Compare the Top Threat Hunting Tools in Germany as of November 2024

What are Threat Hunting Tools in Germany?

Threat hunting tools are software programs used by cybersecurity professionals to proactively search for potential security threats. These tools use advanced algorithms and machine learning techniques to analyze network traffic, user behavior, and system logs in order to identify any anomalous or suspicious activity. They can also detect known malware and vulnerabilities, as well as track unusual patterns or changes in the network. Threat hunting tools provide valuable insights and alerts, enabling organizations to take proactive measures to prevent cyber attacks before they occur. They are an essential component of modern-day cybersecurity strategies. Compare and read user reviews of the best Threat Hunting tools in Germany currently available using the table below. This list is updated regularly.

  • 1
    Heimdal Endpoint Detection and Response (EDR)
    The Heimdal Threat-hunting and Action Center provides security teams with an advanced threat and risk-centric view of their entire IT landscape, offering granular telemetry across endpoints and networks for swift decision-making.
    Leader badge
    Starting Price: $0/month
    Partner badge
    View Tool
    Visit Website
  • 2
    Silent Push

    Silent Push

    Silent Push

    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Our solutions include: Proactive Threat Hunting - Identify and track malicious infrastructure before it’s weaponized. Brand & Impersonation - Protect your brand from phishing, malvertisement, and spoofing attacks. IOFA Early Detection Feeds - Monitor global threat activity with proactive intelligence.
    Starting Price: $100/month
  • 3
    Panda Fusion 360

    Panda Fusion 360

    WatchGuard Technologies

    Fusion 360 combines our Systems Management and Adaptive Defense 360 solutions to unify RMM with EPP and EDR capabilities. This holistic solution combines the best of two worlds to provide advanced endpoint security, centralized IT management, monitoring and remote support capabilities. Fusion 360 ensures the classification of 100% of the running processes on all your endpoints with our Zero-Trust and Threat Hunting services. Cloud-based centralized management for devices and systems, with real-time monitoring, inventory and remote support. Advanced prevention, detection and response technologies against breaches.
  • 4
    ThreatDefence

    ThreatDefence

    ThreatDefence

    Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.
    Starting Price: $5 per user per month
  • 5
    VMware Carbon Black EDR
    Threat hunting and incident response solution delivers continuous visibility in offline, air-gapped and disconnected environments using threat intel and customizable detections. You can’t stop what you can’t see. Investigations that typically take days or weeks can be completed in just minutes. VMware Carbon Black® EDR™ collects and visualizes comprehensive information about endpoint events, giving security professionals unparalleled visibility into their environments. Never hunt the same threat twice. VMware Carbon Black EDR combines custom and cloud-delivered threat intel, automated watchlists and integrations with the rest of your security stack to efficiently scale your hunt across even the largest of enterprises. The days of constantly reimaging are over. An attacker can compromise your environment in an hour or less. VMware Carbon Black EDR gives you the power to respond and remediate in real time from anywhere in the world.
  • 6
    Traceable

    Traceable

    Traceable

    Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. If you’re planning on improving the data security posture in your APIs, Traceable would love the opportunity to discuss how we could help and share some of our lessons learned from working with enterprise customers like Canon, Informatica, Outreach, and many others.
    Starting Price: $0
  • 7
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 8
    Infocyte

