Introducing G2.ai, the future of software buying.Try now
Kaseya Managed SOC
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Kaseya Managed SOC Alternatives

ThreatDown
(1,039)
4.6 out of 5
ESET PROTECT
(865)
4.6 out of 5

Kaseya Managed SOC Reviews & Product Details

Kaseya Managed SOC Overview

What is Kaseya Managed SOC?

Managed SOC (security operation center) is a white labeled managed service that leverages the our Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint | Network | Cloud.

Kaseya Managed SOC Details
Show LessShow More
Product Description

Managed SOC (security operation center) is a white labeled managed service that leverages the our Threat Monitoring Platform to detect malicious and suspicious activity across three critical attack vectors: Endpoint | Network | Cloud.


Seller

Kaseya

Description

Kaseya® is the leading provider of IT and security management solutions for managed service providers (MSPs) and small to medium sized businesses (SMBs). Through its open platform and customer-centric approach, Kaseya delivers best in breed technologies that allow organizations to efficiently manage, secure, and backup IT. Kaseya IT Complete is the most comprehensive, integrated IT management platform comprised of industry-leading solutions from Kaseya, Unitrends, Rapidfire Tools, Spanning Cloud Apps, IT Glue, ID Agent and Graphus. The platform empowers businesses to: command all of IT centrally; easily manage remote and distributed environments; simplify backup and disaster recovery; safeguard against cybersecurity attacks; effectively manage compliance and network assets; streamline IT documentation, and automate across IT management functions. Headquartered in Dublin, Ireland, Kaseya is privately held with a presence in over 20 countries. To learn more, visit www.kaseya.com.

Recent Kaseya Managed SOC Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Unified IT Security Platform"
To perform ongoing monitoring and management of all the system related logs (endpoint, firewall, office 365, etc.) and daily network incident respo...
Verified User
U
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"Kaseya makes bulk invoicing easy"
Bulk invoicing, solid CRM interface, informative reporting

Kaseya Managed SOC Media

Answer a few questions to help the Kaseya Managed SOC community
Have you used Kaseya Managed SOC before?
Yes

2 Kaseya Managed SOC Reviews

5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Kaseya Managed SOC Reviews
5.0 out of 5
2 Kaseya Managed SOC Reviews
5.0 out of 5

Kaseya Managed SOC Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Kaseya Managed SOC?

To perform ongoing monitoring and management of all the system related logs (endpoint, firewall, office 365, etc.) and daily network incident response. this tool is cost effective. We are also able to manage Defender,

which i believe is a valuable integration. easy to use and easy to support and resolved the users incidents in realtime. we also track and resolved the tickets from here once we believe the issue has been successfully resolved. the implemenation process appars to more time taking but when everything setup and interates properly we are exited to use bcuase throught the one dashboard we are easily managed and supports our users Quickly, effectively and efficiently. The in-depth analysis and comprehensive log views are fantastic! Review collected by and hosted on G2.com.

What do you dislike about Kaseya Managed SOC?

some times it takes time to reload the page while it in the idle position/navigating to different options while accessing the dashboard. Review collected by and hosted on G2.com.

What problems is Kaseya Managed SOC solving and how is that benefiting you?

Reduces the time administrators spend to manually checking for and managing multiple issues,

including ransomware detection, network problems, firewall configurations, bandwidth utilization, and more. Review collected by and hosted on G2.com.

Verified User in Telecommunications
UT
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Kaseya Managed SOC?

Bulk invoicing, solid CRM interface, informative reporting Review collected by and hosted on G2.com.

What do you dislike about Kaseya Managed SOC?

Ticketing system could use some work. You can no longer search by ticket number so it's hard to find one specific ticket if it's old. Review collected by and hosted on G2.com.

What problems is Kaseya Managed SOC solving and how is that benefiting you?

Getting all of our customers in the same system has been very helpful to streamline our contracting process. Review collected by and hosted on G2.com.

There are not enough reviews of Kaseya Managed SOC for G2 to provide buying insight. Below are some alternatives with more reviews:

1
ThreatDown Logo
ThreatDown
4.6
(1,039)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users.
2
ESET PROTECT Logo
ESET PROTECT
4.6
(865)
ESET PROTECT is a cutting-edge cybersecurity platform that leverages the latest in AI, state-of-the-art technologies, and human expertise to safeguard your organization from emerging threats and zero-day attacks. As a cloud-first XDR solution, it integrates unique threat intelligence to deliver next-gen prevention, detection, and proactive threat hunting capabilities. Complementing the platform is a comprehensive suite of services, including managed detection and response (MDR), ensuring robust and continuous protection.
3
Huntress Managed EDR Logo
Huntress Managed EDR
4.9
(749)
The Huntress Managed Security Platform combines automated detection with human threat hunters—providing the software and expertise needed to stop advanced attacks.
4
Sophos MDR Logo
Sophos MDR
4.7
(347)
Sophos provides cloud-native and AI-enhanced solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cybercriminal tactics and techniques, including automated and active-adversary breaches, ransomware, malware, exploits, data exfiltration, phishing, and more.
5
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(297)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
6
ThreatLocker Logo
ThreatLocker
4.8
(284)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
7
Arctic Wolf Logo
Arctic Wolf
4.7
(273)
Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
8
Alert Logic MDR Logo
Alert Logic MDR
4.5
(253)
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
9
Blackpoint Cyber Logo
Blackpoint Cyber
4.8
(237)
Let Blackpoint's managed SOC team monitor your network so you can focus on running your business.
10
eSentire Logo
eSentire
4.7
(219)
eSentire MDR is designed to keep organizations safe from constantly evolving cyberattacks that technology alone cannot prevent.
Show More