Alternatives to ArcSight Recon

Compare ArcSight Recon alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ArcSight Recon in 2024. Compare features, ratings, user reviews, pricing, and more from ArcSight Recon competitors and alternatives in order to make an informed decision for your business.

  • 1
    Blumira

    Blumira

    Blumira

    Blumira’s mission is to help SMBs and mid-market companies detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira’s all-in-one SIEM+XDR platform combines logging with automated detection and response for better security outcomes and consolidated security spend. - Flexibility of an open XDR: Open platform integrates with multiple vendors for hybrid coverage of cloud, endpoint, identity, servers and more - Automation accelerates security: Deploy in minutes; stop threats immediately with automated response to isolate devices and block malicious traffic - Satisfy more compliance controls: Get more in one – SIEM w/1 year of data retention, endpoint, automated response & 24/7 SecOps support* - Managed platform saves time: Blumira’s team manages the platform to do threat hunting, data parsing and analysis, correlation and detection at scale
    Leader badge
    Partner badge
    Compare vs. ArcSight Recon View Software
    Visit Website
  • 2
    Critical Start

    Critical Start

    Critical Start

    Our team of highly trained cybersecurity professionals provides expertise in compliance, tool assessments, threat hunting, incident response and more. Critical Start is leading the way in Managed Detection and Response (MDR) services. With a unique approach that treats every security alert as equal, Critical Start's proprietary Trusted Behavior Registry allows security analysts to resolve every alert. Our mission is simple: protect our customers’ brand while reducing their risk. We do this for organizations of all sizes through our award-winning portfolio, from the delivery of managed security services to security-readiness assessments using our proven framework, the Defendable Network, professional services, and product fulfillment. TEAMARES, a specialized group within Critical Start, that focuses on understanding your environment more deeply, assess how today’s attacks can impact your organization and better defend your environment.
  • 3
    Traceable

    Traceable

    Traceable

    Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.
  • 4
    Rapid7 MDR
    Managed Detection and Response (MDR) Services & Solutions. Multiple advanced detection methods, including proprietary threat intelligence, behavioral analytics, Network Traffic Analysis, and human threat hunts find evil in your environment. Our team will instantly contain user and endpoint threats to cut off the attacker. Detailed findings reports guide you to take additional remediation and mitigation actions tailored to your program. Let our team be a force multiplier for you. Detection and response experts—from your security advisor to the SOC—help you strengthen your defenses, take immediate. Standing up an effective detection and response program isn’t as simple as buying and implementing the latest security products. It requires a dedicated SOC, staffed with highly skilled and specialized security experts, and 24/7 vigilance using the best technology to ensure stealthy attackers have nowhere to hide.
    Starting Price: $17 per asset* per month
  • 5
    NetWitness

    NetWitness

    RSA Security

    NetWitness Platform brings together evolved SIEM and threat defense solutions that deliver unsurpassed visibility, analytics and automated response capabilities. These combined capabilities help security teams work more efficiently and effectively, up-leveling their threat hunting skills and enabling them to investigate and respond to threats faster, across their organization’s entire infrastructure—whether in the cloud, on premises or virtual. Gives security teams the visibility they need to detect sophisticated threats hiding in today’s complex, hybrid IT infrastructures. Analytics, machine learning, and orchestration and automation capabilities make it easier for analysts to prioritize and investigate threats faster. Detects attacks in a fraction of the time of other platforms and connects incidents to expose the full attack scope. NetWitness Platform accelerates threat detection and response by collecting and analyzing data across more capture points.
  • 6
    Assuria ALM-SIEM
    ALM-SIEM ingests industry-leading Threat Intelligence feeds, automatically enriching log and event data with key intelligence from these external watchlists and threat data. ALM-SIEM also enriches the Threat Intelligence data feed with additional user-defined threat content, such as specific client context information, white lists etc, further enhancing threat-hunting services. ALM-SIEM is delivered with comprehensive out-of-the-box security controls, threat use cases, and powerful alerting dashboards. Automated analytics using these built-in controls and threat intelligence feeds provides immediately enhanced security defenses, visibility of security issues and mitigation support. Compliance failures also become evident. ALM-SIEM is delivered with comprehensive alerting and operational dashboards to support threat and audit reporting, security detection and response operations and analyst threat-hunting services.
  • 7
    DNIF

