Alternatives to TheHive

Compare TheHive alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to TheHive in 2024. Compare features, ratings, user reviews, pricing, and more from TheHive competitors and alternatives in order to make an informed decision for your business.

  • 1
    Resolver

    Resolver

    Resolver

    Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.
    Compare vs. TheHive View Software
    Visit Website
  • 2
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
    Compare vs. TheHive View Software
    Visit Website
  • 3
    Onspring

    Onspring

    Onspring GRC Software

    Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.
    Compare vs. TheHive View Software
    Visit Website
  • 4
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 5
    PagerDuty

    PagerDuty

    PagerDuty

    PagerDuty, Inc. (NYSE:PD) is a leader in digital operations management. In an always-on world, organizations of all sizes trust PagerDuty to help them deliver a perfect digital experience to their customers, every time. Teams use PagerDuty to identify issues and opportunities in real time and bring together the right people to fix problems faster and prevent them in the future. PagerDuty's ecosystem of over 350+ integrations, including Slack, Zoom, ServiceNow, AWS, Microsoft Teams, Salesforce, and more, enable teams to centralize their technology stack, get a holistic view of their operations, and optimize processes within their toolsets.
  • 6
    CoScreen

    CoScreen

    CoScreen

    CoScreen enables multiple team members to share and edit application windows simultaneously on a joint desktop. Collaborate and work together in real-time with 2-10 participants through collaborative screen sharing and high-quality video and audio chat. Share any application window with a single click. Your team members can edit them instantly as if they were their own windows and share their windows with you at the same time. Key features: - Crystal-clear audio and video chat - Multi-user screen sharing of any desktop or browser app with one click - Multi-user editing of shared windows using mouse and keyboard, 2-3x lower latency than Zoom, Slack, and Microsoft Teams - Integrate CoScreen with your favorite apps like Slack, VS Code, IntelliJ, and other JetBrains IDEs - Enterprise-grade compliance and securely encrypted connections Use cases: standups, 1:1s, sprint demos, pair programming, coding interviews, employee onboarding, incident management, and many more...
    Starting Price: Free
  • 7
    Activu

    Activu

    Activu

    Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations and incidents. Our customers automatically see, share, and respond to events in real-time, with context, to improve incident response, decision-making, and management. Activu software, systems, and services benefit the daily lives of billions of people around the world. Founded in 1983 as the first U.S.-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 8
    Cofense Reporter
    Our SaaS-enabled email toolbar button lets your users report suspicious emails with one click, plus standardizes and contains the threat for incident responders. Your SOC gets instant visibility to real email threats, allowing your organization to stop them faster. To date, organizations have lacked an efficient process for gathering, organizing, and analyzing user reports of suspicious emails that may indicate early stages of a cyber attack. Cofense Reporter provides organizations with a simple, cost-effective way to fill this information gap. Cofense Reporter and Cofense Reporter for Mobile empowers users to proactively participate in an organization’s security program. By simplifying the process for employee reporting of suspicious email, Cofense Reporter makes it easy for your employees to report any suspicious email they receive.
  • 9
    Klaxon

    Klaxon

    Klaxon Technologies

    Keep your people safe, informed and productive Communicate effectively within your organization with our major incident, mass notification and planned maintenance solution. Keep your team safe with time-sensitive communication updates Manage major incidents, disasters, business continuity events, cyber incidents and other emergencies with instant notifications, preventing potentially damaging events from escalating. The best tool for efficient and flexible communication in your business Choose Klaxon to improve the way you communicate Multiple notification channels Using our self-service interface, recipients can choose how they receive major incident notifications — through email, SMS, Voice/Telephone, Smartphone App, Microsoft Teams, Skype for Business and more. Two-way communications. Customizable two-way communications across all devices allows recipients to let you know if they've been affected, mark as safe and more. Efficient incident management.
    Starting Price: $0.61 per user, per month
  • 10
    LogicHub