    Infocyte

    Infocyte

    The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations.
  • 9
    Comodo MDR
    Extend monitoring and threat hunting from endpoints to network and cloud. Our security experts service your business remotely. You focus on your business. Our security operations center gives you fully managed solutions for today’s biggest problems facing everyone’s security today. Comodo MDR offers software, platform, technologies and the expert staff to monitor, manage and threat hunt to let you focus on your business goals. Growing numbers of more sophisticated cybersecurity attacks threaten your web applications, cloud infrastructure, networks, and endpoints. Failure to protect these resources will trigger costly penalties once a data breach occurs to your business. Our service provides a team of security researchers who extend your IT team to safeguard your IT systems and infrastructure. Your private security engineer will be your principal contact with your Comodo SOC services.
    Starting Price: $7.50 per user per month
  • 10
    Rapid7 Managed Threat Complete
    Managed Threat Complete brings comprehensive risk and threat coverage into a single subscription. Managed Detection and Response (MDR) Services & Solutions. Multiple advanced detection methods, including proprietary threat intelligence, behavioral analytics, Network Traffic Analysis, and human threat hunts find evil in your environment. Our team will instantly contain user and endpoint threats to cut off the attacker. Detailed findings reports guide you to take additional remediation and mitigation actions tailored to your program. Let our team be a force multiplier for you. Detection and response experts—from your security advisor to the SOC—help you strengthen your defenses, take immediate. Standing up an effective detection and response program isn’t as simple as buying and implementing the latest security products.
    Starting Price: $17 per asset per month
  • 11
    Heimdal Email Fraud Prevention
    Heimdal Email Fraud Prevention is a revolutionary communications protection system that alerts you to fraud attempts, business email compromise (BEC), and impersonation. Over 125 vectors continuously monitor your email communications while using it. Heimdal Email Fraud Prevention is flawlessly paired with threat detection solutions in order to monitor your communications for false claims and malicious emails. Our solution constantly checks for insider threat and fake transfer requests, while also securing your entire communications system against email-based malware, incorrect banking details, phishing and spear-phishing, man-in-the-middle spoofing attacks, and more. The centralized dashboard unlocks the full potential of your threat-hunting engine and cyber-stance. Crisp graphics, intuitive controls, ready-to-download security status reports, ROI outlooks, mitigated threats, CVEs, and more conveniently stacked into a responsive and unified dashboard.
  • 12
    Heimdal Threat Prevention
    Secure your hybrid workforce, either on-site or remote, with a trailblazing DNS security solution that combines cybercrime intelligence, Machine Learning and AI-based prevention in preventing future threats with stunning accuracy. 91% of online threats leverage DNS. Heimdal’s Threat Prevention identifies emergent and hidden cyber-threats, stops cyberattacks that go undetected by traditional Antivirus and closes off data-leaking venues. With zero interruptions and minimal endpoint footprint. 96% accuracy in predicting future threats through the use of applied neural networks modelling allows you to confidently own your company’s DNS governance setup and hinder all immediate and future cyber-threat scenarios. You stay ahead of the curve, with total confidence. Spot malicious URLs, processes, and backtrack the attacker’s origins with a code-autonomous endpoint DNS threat hunting solution. Empower your team with the perfect tools and gain complete visibility and control.
  • 13
    Huntress

    Huntress

    Huntress

    Huntress delivers a powerful suite of endpoint protection, detection and response capabilities—backed by a team of 24/7 threat hunters—to protect your business from today’s determined cybercriminals. Huntress protects your business throughout the modern attack lifecycle—defending against threats like ransomware, malicious footholds, and more. Our security experts take care of the heavy lifting with 24/7 threat hunting, world-class support and step-by-step instructions to stop advanced attacks. We review all suspicious activity and only send an alert when a threat is verified or action is required—eliminating the clutter and false positives found in other platforms. With one-click remediation, handwritten incident reports and powerful integrations, even non-security staff can use Huntress to swiftly respond to cyber events.
  • 14
    dnstwist

    dnstwist

    dnstwist

    Find lookalike phishing domains that adversaries can use to attack you. See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and brand impersonation. Useful as an additional source of targeted threat intelligence. DNS fuzzing is an automated workflow that aims to uncover potentially malicious domains that target your organization. This tool generates a comprehensive list of permutations based on a provided domain name and subsequently verifies whether any of these permutations are in use. Additionally, it can generate fuzzy hashes of web pages to detect ongoing phishing attacks, brand impersonation, and much more.
    Starting Price: Free
  • 15
    HTCD