    DNIF

    DNIF

    DNIF provides a high value solution by combining technologies such as the SIEM, UEBA and SOAR into one product at an extremely low total cost of ownership. DNIF's hyper scalable data lake makes it ideal to ingest and store terabytes of data. Detect suspicious activity using statistics and take action before any damage occurs. Orchestrate processes, people and technology initiatives from a single security dashboard. Your SIEM will come built-in with essential dashboards, reports and response workflows. Coverage for threat hunting, compliance, user behavior monitoring and network traffic anomaly. In-depth coverage map with the MITRE ATT&CK and CAPEC framework. Provides comprehensive validation and response workflows for varied threat outbreaks. DNIF has built the fastest real-time data collection, parsing and enrichment technology stack from scratch. While other SIEMs let you scale upwards to 1TB per day – DNIF lets you start at multiple terabytes per day and scale to petabytes a month.
    Starting Price: $84 per month
  • 8
    SecBI XDR
    Your cyber defense is filled with disparate point solutions covering single vectors making easy targets for hackers. But that can end today. Add the glue to connect and integrate your security tools with the SecBI XDR Platform. SecBI XDR applies behavioral analytics on all data sources: security gateways, end points and cloud under a single pane of glass for continuous, automated and smarter threat detection, investigation and response. Work across the network, endpoints and the cloud to head off the stealthy, low & slow cyberattacks with SecBI’s XDR platform. Benefit from rapidly deployed, orchestrated integration of your siloed cyber solutions (mail and web gateways, EDRs, SIEM, SOAR) by responding and blocking the threats faster across a wider range of vectors. Gain full network visibility, automated threat hunting, and multi-source detection uncovering malware such as file-less and BIOS-level viruses.
  • 9
    Elastic Security
    Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, cloud monitoring, and more. Elastic makes it simple to search, visualize, and analyze all of your data — cloud, user, endpoint, network, you name it — in just seconds. Hunt and investigate across years of data made accessible by searchable snapshots. With flexible licensing, leverage information from across your ecosystem, no matter its volume, variety, or age. Avoid damage and loss with environment-wide malware and ransomware prevention. Quickly implement analytics content developed by Elastic and the global security community for protection across MITRE ATT&CK®. Detect complex threats with analyst-driven, cross-index correlation, ML jobs, and technique-based methods. Empower practitioners with an intuitive UI and partner integrations that streamline incident management.
  • 10
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 11
    Bitdefender Advanced Threat Intelligence
    Fueled by the Bitdefender Global Protective Network (GPN), Bitdefender Advanced Threat Intelligence collects data from sensors across the globe. Our Cyber-Threat Intelligence Labs correlate hundreds of thousands of Indicators of Compromise and turn data into actionable, real-time insights. By delivering our top-rated security data and expertise directly to businesses and Security Operations Centers, Advanced Threat Intelligence bolsters security operations success with one of the industry’s broadest and deepest bases of real-time knowledge. Improve threat-hunting and forensic capabilities with contextual, actionable threat indicators on IPs, URLs, domains and files known to harbor malware, phishing, spam, fraud and other threats. Decrease time to value by seamlessly integrating our platform-agnostic Advanced Threat Intelligence services into your security architecture, including SIEM, TIP and SOAR.
  • 12
    Hunters

    Hunters

    Cyber Hunters

    Hunters.AI, the first autonomous threat hunting solution, scales expert threat hunting techniques and finds cyberattacks that bypass existing security solutions. Hunters.AI autonomously cross-correlates events, logs, and static data from every organizational data source and security control telemetry, revealing hidden cyber threats in the modern enterprise, at last. Leverage your existing data to find threats that bypass security controls, on all: cloud, network, endpoints. Hunters.AI synthesizes terabytes of raw organizational data, cohesively analyzing and detecting attacks. Hunt threats at scale. Hunters.AI extracts TTP-based threat signals and cross-correlates them using an AI correlation graph. Hunters’ threat research team continuously streams attack intelligence, enabling Hunters.AI to constantly turn your data into attack knowledge. Respond to findings, not alerts. Hunters.AI provides high fidelity attack detection stories, significantly reducing SOC response times.
  • 13
    Seqrite HawkkHunt
    Stop the most sophisticated hidden threats and adversaries efficiently with unified visibility, and powerful analytics using Seqrite HawkkHunt Endpoint Detection and Response (EDR). Gain complete visibility through robust and real-time intelligence from a single dashboard. Proactive threat hunting process to detect threats, and perform in-depth analysis to block breaches. Simplify alerts, data ingestion, and standardization from a single platform to respond to attacks faster. Get deep visibility and high efficacy, actionable detection to rapidly uncover and contain advanced threats lurking in the environment. Get unparalleled end-to-end visibility through advanced threat hunting mechanisms under one consolidated view across security layers. Intelligent EDR automatically detects lateral movement attacks, zero-day attacks, advanced persistent threats, and living off-the-land attacks.
  • 14
    Integrite

