
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatDefend features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Fremont, US
    Twitter
    @AttivoNetworks
    3,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ThreatDefend features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Fremont, US
Twitter
@AttivoNetworks
3,702 Twitter followers
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zeek transforms network traffic into compact, high-fidelity transaction logs, allowing defenders to understand activity, detect attacks, and respond to them.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zeek features and usability ratings that predict user satisfaction
    10.0
    Metadata Enrichment
    Average: 8.5
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Multi-Network Monitoring
    Average: 8.4
    10.0
    Network Visibility
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Corelight
    Year Founded
    2013
    HQ Location
    San Francisco, CA
    Twitter
    @corelight_inc
    4,205 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    344 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zeek transforms network traffic into compact, high-fidelity transaction logs, allowing defenders to understand activity, detect attacks, and respond to them.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Zeek features and usability ratings that predict user satisfaction
10.0
Metadata Enrichment
Average: 8.5
10.0
Quality of Support
Average: 8.8
10.0
Multi-Network Monitoring
Average: 8.4
10.0
Network Visibility
Average: 8.7
Seller Details
Seller
Corelight
Year Founded
2013
HQ Location
San Francisco, CA
Twitter
@corelight_inc
4,205 Twitter followers
LinkedIn® Page
www.linkedin.com
344 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CDS technology analyzes in real time all communications between machines in your network. CDS offers comprehensive security coverage to defend organizations against the cyber threats of new generation

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Compromise Detection System features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Montreal, CA
    Twitter
    @StreamScan
    102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CDS technology analyzes in real time all communications between machines in your network. CDS offers comprehensive security coverage to defend organizations against the cyber threats of new generation

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Compromise Detection System features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
Montreal, CA
Twitter
@StreamScan
102 Twitter followers
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cryptomage Cyber Eye™ Network Detection and Response class probe is much more than a traffic flow analytics tool. It provides real-time, network-based anomaly detection and prediction and a unique app

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cryptomage Cyber Eye features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Wrocław, Poland
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Cryptomage Cyber Eye™ Network Detection and Response class probe is much more than a traffic flow analytics tool. It provides real-time, network-based anomaly detection and prediction and a unique app

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cryptomage Cyber Eye features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Wrocław, Poland
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberMist is the only multi-entity threat detection and response platform purpose-built to detect and stops threats across the entire attack surface of your enterprise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberMist features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    MistNet
    HQ Location
    Mountain View, CA
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyberMist is the only multi-entity threat detection and response platform purpose-built to detect and stops threats across the entire attack surface of your enterprise.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
CyberMist features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
MistNet
HQ Location
Mountain View, CA
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ElastiFlow is a network performance and security analytics solutions that gives enterprises an open data network observability solution designed for maximum explorability and discovery. Together, the

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ElastiFlow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Oakland, US
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ElastiFlow is a network performance and security analytics solutions that gives enterprises an open data network observability solution designed for maximum explorability and discovery. Together, the

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ElastiFlow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Oakland, US
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exeon Analytics AG is a Swiss cyber tech company specialising in the protection of IT and OT networks through AI-driven security analytics. The Network Detection & Response (NDR) platform "ExeonTr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ExeonTrace features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Exeon Analytics AG is a Swiss cyber tech company specialising in the protection of IT and OT networks through AI-driven security analytics. The Network Detection & Response (NDR) platform "ExeonTr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ExeonTrace features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fidelis Elevate, an active XDR platform, is a proactive cybersecurity platform which automates defense operations across diverse network architectures. It seamlessly extends security controls from tra

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fidelis Elevate features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Bethesda, MD
    Twitter
    @FidelisCyber
    2,246 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fidelis Elevate, an active XDR platform, is a proactive cybersecurity platform which automates defense operations across diverse network architectures. It seamlessly extends security controls from tra

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Fidelis Elevate features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Bethesda, MD
Twitter
@FidelisCyber
2,246 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fidelis Network is a comprehensive NDR solution that offers proactive defense against network threats in on-premises and cloud environments. It provides deep visibility into network traffic, including

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fidelis Network features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Bethesda, MD
    Twitter
    @FidelisCyber
    2,246 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fidelis Network is a comprehensive NDR solution that offers proactive defense against network threats in on-premises and cloud environments. It provides deep visibility into network traffic, including

