Related Products
|
||||||
About
CrowdSec is a free, open-source and collaborative IPS to analyze behaviors, respond to attacks & share signals across the community, outnumbering cybercriminals all together. Set up your own intrusion detection system. Apply behavior scenarios to identify cyber threats. Share and benefit from a crowdsourced and curated cyber threat intelligence system. Define the type of remediation you want to apply and where. Leverage the community’s IP blocklist and automate your security. CrowdSec is designed to run seamlessly on virtual machines, bare-metal servers, containers or to be called directly from your code with our API. Our strength comes from our cybersecurity community that is burning cybercriminals’ anonymity. By sharing IP addresses that aggressed you, you help us curate and redistribute a qualified IP blocklist to protect everyone. CrowdSec is 60x faster than tools like Fail2ban and can parse massive amounts of logs in no time.
|
About
TheHive is a collaborative security case management platform that integrates with security tools such as SIEM, EDR, threat intelligence platforms and more, enabling security teams to manage alerts, conduct investigations and respond to incidents from a single interface.
The platform works in conjunction with Cortex, an open-source engine also developed by StrangeBee to automate observable enrichment and response actions through an extensive library of analyzers and responders.
Today, TheHive boasts 3500+ users worldwide, enabling them to centralize, automate and scale security operations and incident response across multiple teams, environments or clients.
|
About
ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Anyone seeking a cybersecurity solution to respond to attacks and set up an intrusion detection system
|
Audience
SOC, CERT, CSIRT and MSSP teams
|
Audience
Industries looking for a decision and operational support platform to align security to the business and reduce risks
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCrowdSec
Founded: 2020
crowdsec.net
|
Company InformationStrangeBee
Founded: 2012
France
strangebee.com/thehive/
|
Company InformationThreatConnect
Founded: 2011
United States
threatconnect.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
|
||||||
Integrations
Amazon Web Services (AWS)
Archer
Booz Allen MDR
Cybereason
Cybersixgill
Cyral
Docker
Elasticsearch
Fidelis Network
Google Digital Risk Protection
|
Integrations
Amazon Web Services (AWS)
Archer
Booz Allen MDR
Cybereason
Cybersixgill
Cyral
Docker
Elasticsearch
Fidelis Network
Google Digital Risk Protection
|
Integrations
Amazon Web Services (AWS)
Archer
Booz Allen MDR
Cybereason
Cybersixgill
Cyral
Docker
Elasticsearch
Fidelis Network
Google Digital Risk Protection
|
||||
|
|
|
|