    LogicHub

    LogicHub

    LogicHub is the only platform that automates threat hunting, alert triage, and incident response. The LogicHub platform is the only one to marry automation with advanced correlation and machine learning. Its unique “whitebox” approach provides a Feedback Loop for analysts to easily tune and improve the system. Leverages machine learning, advanced data science, and deep correlation to threat rank each IOC, alert, or event. A full readable explanation of the scoring logic is provided along with the score, so analysts can rapidly review and validate results. As a result, 95% of false positives can be safely filtered out. Furthermore, new and previously unknown threats are automatically detected in real time, exponentially reducing Mean-Time-to-Detect (MTTD). LogicHub integrates with leading security and infrastructure solutions to provide a holistic ecosystem for threat detection automation.
  • 11
    Smart SOAR

    Smart SOAR

    D3 Security Management Systems

    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency. Smart SOAR's Event Pipeline normalizes, de-dupes, enriches and correlates events to remove false positives, giving your team more time to spend on real threats. When a real threat is identified, Smart SOAR brings together alerts and rich contextual data to create high-fidelity incidents that provide analysts with the complete picture of an attack. Clients have seen up to a 90% decrease in mean time to detect (MTTD) and mean time to respond (MTTR), focusing on proactive measures to prevent attacks.
  • 12
    OnSolve

    OnSolve

    OnSolve

    Pinpoint and respond to threats that impact your people, places and property – quickly, accurately and reliably. Every minute counts™. That’s why OnSolve prioritizes speed, relevance and usability to help our customers achieve the best possible outcome when a critical event occurs. Communicate faster to the right people on any device. Quickly activate crisis response plans and collaborate in real time. Filter out irrelevant data to make informed, proactive decisions. Deliver customized incident plans and task assignments to ensure appropriate action. Identify all active incidents at-a-glance using the risk intelligence dashboard. Enhance the alert send process to improve response times. Access business continuity plans anywhere via a mobile app.
  • 13
    Query Federated Search
    Query is a federated search platform delivering a single search bar to access all your security-relevant data, wherever it is stored. The Query Federated Search Platform unlocks access to and value from cybersecurity data wherever it is stored (in the cloud, third-party SaaS, or on-prem), regardless of vendor or technology, and without requiring centralization. This leads to massive cost savings, more efficient security operations across real-time and historical data sources, and reduced security analyst ramp-up time.
  • 14
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 15
    HYAS

    HYAS

    HYAS

    HYAS Protect provides proactive security, enabling enterprises to make real-time, automated, data-based risk assessments. HYAS Protect can mitigate threats in real-time and provides a threat signal to improve existing security solutions. HYAS Insight provides threat and fraud response teams with unparalleled visibility into the origins of attacks, the infrastructure being used to attack, and the infrastructure likely to be used in future attacks so they can speed investigations and proactively defend enterprises. First West Credit Union, a leading Canadian financial institution, combats cyber fraud and responds to security incidents with help from HYAS Insight. Read this case study to learn how HYAS helped improve analyst investigation speed by 3X. In addition to communicating with you in response to this submission, we would like to send you news, offers and information regarding our products and services as well as other content that we believe may be of interest to you.
  • 16
    Wazuh

    Wazuh

    Wazuh

    Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. Wazuh is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis. Wazuh addresses the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility, with the insights to help security analysts discover, investigate and response to threats and attack campaigns across multiple endpoints.
  • 17
    Swimlane

    Swimlane

    Swimlane

    Swimlane is a leader in security orchestration, automation and response (SOAR). By automating time-intensive, manual processes and operational workflows and delivering powerful, consolidated analytics, real-time dashboards and reporting from across your security infrastructure, Swimlane maximizes the incident response capabilities of over-burdened and understaffed security operations. Swimlane was founded to deliver scalable, innovative and flexible security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages. Swimlane is at the forefront of the growing market for security automation and orchestration solutions that automate and organize security processes in repeatable ways to get the most out of available resources and accelerate incident response.
  • 18
    LMNTRIX