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fidelis Network features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Bethesda, MD
Twitter
@FidelisCyber
2,246 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    7.7
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
7.7
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2002
    HQ Location
    San Diego, CA
    Twitter
    @GoSecure_Inc
    2,780 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    102 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

While GoSecure Professional Security Services focuses on finding the problems, GoSecure Titan® Managed Security Services make sure to solve them – making GoSecure your ally to consolidate, evolve &

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
GoSecure Titan Managed Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2002
HQ Location
San Diego, CA
Twitter
@GoSecure_Inc
2,780 Twitter followers
LinkedIn® Page
www.linkedin.com
102 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With today’s ever-expanding attack surface, visibility and speed are critical to protecting your organization’s most valuable data. Shield OnPremise is a physical appliance that sits behind your firew

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intrusion Shield OnPremise features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intrusion
    Year Founded
    1983
    HQ Location
    Plano, TX
    Twitter
    @IntrusionShield
    17,123 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
    Ownership
    NASDAQ: INTZ
Product Description
How are these determined?Information
This description is provided by the seller.

With today’s ever-expanding attack surface, visibility and speed are critical to protecting your organization’s most valuable data. Shield OnPremise is a physical appliance that sits behind your firew

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Intrusion Shield OnPremise features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Intrusion
Year Founded
1983
HQ Location
Plano, TX
Twitter
@IntrusionShield
17,123 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
Ownership
NASDAQ: INTZ
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IronWifi features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IronPlane
    Twitter
    @ironplane
    499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IronWifi features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IronPlane
Twitter
@ironplane
499 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Jizô is a network observability platform that enables decision-makers to anticipate, identify and block cyber-attacks, thanks to unique and innovative AI. Jizô has proved to be highly effective on a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Jizô features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sesame it
    Year Founded
    2017
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Jizô is a network observability platform that enables decision-makers to anticipate, identify and block cyber-attacks, thanks to unique and innovative AI. Jizô has proved to be highly effective on a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Jizô features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sesame it
Year Founded
2017
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(1)5.0 out of 5
View top Consulting Services for MixMode
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MixMode is a cybersecurity anomaly detection platform that combines the functionality of SIEM, NDR, NTA and UEBA in a single purpose built platform for the modern SOC. MixMode is focused on solving th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MixMode features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    MixMode
    Twitter
    @MixModeAI
    3,489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MixMode is a cybersecurity anomaly detection platform that combines the functionality of SIEM, NDR, NTA and UEBA in a single purpose built platform for the modern SOC. MixMode is focused on solving th

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
MixMode features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
MixMode
Twitter
@MixModeAI
3,489 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netography Fusion delivers a holistic view of all network activity across your multi-cloud or hybrid network, in real-time and at scale. It detects malicious and anomalous activity, such as lateral m

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netography Fusion features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Annapolis, US
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netography Fusion delivers a holistic view of all network activity across your multi-cloud or hybrid network, in real-time and at scale. It detects malicious and anomalous activity, such as lateral m

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Netography Fusion features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Annapolis, US
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NETSCOUT Network Security Solution Suite, known as Omnis Security, is a high-performance threat detection and response platform engineered for the scale and complexity of modern enterprise networks. B

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NETSCOUT Network Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NETSCOUT
    Company Website
    Year Founded
    1984
    HQ Location
    Westford, Mass.
    Twitter
    @NETSCOUT
    13,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,717 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NETSCOUT Network Security Solution Suite, known as Omnis Security, is a high-performance threat detection and response platform engineered for the scale and complexity of modern enterprise networks. B

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NETSCOUT Network Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
NETSCOUT
Company Website
Year Founded
1984
HQ Location
Westford, Mass.
Twitter
@NETSCOUT
13,914 Twitter followers
LinkedIn® Page
www.linkedin.com
2,717 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NextRay AI provides a comprehensive Network Detection & Response solution (NextRay NDR) to help enterprises detect and respond to cyberattacks across cloud, PaaS, SaaS, data center, email, endpoin

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NextRay NDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NextRay AI provides a comprehensive Network Detection & Response solution (NextRay NDR) to help enterprises detect and respond to cyberattacks across cloud, PaaS, SaaS, data center, email, endpoin