    HTCD

    HTCD

    HTCD is a cloud security SaaS built AI-first to materially upgrade your security posture. Access centralized visibility across your AWS and Azure environments—with 500+ OOTB policies for cloud security, infrastructure, network, SaaS, and compliance. All while retaining 100% ownership of your data. Create no-code detections in minutes. AI converts your questions to code for rapid results: Which CVEs can be exploited in my Azure environment? Show me S3 costs over the last 2 weeks ... and more. Get a prioritized view of security misconfigurations and vulnerabilities—solve the most pressing issues to reduce operational risk. AI reduces your response time by prioritizing in minutes what otherwise takes weeks. Get started in 15 minutes, free for 6 months for startups.
  • 16
    Sophos Intercept X Endpoint
    Take threat hunting and IT security operations to the next level with powerful querying and remote response capabilities. Ransomware file protection, automatic file recovery, and behavioral analysis to stop ransomware and boot record attacks. Deep Learning Technology Artificial intelligence built into Intercept X that detects both known and unknown malware without relying on signatures. Deny attackers by blocking the exploits and techniques used to distribute malware, steal credentials, and escape detection. Elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. Active adversary mitigation prevents persistence on machines, credential theft protection, and malicious traffic detection.
    Starting Price: $28 per user per year
  • 17
    LogRhythm NextGen SIEM
    We know your job isn’t easy. That’s why we combine log management, machine learning, SOAR, UEBA, and NDR to give you broad visibility across your environment so you can quickly uncover threats and minimize risk. But a mature SOC doesn’t just stop threats. With LogRhythm, you’ll easily baseline your security operations program and track your gains — so you can easily report your successes to your board. Defending your enterprise comes with great responsibility — that’s why we built our NextGen SIEM Platform with you in mind. With intuitive, high-performance analytics and a seamless incident response workflow, protecting your business just got easier. With the LogRhythm XDR Stack, your team has an integrated set of capabilities that deliver on the fundamental mission of your SOC — threat monitoring, threat hunting, threat investigation, and incident response — at a low total cost of ownership.
  • 18
    RocketCyber
    RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services. RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity.
  • 19
    Critical Start

    Critical Start

    Critical Start

    Our team of highly trained cybersecurity professionals provides expertise in compliance, tool assessments, threat hunting, incident response and more. Critical Start is leading the way in Managed Detection and Response (MDR) services. With a unique approach that treats every security alert as equal, Critical Start's proprietary Trusted Behavior Registry allows security analysts to resolve every alert. Our mission is simple: protect our customers’ brand while reducing their risk. We do this for organizations of all sizes through our award-winning portfolio, from the delivery of managed security services to security-readiness assessments using our proven framework, the Defendable Network, professional services, and product fulfillment. TEAMARES, a specialized group within Critical Start, that focuses on understanding your environment more deeply, assess how today’s attacks can impact your organization and better defend your environment.
  • 20
    Blackpoint Cyber

    Blackpoint Cyber

    Blackpoint Cyber

    Blackpoint Cyber's 24/7 Managed Detection and Response service provides real-time threat hunting and true response; not just alerts. Blackpoint Cyber is a technology-focused cyber security company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence cyber security and technology experts. Leveraging its real-world cyber experience and knowledge of malicious cyber behavior and tradecraft, Blackpoint provides cyber security products and services to help organizations protect their infrastructure and operations. The company’s proprietary security operations and incident response platform, SNAP-Defense, is available as a product or as a 24x7 Managed Detection and Response (MDR) service. Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.
  • 21
    Elastic Security
    Elastic Security equips analysts to prevent, detect, and respond to threats. The free and open solution delivers SIEM, endpoint security, threat hunting, cloud monitoring, and more. Elastic makes it simple to search, visualize, and analyze all of your data — cloud, user, endpoint, network, you name it — in just seconds. Hunt and investigate across years of data made accessible by searchable snapshots. With flexible licensing, leverage information from across your ecosystem, no matter its volume, variety, or age. Avoid damage and loss with environment-wide malware and ransomware prevention. Quickly implement analytics content developed by Elastic and the global security community for protection across MITRE ATT&CK®. Detect complex threats with analyst-driven, cross-index correlation, ML jobs, and technique-based methods. Empower practitioners with an intuitive UI and partner integrations that streamline incident management.
  • 22
    Trellix EDR
    Endpoint threat detection, investigation, and response—modernized. Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption. Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources. Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you. Use an existing Trellix ePolicy Orchestrator (Trellix ePO) on-premises management platform or SaaS-based Trellix ePO to reduce infrastructure maintenance. Remove administration overhead, allowing more senior analysts to apply their skills to the threat hunt and accelerate response time.
  • 23
    Flexible IR