    LMNTRIX

    LMNTRIX

    LMNTRIX is an Active Defense company specializing in detecting and responding to advanced threats that bypass perimeter controls. Be the hunter not the prey. We think like the attacker and prize detection and response. Continuous everything is the key. Hackers never stop and neither do we. When you make this fundamental shift in thinking, you start to think differently about how to detect and respond to threats. So at LMNTRIX we shift your security mindset from “incident response” to “continuous response,” wherein systems are assumed to be compromised and require continuous monitoring and remediation. By thinking like the attacker and hunting on your network and your systems, we allow you to move from being the prey to being the hunter. We then turn the tables on the attackers and change the economics of cyber defense by shifting the cost to the attacker by weaving a deceptive layer over your entire network – every endpoint, server and network component is coated with deceptions.
  • 19
    Tandem Software
    Tandem is an online solution that eases the burden of regulatory compliance and, more importantly, improves security posture. This is your all-in-one information security and compliance solution. We named our product Tandem because it works in partnership - in tandem - with you. You bring your knowledge of your organization and your needs, Tandem brings software built by information security experts to help you organize and manage your information security program. Let Tandem carry the burden of new guidance, data tracking, document structure, and report generation. See what you are capable of when using the right tool for the right job.
  • 20
    Smartflow

    Smartflow

    Smartflow

    Smartflow is a SaaS company that has built a platform for digitizing and optimizing inspections & checks. The platform's digital core is performing inspection-related tasks. Smartflow supports various companies in industrial verticals in preparing, performing, and reporting inspections. Our mission is to help field operators and inspectors complete their inspections in one visit to the worksite with zero errors. We are committed to creating an improved work experience that will allow the inspector to have instant access to the checks that have been carried out before, get a clear overview of what important matters emerged from those checks, and enable them to work faster cleaner and safer. Smartflow is a SaaS cloud-based solution. With the platform & app you can digitize all rounds of inspections, work processes, workflows, and frontline operations. Smartflow is a smart data capture solution that generates valuable data & insights working both online & offline.
    Starting Price: €295 Entry Fee / Monthly Price
  • 21
    WireX Systems

    WireX Systems

    WireX Systems

    Powerful central hub to streamline the entire investigation and response processes and to accelerate knowledge sharing across team members. The framework includes integration points with the various SIEM vendors to import tickets details (as well as export them back at the end of the process) investigation management system, playbook modeling capabilities, as well as enrichment tools like Sandbox technologies, IP and host reputation, geo-location and other threat feeds. Contextual Capture™ provides the world’s largest organizations the technology foundation to collect and automatically analyze network data for security investigations. Using the WireX Systems Contextual Capture ™ technology you can break through the limitations of full packet capture, store payload level information for periods of months and remove the complexities of sifting through the packets in order to “glue” them back together.
  • 22
    Orna

    Orna

    Orna

    The most intuitive cyber incident response and case management platform with on-call SME and 200+ integrations. Orna detects attacks and anomalies across the entire infrastructure 24/7/365, groups them by source, incident relevance, and criticality, and enriches them with threat intelligence data from 28 public and private sources. ORNA's AI analyzes the threat and estimates the severity of the resulting incident, not just the alert, as well as the affected assets. Clear, color-coded dashboards provide attack breakdown by asset, type, technique, time, and more to speed up operations. ORNA's SMS and email notifications are secure and highly configurable based on the team member's role, source, and severity to avoid alert fatigue. When an attack happens, quick and decisive actions make all the difference. With ORNA, you can mount a world-class response, as all alerts can be escalated into incidents with a single action.
    Starting Price: $833 per month
  • 23
    CA Compliance Event Manager
    Non-compliance can result in out-of-control costs and a serious impact to the bottom line. CA Compliance Event Manager helps you establish continuous data security and compliance. Gain deeper insight into your enterprise’s risk posture, protect your business, and comply with the regulations using advanced compliance management tooling. Monitor users, security settings, and system files and alert to changes and suspicious activity for complete oversight of your security systems and data. Get real-time notifications to proactively address potential threats. Filter critical security events and forward to SIEM platforms for a holistic view of your security infrastructure. Reduce costs by minimizing the number of security alerts undergoing real-time analysis. Inspect the source of incident with detailed audit and compliance information for deeper insights into your risk posture.
  • 24
    Cyber Triage