    Integrite

    Technisanct

    Accelerate your intelligence. Processing group data to predict actionable outputs. At Technisanct , We are committed to delivering a boutique of services to ensure pro-active monitoring of security infrastructure and all elements related to it. As a Cyber Security startup we offer wide range of services from penetration testing to litigation assistance. Empowered with a team of Cyber Security professionals who are capable of identifying any kind of threats could occur to an organization. Our team is capable of doing audits on servers, computers, networks, hosted applications etc. Our team is readily capable on any kind of Risks that appear on a cyber platform using manual threat hunting methods as well as automated techniques. Forensic investigation is the first step that enables anyone to get insights of any kind of cyber incidents that would have happened. We enables the latest FTK methods to support any kind of forensic needs.
  • 15
    Securonix NDR

    Securonix NDR

    Securonix

    Advanced threat monitoring combining network traffic, security logs, and entity context. Identify advanced threats that standalone network traffic analysis (NTA) or security information and event management (SIEM) solutions are not able to detect. Reduce false positives by over 90% by prioritizing threats using Securonix threat chains that span across network and security events. Improve efficiency and lower the operational overhead related to training and enablement when you only need to use a single console and database for all events. Advanced cyberattacks are usually slow and low and involve multiple steps. Detecting such threats requires monitoring and correlating indicators of compromise (IOC) across event sources. Securonix Spotter enables blazing-fast threat hunting using natural language search.
  • 16
    LogRhythm NextGen SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 17
    Ingalls MDR

    Ingalls MDR

    Ingalls Information Security

    Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment. We leverage the best of the commercial, open source, and internally-developed tools and methods to provide the highest fidelity of monitoring possible. We have partnered with Cylance to provide the best endpoint threat detection and prevention capability available on the market today, CylancePROTECT(™).
  • 18
    IBM Security QRadar Log Insights
    IBM Security® QRadar® Log Insights can help you gain complete visibility over your exponential and continuously growing digital footprint. Designed to address security observability needs with simple data ingestion, rapid search, and powerful visualization, it's optimized to perform analytics on data with greater efficiency, providing faster insights. Plus, with the AWS built-in designation, you can trust that QRadar Log Insights has been independently verified by AWS to include automated configuration elements across foundational cloud domains. A fast and highly scalable cloud-native log management and security observability solution on AWS. Extract, investigate, and pull data from anywhere. Perform multiple, concurrent searches on large data subsets in seconds. Detect, investigate, and plan action against threats faster with smart, interactive dashboards and analytics. Gain enhanced security insights with comprehensive visibility across data sources and repositories.
    Starting Price: $2.14 per GB per day
  • 19
    Velociraptor