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NextRay NDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Businesses currently rely on multiple tools and consoles to correlate events, and to detect a range of threats and attacks. NovaCommand changes that by providing a unified command center that works wi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NovaCommand features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Amsterdam, Netherlands
    Twitter
    @forenovasec
    597 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Businesses currently rely on multiple tools and consoles to correlate events, and to detect a range of threats and attacks. NovaCommand changes that by providing a unified command center that works wi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NovaCommand features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Amsterdam, Netherlands
Twitter
@forenovasec
597 Twitter followers
LinkedIn® Page
www.linkedin.com
(1)5.0 out of 5
View top Consulting Services for Nozomi Networks Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Nozomi Networks Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Detection
    1
    Detection Efficiency
    1
    Features
    1
    Threat Detection
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nozomi Networks Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @nozominetworks
    4,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Nozomi Networks Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Detection
1
Detection Efficiency
1
Features
1
Threat Detection
1
Cons
Expensive
1
Nozomi Networks Platform features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Twitter
@nozominetworks
4,154 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos NDR works together with your managed endpoints and firewalls to monitor network activity for suspicious and malicious patterns they cannot see. It detects abnormal traffic flows from unmanaged

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos NDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos NDR works together with your managed endpoints and firewalls to monitor network activity for suspicious and malicious patterns they cannot see. It detects abnormal traffic flows from unmanaged

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sophos NDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Palo Alto Networks Strata™ Cloud Manager is the industry’s first AI-powered unified management and operations solution. It transforms network security by unifying the management of all network securit

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strata Cloud Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Palo Alto Networks Strata™ Cloud Manager is the industry’s first AI-powered unified management and operations solution. It transforms network security by unifying the management of all network securit

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Strata Cloud Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Illusive Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    New York, US
    Twitter
    @illusivenw
    3,886 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

lllusive continuously discovers and automatically remediates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identit

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
The Illusive Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
New York, US
Twitter
@illusivenw
3,886 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    XTEND is a developer of AI-assisted tactical Unmanned Aerial Systems (UAS) designed to enhance military operations by enabling remote operators to perform complex missions safely and effectively. Thei

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • XTEND features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    XTEND
    Year Founded
    2018
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    129 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

XTEND is a developer of AI-assisted tactical Unmanned Aerial Systems (UAS) designed to enhance military operations by enabling remote operators to perform complex missions safely and effectively. Thei

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
XTEND features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
XTEND
Year Founded
2018
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
129 employees on LinkedIn®

Learn More About Network Detection and Response (NDR) Software

What is Network Detection and Response (NDR) Software?

Network detection and response (NDR) software documents a company’s network activity while automating threat remediation and reporting cyber threats to IT and security teams. NDR enables an organization to consolidate IT security services into one solution and simplifies network protection.

NDR is critical because it provides an end-to-end view of network activity. For example, certain malicious activity may not be reflected in network logs but will be visible by network tools as soon as they interact with systems throughout the network. 

Since NDR software uses artificial intelligence (AI) and machine learning (ML) to analyze network traffic, it is highly adept at detecting malicious behavior as well as reporting and remediating such activity in real time. 

What are the Common Features of Network Detection and Response (NDR) System?

NDR system usually includes the following:

AI and ML: NDR uses AI and ML in its software solution. IT and security professionals can use the data to develop streamlined discovery and response workflows across an organization’s network.

Automated threat detection: When traffic behavior deviates from normal functionality, an NDR solution detects the issue and automatically assists in an investigation. NDR software includes or integrates with other solutions that automate incident response processes to minimize the threat’s impact.

What are the Benefits of Network Detection and Response (NDR)  Software?

There are several benefits to using NDR software.

Automatically detects anomalies: NDR software automatically detects anomalies in network traffic by applying non-signature-based detection techniques and using behavioral analytics, AI, and ML.

Monitors all traffic flows: NDR solutions monitor all traffic entering or exiting the network so there is visibility to identify and mitigate security incidents, regardless of where a threat comes from. Giving this end-to-end view of the network offers IT and security teams greater visibility across the network to mitigate traffic threats.