    Cyber Triage

    Sleuth Kit Labs

    Fast & Affordable Forensics for Incident Response. Automated incident response software for fast, comprehensive, and easy intrusion investigations. An alert is generated from IDS or SIEM. An endpoint investigation is started from SOAR manually. Cyber Triage is deployed to the endpoint to collect data. Analyst uses Cyber Triage data to find evidence and make decisions. Manual incident response is slow, leaving the entire organization at the intruder’s mercy. By automating every phase of the endpoint forensics process, Cyber Triage ensures state-of-the-art remediation speed. Cyber threats are constantly evolving, and manual incident response can be inconsistent and incomplete. Always operating on the latest threat intelligence, Cyber Triage scours every relevant corner of a compromised endpoint. Forensic tools are often confusing, with features not needed for intrusions. Cyber Triage’s intuitive interface allows even junior staff to analyze data and assemble reports.
    Starting Price: $2,500
  • 25
    Sophos Cloud Native Security
    Complete multi-cloud security coverage across environments, workloads, and identities. Boost efficiency with a single integrated cloud security platform. Sophos Cloud Native Security unifies security tools across workloads, cloud environments, and entitlements management. Integrated with SIEM, collaboration, workflow, and DevOps tools to increase agility across an organization. Your cloud environments need to be tough, hard to compromise and quick to recover. Our comprehensive and intuitive security and remediation tools can be managed by your security teams, or via Managed Services to fast-track your cyber resilience to best meet the security incidents of today. Leverage our extended detection and response (XDR) tools to identify and stop malware, exploits, misconfigurations, and anomalous behaviors. Hunt for threats, prioritize detections, and automatically connect security events to optimize investigation and response.
  • 26
    Convergence IMS

    Convergence IMS

    Vector Solutions

    Quickly and intuitively investigate, record, and report workplace safety incidents and near-misses with the Convergence IMS. Featuring integrated OSHA 300, 300A, 301, DOT, & MSHA forms. Configure the Convergence IMS just the way you need it for your organization and industry. Add information about your company required by OSHA, DOT, the EPA, or MSHA, including number of employees and your NAICS code. Our safety incident report wizard provides an intuitive guide for employees to immediately report any injury, illness, property damage, safety observation, or near-miss. Centralize and track status of all aspects of incident management with our safety incident reporting software. Document OSHA-recordable and MSHA-recordable injuries and illnesses, and submit those directly to OSHA and MSHA. Attach associated incident documents and images, including digital photos and videos.
  • 27
    Intezer Analyze
    Intezer automates Tier 1 SOC tasks, working like an extension of your team. Intezer can monitor incoming incidents from endpoint, email, or SIEM tools, then "autonomously" collects evidence, investigates, triages, triggers remediation action, and escalates only the the serious threats to your team for human intervention. Fast set up and integrations with your SOC and IR teams workflows (EDR, SOAR, SIEM, etc.) means you can starting filtering out false positives, get detailed analysis about every threat, and speed up your incident response time. Make sure every incident and artifact (such as files, URLs, endpoint memory, etc.) gets deeply analyzed, detecting malicious code in memory and other evasive threats.
  • 28
    Symmetry Incident Management
    Security and safety incidents occur every day at the workplace, and organizations must proactively investigate and manage them before they escalate into unmanageable and sometimes public predicaments that impact their brand and reputation. Whether it’s a defective light bulb in a parking garage or an active shooter situation, incidents must be properly managed, investigated, analyzed, and documented so companies can take the appropriate actions. Understanding how security officers conduct activities throughout the day can help an organization create efficiencies and save money. Understand how events unfold through configurable questions, instant notifications, computer-aided dispatch, and intelligent narratives with site-specific documentation, images, and videos. Understand the implications of each action taken during and after every event, allowing you to make informed, data-backed business decisions across resources, staffing, and reporting.
  • 29
    The Respond Analyst
    Accelerate investigations and improve analyst productivity with a XDR Cybersecurity Solution. The Respond Analyst™, an XDR Engine, automates the discovery of security incidents by turning resource-intensive monitoring and initial analysis into thorough and consistent investigations. Unlike other XDR solutions, the Respond Analyst connects disparate evidence using probabilistic mathematics and integrated reasoning to determine the likelihood that events are malicious and actionable. The Respond Analyst augments security operations teams by significantly reducing the need to chase false positives resulting in more time for threat hunting. The Respond Analyst allows you to choose best-of-breed controls to modernize your sensor grid. The Respond Analyst integrates with the leading security vendor offerings across important categories such as EDR, IPS, Web Filtering, EPP, Vulnerability Scanning, Authentication, and more.
  • 30
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 31
    ProDiscover