    Velociraptor

    Velociraptor

    At the press of a (few) buttons, perform targeted collection of digital forensic evidence simultaneously across your endpoints, with speed and precision. Continuously collect endpoint events such as event logs, file modifications and process execution. Centrally store events indefinitely for historical review and analysis. Actively search for suspicious activities using our library of forensic artifacts, then customize to your specific threat-hunting needs. It was developed by Digital Forensic and Incident Response (DFIR) professionals who needed a powerful and efficient way to hunt for specific artifacts and monitor activities across fleets of endpoints. Velociraptor provides you with the ability to more effectively respond to a wide range of digital forensic and cyber incident response investigations and data breaches.
  • 20
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 21
    WithSecure Countercept
    Countercept is a threat-driven service designed to be effective in the 'grey area' where legitimate activity masks malicious intent. We respond to incidents in minutes, and resolve most of them within hours. Countercept provides security insights that support continuous security posture improvement. We help you improve your security and meet compliance obligations. We act as an extension of your security team, giving you unmetered access to our experts, sharing our threat hunting expertise, addressing queries and helping your team develop. Organized criminal groups, guns for hire or nation state actors now automate scanning for vulnerable infrastructure. WithSecure’s xDR platform provides excellent visibility of endpoints, users, logs, network infrastructure and cloud platforms. WithSecure’s Detection & Response Team (DRT) investigates and responds security alerts within minutes, before they become costly incidents.
  • 22
    Skylight Interceptor NDR
    The right response for when your network is being targeted. The Skylight Interceptor™ network detection & response solution can help you to shutdown impending threats, unify security & performance, and significantly reduce MTTR. You need to see the threats your perimeter security is missing. Skylight Interceptor provides deep visibility into your traffic. It does this by capturing and correlating metadata from both north-south and east-west. This helps you protect your entire network from zero-day attacks, whether in the cloud, on-prem, or at remote sites. You need a tool that helps simplify the complexity of keeping your organization secure. Gain comprehensive high-quality network traffic data for threat-hunting. Achieve the ability to search for forensic details in seconds. Receive correlation of events into incidents using AI/ML. Review alerts generated on only legitimate cyber threats. Preserve critical response time and valuable SOC resources.
  • 23
    PassiveTotal
    RiskIQ PassiveTotal aggregates data from the whole internet, absorbing intelligence to identify threats and attacker infrastructure, and leverages machine learning to scale threat hunting and response. With PassiveTotal, you get context on who is attacking you, their tools and systems, and indicators of compromise outside the firewall—enterprise and third party. Investigation can go fast, really fast. Find answers quickly with over 4,000 OSINT articles and artifacts. Along with 10+ years of mapping the internet, RiskIQ has the deepest and broadest security intelligence on earth. By absorbing web data like Passive DNS, WHOIS, SSL, hosts and host pairs, cookies, exposed services, ports, components, and code. With curated OSINT and proprietary security intelligence, you can see everything—from every angle—on the digital attack surface. Take charge of your digital presence and combat threats to your organization.
  • 24
    Armor XDR+SOC
    Continuously detect malicious behavior and let Armor's team of experts guide remediation. Manage threats and reverse the damage of exploited weaknesses. Collect logs and telemetry across your enterprise and cloud environments and leverage Armor's robust threat-hunting and alerting library to detect threats. Using open-source, commercial, and proprietary threat intelligence, the Armor platform enriches incoming data to enable smarter, faster determinations of threat levels. When threats are detected, alerts and incidents are created – you can rely on Armor's team of security experts around-the-clock to respond to threats. Armor's platform was built to take advantage of advanced AI and machine learning, as well as cloud-native automation engines to make all aspects of the security lifecycle simpler. Cloud-native detection and response with the support of a 24/7 team of cybersecurity experts. Armor Anywhere is integrated within our XDR+SOC offering with dashboard visibility.
    Starting Price: $4,317 per month
  • 25
    CRYPTOLOG

    CRYPTOLOG

    Crypttech

    One of the major needs of businesses is a convenient log management system that collects logs of the IT systems in the organization and analyzes them to meet legal regulations and industry standards. CRYPTOLOG complies with public & sectoral requirements and offers unified and easy-to-use search, analysis, correlation options that can be customized to the needs and size of the IT systems. CRYPTOLOG makes it easy to identify potential security threats from log data to conduct forensic investigations. CRYPTOLOG is a cost-effective integrated log management system that helps you meet regulatory compliance on the one hand, while reducing your security risks in a variety of IT environments. With its fast and powerful engines, CRYPTOLOG brings together a wide range of log and events to give you a comprehensive view of all your network activities on a customizable panel.
  • 26
    Command Zero

    Command Zero

    Command Zero

    Autonomous & User-led Cyber Investigations. Supercharge expert analysis and threat hunts. Question-based, AI-powered cyber investigations and threat hunting at scale. Consistent, customizable, predictable investigations with auto-reporting and timelines. Industry best practices and the institutional knowledge from leading organizations. For most organizations, manually investigating all escalated cases is an impossible task. Command Zero addresses this bottleneck by providing the necessary expert knowledge, processes, and tools to complement security operations teams. Analysts can review complete investigations, expand on autonomous sequences and conduct bespoke user-led inquiries to achieve expert outcomes.
  • 27
    SECDO