Analyzes network in real time: NDR analyzes an organization’s network for threats in real time or near real time. It provides timely alerts for IT and security teams, improving incident response times.

Narrows down incident response: NDR solutions attribute malicious behavior to specific IP addresses and perform forensic analyses through AI and ML to determine how threats have moved across a network environment. This leads to faster, more efficient incident response. 

Who Uses Network Detection and Response (NDR) Software?

Network IT and cybersecurity staff: These workers use NDR software to observe network traffic and detect anomalies related to user behavior.

Industries: Organizations in all industries, especially technology or highly sensitive data-oriented sectors like financial services, seek NDR solutions to help protect their networks.

What Are Alternatives to Network Detection and Response (NDR) Software?

Network traffic analysis (NTA) software and endpoint detection response (EDR) software are alternatives to NDR software.

Network traffic analysis (NTA) software: NTA software is similar to NDR tools in that it monitors network traffic and looks for suspicious activity while providing real-time analysis and alerting IT administrators. The main difference is that it also analyzes network performance and pinpoints reasons for slow downloads. 

Endpoint detection & response (EDR) software: EDR tools are similar to NDR solutions, focusing on network activity. It detects, investigates, and removes malicious software penetrating a network’s devices. These tools give greater visibility of a system’s overall health, including each specific device’s state. Companies use these tools to mitigate endpoint penetrations quickly and prevent data loss, theft, or system failures. 

Challenges with Network Detection and Response (NDR) Software

There are some challenges IT teams can encounter with NDR software.

Sophisticated hackers: With high volumes of data traveling across an organization’s network, hackers create more sophisticated threats that can hide their tracks and avoid detection by blending in with traffic patterns. Attackers can also make threats move in small and infrequent batches to avoid detection.

Budget constraints: As hackers become more sophisticated, organizations must keep their NDR solutions up-to-date to keep up with the latest threats. Budget constraints could prevent IT and security teams from doing so.

How to Buy Network Detection and Response (NDR) Software

Requirements Gathering (RFI/RFP) for Network Detection and Response (NDR) Software 

If an organization is just starting and looking to purchase NDR software, G2 can help.

The manual work necessary in security and compliance causes multiple pain points. If the company is large and has a lot of networks, data, or devices in its organization, it may need to shop for scalable NDR  solutions. Users should think about the pain points in their security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use this software and if they currently have the skills to administer it. 

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The list is a detailed guide that includes necessary and nice-to-have features, including budget features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the deployment scope, producing an RFI, a one-page list with bullet points describing what is needed from NDR software, might be helpful.

Compare Network Detection and Response (NDR) Software Products

Create a long list

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

Create a short list

From the long list of vendors, it is helpful to narrow the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list, businesses can produce a matrix to compare the features and pricing of the various solutions.

Conduct demos

To ensure a comprehensive comparison, the user should demo each solution on the short list with the same use cases. This allows the business to evaluate like for like and see how each vendor stacks up against the competition. 

Selection of Network Detection and Response (NDR) Software

Choose a selection team

Before getting started, creating a winning team that will work together throughout the process, from identifying pain points to implementation, is crucial. The selection team should include organization members with the right interests, skills, and participation time. 

A good starting point is to aim for three to five people who fill roles such as the primary decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. The vendor selection team in smaller companies may have fewer participants who will multitask and take on more responsibilities.

Compare notes

The selection team should compare notes, facts, and figures noted during the process, such as costs, security capabilities, and alert and incident response times.

Negotiation

Just because something is written on a company’s pricing page does not mean it's final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

Final decision

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and received, the buyer can be confident that the selection was correct. If not, it might be time to return to the drawing board.

What Does Network Detection and Response (NDR) Software Cost?

NDR software is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization's specific requirements. Once NDR software is purchased, deployed, and integrated into an organization’s security system, the cost could be high, so the evaluation stage of selecting the right tool is crucial. 

The chosen NDR vendor should continue to provide support for the platform with flexibility and open integration. Pricing can be pay-as-you-go, and costs may also vary depending on whether unified threat management is self-managed or fully managed.

Return on Investment (ROI)

As organizations consider recouping the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency. In the long run, the investment must be worth preventing downtime, loss of revenue, and any reputation damage that a security breach would cause.