    ProDiscover

    ProDiscover

    ProDiscover forensics suite addresses a wide range of cybercrime scenarios encountered by law enforcement and corporate internal security investigators. ProDiscover is widely used in Computer Forensics and Incident Response. The product suite is also equipped with diagnostic and evidence collection tools for corporate policy compliance investigations and electronic discovery. ProDiscover helps in efficiently uncovering files and data of interest. Wizards, dashboards and timeline views help in speedily discovering vital information. Investigators are provided with a wide range of tools and integrated viewers to explore the evidence disks and extract artifacts relevant to the investigation. ProDiscover combines speed and accuracy, with ease of use and is available at an affordable price. Launched in 2001, ProDiscover has a rich history. It was one of the first products to support remote forensic capabilities.
  • 32
    Blackpanda

    Blackpanda

    Blackpanda

    Blackpanda Digital Forensics services & Incident Response experts help identify, prioritize, contain, and remediate security issues in the event of a breach—helping you both minimize damage and respond more effectively to future incidents. Our incident response experts work with your team to identify vulnerable assets, draft organizational response plans, and craft bespoke playbooks to common attack events and communications protocols, while thoroughly testing all processes to optimize response. In doing so, our cyber security services help mitigate damage before an incident even occurs. Digital actions leave digital footprints. Our expert digital forensics investigators collect, analyze, and preserve digital evidence to outline the details of an incident, recover lost or stolen data, and testify to stakeholders or law enforcement, where necessary. Our forensic cyber security services can be instrumental in legal, corporate and private cases.
  • 33
    OpenText Security Suite
    OpenText™ Security Suite, powered by OpenText™ EnCase™, provides 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation. With agents deployed on more than 40 million endpoints, clients that include 78 of the Fortune 100 and more than 6,600 EnCE™ certified users, Security Suite delivers the industry gold standard for incident response and digital investigations. EnCase solutions help enterprises, government agencies and law enforcement address a range of needs around risk and compliance, file analytics, endpoint detection and response (EDR) and digital forensics with the most trusted digital forensics and cybersecurity software. Solving problems that often go undetected or unsolved on the endpoint, Security Suite restores the confidence of companies and their customers with unparalleled reliability and breadth of coverage.
  • 34
    Cado

    Cado

    Cado Security

    Investigate all escalated alerts with unparalleled speed & depth. Revolutionize how Security Operations and Incident Response teams investigate cyber attacks. In today's complex and evolving hybrid world, you need an investigation platform you can trust to deliver answers. Cado Security empowers teams with unrivaled data acquisition, extensive context, and unparalleled speed. The Cado Platform provides automated, in-depth data so teams no longer need to scramble to find the critical information that they need, enabling faster resolutions and more effective teamwork. With ephemeral data, once the data is gone, it's gone. Act in real-time. The Cado Platform is the only tool with the ability to perform automated full forensic captures as well as utilize instant triage collection methods - native acquisition of cloud-based resources including containers, as well as SaaS applications and on-premise endpoints.
  • 35
    MozDef

    MozDef

    Mozilla

    MozDef aims to bring real-time incident response and investigation to the defensive tool kits of security operations groups in the same way that Metasploit, LAIR and Armitage have revolutionized the capabilities of attackers. We use MozDef to ingest security events, alert us to security issues, investigate suspicious activities, handle security incidents and to visualize and categorize threat actors. The real-time capabilities allow our security personnel all over the world to work collaboratively even though we may not sit in the same room together and see changes as they occur. The integration plugins allow us to have the system automatically respond to attacks in a preplanned fashion to mitigate threats as they occur. We’ve been on a monthly release cycle since the launch, adding features and squashing bugs as we find them. You can find the release notes for this version here.
  • 36
    Alliance
    Alliance is a HIPAA compliant, complete and integrated Hospital Security Management system that was designed by law enforcement personnel to handle day to day operations as well as major events as they occur. The software comes pre-packaged with 100s of reports that are valuable to both risk managers and a hospital's Joint Commission Committee. All tools provided in Alliance are optimized for efficiency to handle small incidents to major incident such as a natural disaster (Bird Flu, earthquake, flood and hurricanes) or an act of terrorism. A tightly integrated system for locating critical information quickly, Dispatch (Event Desk) reduces dispatcher stress and minimizes input errors. A simple, intuitive interface and automated tools speed up incident data entry, helping personnel “populate” the database through forms tailored to the current task.
  • 37
    incident.io