    SECDO

    SECDO

    SECDO is an automated incident response platform for enterprises, MSSPs, and incident response specialists. SECO enables security teams to investigate and respond to incidents faster with the platform's robust set of features that includes automated alert validation, contextual investigation, threat hunting and rapid remediation. Do incident response right with SECDO.
  • 28
    VMware Carbon Black EDR
    Threat hunting and incident response solution delivers continuous visibility in offline, air-gapped and disconnected environments using threat intel and customizable detections. You can’t stop what you can’t see. Investigations that typically take days or weeks can be completed in just minutes. VMware Carbon Black® EDR™ collects and visualizes comprehensive information about endpoint events, giving security professionals unparalleled visibility into their environments. Never hunt the same threat twice. VMware Carbon Black EDR combines custom and cloud-delivered threat intel, automated watchlists and integrations with the rest of your security stack to efficiently scale your hunt across even the largest of enterprises. The days of constantly reimaging are over. An attacker can compromise your environment in an hour or less. VMware Carbon Black EDR gives you the power to respond and remediate in real time from anywhere in the world.
  • 29
    Infocyte

    Infocyte

    Infocyte

    The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations.
  • 30
    Binary Defense

    Binary Defense

    Binary Defense

    To prevent breaches, you need complete cybersecurity protection. It takes a 24×7 security team to monitor, detect and respond to threats. Take the cost and complexity out of cybersecurity by extending your team and expertise. Our Microsoft Sentinel experts get your team deployed, monitoring, and responding faster than ever while our SOC Analysts and Threat Hunters always have your teams back. Guard the weakest points in your network – your laptops, desktops and servers. We provide advanced endpoint protection and system management. Gain comprehensive, enterprise-level security. We deploy, monitor and tune your SIEM with around-the-clock protection from our security analysts. Be proactive with your cybersecurity. We detect and thwart attackers before they strike by hunting for threats where they live. Identify unknown threats and prevent attackers from evading existing security defenses with proactive threat hunting.
  • 31
    EclecticIQ

    EclecticIQ

    EclecticIQ

    EclecticIQ enables intelligence-powered cybersecurity for government organizations and commercial enterprises. We develop analyst-centric products and services that align our clients’ cybersecurity focus with their threat reality. The result is intelligence-led security, improved detection and prevention, and cost-efficient security investments. Our solutions are built specifically for analysts across all intelligence-led security practices such as threat investigation, and threat hunting, as well as incident response efforts. And we tightly integrated our solutions with our customers’ IT security controls and systems. EclecticIQ operates globally with offices in Europe, United Kingdom, and North-America, and via certified value-add partners.
  • 32
    Proficio

    Proficio

    Proficio

    Proficio’s Managed, Detection and Response (MDR) solution surpasses the capabilities of traditional Managed Security Services Providers (MSSPs). Our MDR service is powered by next-generation cybersecurity technology and our security experts partner with you to become an extension of your team, continuously monitoring and investigating threats from our global networks of security operations centers. Proficio’s advanced approach to threat detection leverages an extensive library of security use cases, MITRE ATT&CK® framework, AI-based threat hunting models, business context modeling, and a threat intelligence platform. Through our global network of Security Operations Centers (SOCs), Proficio experts monitor, investigate and triage suspicious events. We significantly reduce the number of false positives and provide actionable alerts with remediation recommendations. Proficio is a leader in Security Orchestration Automation and Response (SOAR).
  • 33
    BlackBerry Optics
    Our cloud-native BlackBerry® Optics provide visibility, on-device threat detection and remediation across your organization. In milliseconds. And our EDR approach effectively and efficiently hunts threats while eliminating response latency. It’s the difference between a minor security event—and one that’s widespread and uncontrolled. Identify security threats and trigger automated responses on-device with AI-driven security and context-driven threat detection rules to reduce detection and remediation time. Gain visibility with consolidated, AI-driven security and an enterprise-wide view of all endpoint activity, empowering detection and response capabilities for online and offline devices. Enable threat hunting and root cause analysis experiences with intuitive query language and up to 365 days of data retention options.
  • 34
    NextRay NDR