    incident.io

    incident.io

    Simple. Powerful. Effortless incident management. With a beautifully simple interface, powerful workflow automation, and integrations with all your existing tools, prepare for incident management like never before. We make adoption easy by meeting your teams where they already work in Slack, and integrating seamlessly with all the tools you already know and love, including Jira, Statuspage, and PagerDuty. We guide your teams through the most stressful times. Now anyone can run incidents with confidence so you can scale your organization without slowing down. Create consistency instantly with our easy to build workflows. Automate tedious processes from sending update emails to execs to compiling post-mortems, so you can focus on fixing and building world-class products. Avoid duplication and reduce unnecessary distractions by running more transparent incidents. You can assign roles and actions, provide incident updates, and find an overview of all live incidents.
    Starting Price: $16 per responder per month
  • 38
    StackPulse

    StackPulse

    StackPulse

    StackPulse automates and orchestrates incident response and management, enabling a continuous approach to software services reliability. The StackPulse platform gives SREs, developers and on-callers the context and control necessary to analyze, respond to, and resolve incidents across the entire stack, at any scale. StackPulse transforms how engineering and operations teams operate software and infrastructure services. Our Platform makes it easy to get started collaborating with a suite of incident management tools, from automated war room creation, to data capture and auto-generated postmortems. The data captured during these incidents then generates recommendations for playbooks and triggers that result in significant reductions in MTTR or improvements in SLO adherence. StackPulse identifies risk based on specific patterns of your organization’s unique monitoring, infrastructure, and operational data, and then recommends automated playbooks tailored to your organization.
  • 39
    UTMStack

    UTMStack

    UTMStack

    Complete visibility over the entire organization from a centralized management dashboard. All solutions in the stack are fully integrated with each others and report to a central database. This facilitates daily tasks such as monitoring, investigations and incident response. Active and passive vulnerability scanners for early detection, with of the box reports for compliance audits. Track and manage accounts access and permission changes. Get alerted when suspicious activity happens. Remotely manage your environment and respond to attacks right from your dashboard. Keep track of changes and access to classified information. Protect endpoints and servers with advanced threat protection.
    Starting Price: $25 per device per month
  • 40
    LogRhythm NextGen SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 41
    FortiEDR

    FortiEDR

    Fortinet

    Fortinet announced the acquisition of enSilo, Inc., a leading provider of advanced endpoint security. The combination of Fortinet and enSilo further enhances the Fortinet Security Fabric by providing enterprises with a full suite of endpoint detection and response (EDR) capabilities designed to automate the protection against advanced threats, pre and post-execution, with real time orchestrated incident response functionality. enSilo’s integration with Fortigate firewalls, FortiSIEM, FortiSandbox and FortiClient, helps enterprises gain superior endpoint visibility and tightly coordinated, dynamic control of network, user, and host activity within their environment. Likewise, service providers can extract the full value of such integration and deliver a comprehensive and efficient managed detection and response (MDR) service.
  • 42
    Mitiga

    Mitiga

    Mitiga

    Imagine the most talented military cybersecurity specialists in the world were in charge of your cloud’s Incident readiness & response. Now imagine this knowledge and expertise was baked into a completely new tech stack, and delivered with managed services. The unique risks of hybrid cloud environments require equally unique preparation to endure security incidents. Mitiga bolsters organizations’ security resiliency by navigating them through the fog of war of an incident, and accelerates their bounce-back to business-as-usual, from days, down to hours. Mitiga’s managed services are infused with a completely reimagined Incident readiness & response tech stack. Lock-in Mitiga’s top-tier talent that will get you back to business-as-usual swiftly, with precision-handling of real-time incidents.
  • 43
    xMatters

    xMatters

    Everbridge

    xMatters is an intelligent communications platform designed to accelerate essential business processes, especially IT operations, DevOps and major incident management processes. Trusted by over 1000 global companies, xMatters offers intelligent communication tools for effective IT management, business continuity management, employee engagement, and customer engagement. The platform delivers unmatched reliability and innovative functionality.
    Starting Price: $9 per user per month
  • 44
    Agari