    NextRay NDR

    NextRay AI

    NextRay NDR is a Network Detection & Response (NDR) solution that automates incident response, provides comprehensive visibility across North/South & East/West traffic, easily integrated with legacy platforms and other security solutions, offers detailed investigations of your network vulnerabilities, in addition to its advanced threat hunting, swift deployment, real-time correlation across all ports and protocols, and advanced file extraction and analysis. With NextRay NDR, SOC teams can detect and respond to cyberattacks across all network environments with ease.
  • 35
    The Respond Analyst
    Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more.
  • 36
    Falcon Cloud Workload Protection
    Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. Falcon Cloud Workload Protection key integrations support continuous integration/continuous delivery (CI/CD) workflows allowing you to secure workloads at the speed of DevOps without sacrificing performance
  • 37
    Comodo MDR
    Extend monitoring and threat hunting from endpoints to network and cloud. Our security experts service your business remotely. You focus on your business. Our security operations center gives you fully managed solutions for today’s biggest problems facing everyone’s security today. Comodo MDR offers software, platform, technologies and the expert staff to monitor, manage and threat hunt to let you focus on your business goals. Growing numbers of more sophisticated cybersecurity attacks threaten your web applications, cloud infrastructure, networks, and endpoints. Failure to protect these resources will trigger costly penalties once a data breach occurs to your business. Our service provides a team of security researchers who extend your IT team to safeguard your IT systems and infrastructure. Your private security engineer will be your principal contact with your Comodo SOC services.
    Starting Price: $7.50 per user per month
  • 38
    Vectra AI
    Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Vectra is Security that thinks. We have developed an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform.
  • 39
    Heimdal Threat Prevention
    Secure your hybrid workforce, either on-site or remote, with a trailblazing DNS security solution that combines cybercrime intelligence, Machine Learning and AI-based prevention in preventing future threats with stunning accuracy. 91% of online threats leverage DNS. Heimdal’s Threat Prevention identifies emergent and hidden cyber-threats, stops cyberattacks that go undetected by traditional Antivirus and closes off data-leaking venues. With zero interruptions and minimal endpoint footprint. 96% accuracy in predicting future threats through the use of applied neural networks modelling allows you to confidently own your company’s DNS governance setup and hinder all immediate and future cyber-threat scenarios. You stay ahead of the curve, with total confidence. Spot malicious URLs, processes, and backtrack the attacker’s origins with a code-autonomous endpoint DNS threat hunting solution. Empower your team with the perfect tools and gain complete visibility and control.
  • 40
    Axellio

    Axellio

    Axellio

    Axellio® enables organizations to improve their security posture through a comprehensive portfolio of threat detection and response solutions, from the base platform PacketXpress® to vertically integrated, end-to-end solutions combined with consulting and professional services. Our solutions are designed for work-flow efficiency and cost-effectiveness optimized for your people, processes, and technologies. Axellio’s goal is to leverage the security operations resources and tools you already have in place while providing faster access to richer, more contextual data. It enables you to prioritize what matters, for rapid and informed decisions, and for efficient response across your entire threat lifecycle: from threat detection over alert triage and incidence response to threat hunting. Our goal is to work with you to optimize a threat detection and response solution to fit your environment to prevent tool and data overload.
  • 41
    Bitdefender MDR