    Agari

    Fortra

    Use Trusted Email Identity to protect workers and customers from advanced email attacks. Advanced email attacks target a major security vulnerability that legacy email security controls do not address. Agari gives employees, customers, and partners the confidence to trust their inbox. Unique AI with over 300m daily machine learning model updates understands the good to protect you from the bad. Global intelligence powered by trillions of global email messages provide deep insights into behaviors and relationships. Years of experience defining the email security standards that have been adopted by Global 2000 companies.
  • 45
    PT Industrial Security Incident Manager
    The PT ISIM hardware appliance performs non-stop monitoring of ICS network security, helps to detect cyberattacks in their early stages, identifies negligent or malicious actions by staff, and promotes compliance with cybersecurity legislation and industry regulations. Ease of ICS connection and self-learning technology make PT ISIM a good fit for small businesses, especially when security staff are in short supply. PT ISIM can power a security operations center (SOC) for monitoring of ICS threats and effective security management across geographically dispersed sites. A flexible mix of components makes PT ISIM easy and quick to deploy, with minimal configuration required, on infrastructures belonging to companies in any industry. Whether rapid or gradual, scaling up is always a smooth process on even the most complex networks. The monitoring architecture of PT ISIM is passive-only.
  • 46
    Shoreline

    Shoreline

    Shoreline.io

    Shoreline is the Cloud Reliability platform — the only platform that lets DevOps engineers build automations in an afternoon, and fix issues forever. Shoreline reduces on-call complexity by running across clouds, Kubernetes clusters, and VMs allowing operators to manage their entire fleet as if it were a single box. Debugging and repairing issues is easy with advanced tooling for your best SREs, automated runbooks for the broader team, and a platform that makes building automations 30X faster. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud.
  • 47
    ACSIA

    ACSIA

    DKSU4Securitas Ltd

    ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection
    Starting Price: Depends on number of servers
  • 48
    ASGARD Management Center
    ASGARD Management Center is the perfect incident response platform. It not only lets you execute enterprise wide thor scans. It also provides an easy to use interface for execution of complex response playbooks on up to one million endpoints – all from a single console. ASGARD ships as hardened virtual appliance and features agents for Microsoft Windows, Linux, AIX, and MacOS. Its rich API facilitates interoperation with SOAR frameworks, sandboxes, antivirus systems, SIEM systems, CMDBs, IPS devices – or in other words: with literally any security device you may have in place. This short demo shows how easy it is to launch a scan with custom IOCs from a connected MISP. In the example we select all events with the keyword “Emotet”, add them to a new rule set and use that rule set in a new Group Scan with THOR.
  • 49
    Proofpoint Threat Response
    Security teams face many challenges when responding to threats that are targeting people in their organization. Those challenges are staff shortages, an overwhelming number of alerts and attempting to reduce the time it takes to respond and remediate threats. Proofpoint Threat Response is a leading security orchestration, automation and response (SOAR) solution that enables security teams to respond faster and more efficiently to the everchanging threat landscape. Threat Response orchestrates several key phases of the incident response process. It can ingest any alert from any source and automatically enrich and group them into incidents in a matter of seconds. Security teams receive rich and vital context from leveraging Proofpoint Threat Intelligence as well as third-party threat intelligences to help understand the "who, what and where" of attacks, prioritize and quickly triage incoming events.
  • 50
    Everbridge Risk Center
    Risk Center is a risk monitoring solution that integrates risk intelligence technology and resources around all-hazards information collection and analysis, enhancing your ability to monitor, analyze, and respond to risk. Combining thousands of the most trustworthy data sources with an experienced team of analysts at our Risk Intelligence Monitoring Center (RIMC), Risk Center’s targeted real-time alerting streamlines your organization’s ability to monitor and analyze worldwide incidents and events, dramatically increasing your ability to respond to risks that threaten your people, organization, and supply chain. This comprehensive, configurable risk monitoring solution delivers actionable information that helps reduce risk wherever your people live, work, or travel. Satisfy Duty of Care obligations with real-time risk assessment and hyper-local data of the threat landscape wherever your employees live, work, and travel.