    Bitdefender MDR

    Bitdefender

    Bitdefender MDR keeps your organization safe with 24/7 security monitoring, advanced attack prevention, detection, and remediation, plus targeted and risk-based threat hunting by a certified team of security experts. We’re always there so you don’t have to be. Bitdefender Managed Detection and Response gives you 24/7 access to an elite team of cybersecurity experts. Our service is also backed by industry-leading, trusted Bitdefender security technologies like the GravityZone® Endpoint Detection and Response Platform. Bitdefender MDR combines cybersecurity for endpoints, networks, and security analytics with the threat-hunting expertise of a fully staffed security operations center (SOC) with security analysts from global intelligence agencies. Stop attacks through pre-approved actions executed by SOC analysts. We work with you during onboarding and at any point afterward, we’ll work with you to define actions we’ll take to rapidly mitigate incidents without impacting your teams.
  • 42
    Google Cloud Logging
    Real-time log management and analysis at scale. Securely store, search, analyze, and alert on all of your log data and events. Ingest custom log data from any source. An exabyte-scale, fully managed service for your application and infrastructure logs. Analyze log data in real time. Supported across Google Cloud services and integrated with Cloud Monitoring, Error Reporting, and Cloud Trace so you can quickly troubleshoot issues across your infrastructure and applications. With sub-second ingestion latency, terabyte per-second ingestion rate, and exabytes of logs stored each month, you can securely store all of your logs from any source in one place with no management overhead. Combine the power of Cloud Logging with BigQuery for advanced analysis and use log-based metrics to build real-time Cloud Monitoring dashboards.
    Starting Price: $0.50 per GiB
  • 43
    R-Scope

    R-Scope

    Reservoir Labs

    R-Scope is a powerful network security sensor for threat hunting and threat detection. Providing network activity in context gives the clearest view of genuine threats, faster. Incident Responders benefit from R-Scope’s balanced output that is 100x richer than competing approaches at a fraction of the storage footprint and cost. R-Scope identifies threats quickly and enables rapid and thorough remediation. R-Scope is available in multiple form factors to meet a variety of enterprise deployment requirements. For traditional data centers, R-Scope is available as a 1U appliance, variably priced according to throughput requirements. Software-only offerings are available for deployments that require more flexibility. Contact Reservoir Labs for cloud deployment. All R-Scope offerings are fully hardened and supported for the most demanding business environments. Support and Services are provided in-house by qualified Reservoir Labs engineers.
  • 44
    SlashNext

    SlashNext

    SlashNext

    SlashNext anti-phishing and IR solutions stop threats across mobile, email, and web—dramatically reducing the risk of data theft, cyber extortion, and breaches. Protect iOS and Android users from mobile-centric phishing threats with a lightweight, cloud-powered agent. Shield employees from live phishing sites with cloud-powered browser extensions for all major desktop browsers. Use live threat intelligence to turn existing network security controls into a real-time, multi-vector phishing defense. Automate phishing incident response and threat hunting with accurate, run-time analysis of suspicious URLs on-demand. Targeted attack to gain access to an individual’s account or impersonate a specific individual. Using deception to manipulate users into divulging confidential information for fraudulent use. HTML, PDF and Microsoft Office attachments used to harvest credentials or download malware.
  • 45
    LogicHub

    LogicHub

    LogicHub

    LogicHub is the only platform that automates threat hunting, alert triage, and incident response. The LogicHub platform is the only one to marry automation with advanced correlation and machine learning. Its unique “whitebox” approach provides a Feedback Loop for analysts to easily tune and improve the system. Leverages machine learning, advanced data science, and deep correlation to threat rank each IOC, alert, or event. A full readable explanation of the scoring logic is provided along with the score, so analysts can rapidly review and validate results. As a result, 95% of false positives can be safely filtered out. Furthermore, new and previously unknown threats are automatically detected in real time, exponentially reducing Mean-Time-to-Detect (MTTD). LogicHub integrates with leading security and infrastructure solutions to provide a holistic ecosystem for threat detection automation.
  • 46
    UTMStack

    UTMStack

    UTMStack

    Complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated with each others and report to a central database. This facilitates daily tasks such as monitoring, investigations and incident response. Active and passive vulnerability scanners for early detection, with of the box reports for compliance audits. Track and manage accounts access and permission changes. Get alerted when suspicious activity happens. Remotely manage your environment and respond to attacks right from your dashboard. Keep track of changes and access to classified information. Protect endpoints and servers with advanced threat protection.
    Starting Price: $25 per device per month
  • 47
    CrowdStrike Container Security
    Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform. Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.
  • 48
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning.
  • 49
    Corelight

    Corelight

    Corelight

    Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.
  • 50
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial processes, vehicle fleets, IT infrastructure, or everything combined. Need to hunt down a suspected access breach? Gravwell can correlate building access logs and run facial recognition machine learning against camera data to isolate multiple subjects entering a facility with a single badge-in. We exist to provide analytics capabilities to people who need more than just text log searching and need it sooner rather than later at a price they can afford.