    Flexible IR

    Flexible IR

    Planned IR skill development. Training of responders on incidents focused on domain (eg healthcare). Scenario taken from VerisDB and Flexible IR curated list. Managers can do current team evaluation and plan actions. Use of Mitre Att&ck Matrix to identify gaps that need to be practised. Evolving runbooks using Symbolic AI system integration. We provide understandable and easy baseline runbooks to handle incidents. The runbooks can be customised to your specific environment and security analyst. Expert audit of runbooks. Easily coach the less experienced members of the team in threat hunting and incident response topics. Simulate adversary use cases and practise. Plan skill development for your analysts. Move towards critical 1-10-60 rule for Incident response. Per analyst skill matrix and point systems to bring in continuous motivation and planned learning. System supports basic gamification for card based games.
  • 24
    Trellix Detection as a Service
    Detect threats at any point in your workflow. Inspect your cloud infrastructure and the business logic of the data in your cloud apps. Validate your files and content with the latest threat intelligence and multiple dynamic machine learning, AI, and correlation engines. Easily integrate across your trusted cloud services, web applications, and collaboration tools. Scan files, hashes, and URLs for potential malware in a live virtual environment without risking your internal assets. Incorporate Detection as a Service into your SOC workflows, SIEM analytics, data repositories, applications and much more. Determine the possibility of secondary or combinatory effects across multiple phases of the cyber-attack chain to discover never-before-seen exploits and malware. Submit MD5 hashes or local files with our easy-to-use Chrome plug-in that easily integrates into existing toolsets or workflows.
  • 25
    WithSecure Countercept
    Countercept is a threat-driven service designed to be effective in the 'grey area' where legitimate activity masks malicious intent. We respond to incidents in minutes, and resolve most of them within hours. Countercept provides security insights that support continuous security posture improvement. We help you improve your security and meet compliance obligations. We act as an extension of your security team, giving you unmetered access to our experts, sharing our threat hunting expertise, addressing queries and helping your team develop. Organized criminal groups, guns for hire or nation state actors now automate scanning for vulnerable infrastructure. WithSecure’s xDR platform provides excellent visibility of endpoints, users, logs, network infrastructure and cloud platforms. WithSecure’s Detection & Response Team (DRT) investigates and responds security alerts within minutes, before they become costly incidents.
  • 26
    Seqrite HawkkHunt
    Stop the most sophisticated hidden threats and adversaries efficiently with unified visibility, and powerful analytics using Seqrite HawkkHunt Endpoint Detection and Response (EDR). Gain complete visibility through robust and real-time intelligence from a single dashboard. Proactive threat hunting process to detect threats, and perform in-depth analysis to block breaches. Simplify alerts, data ingestion, and standardization from a single platform to respond to attacks faster. Get deep visibility and high efficacy, actionable detection to rapidly uncover and contain advanced threats lurking in the environment. Get unparalleled end-to-end visibility through advanced threat hunting mechanisms under one consolidated view across security layers. Intelligent EDR automatically detects lateral movement attacks, zero-day attacks, advanced persistent threats, and living off-the-land attacks.
  • 27
    Bitdefender MDR

    Bitdefender MDR

    Bitdefender

    Bitdefender MDR keeps your organization safe with 24/7 security monitoring, advanced attack prevention, detection, and remediation, plus targeted and risk-based threat hunting by a certified team of security experts. We’re always there so you don’t have to be. Bitdefender Managed Detection and Response gives you 24/7 access to an elite team of cybersecurity experts. Our service is also backed by industry-leading, trusted Bitdefender security technologies like the GravityZone® Endpoint Detection and Response Platform. Bitdefender MDR combines cybersecurity for endpoints, networks, and security analytics with the threat-hunting expertise of a fully staffed security operations center (SOC) with security analysts from global intelligence agencies. Stop attacks through pre-approved actions executed by SOC analysts. We work with you during onboarding and at any point afterward, we’ll work with you to define actions we’ll take to rapidly mitigate incidents without impacting your teams.
  • 28
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 29
    CrowdStrike Container Security
    Protect cloud-native applications and reduce the attack surface by detecting vulnerabilities, hidden malware, secrets/keys, compliance violations and more — from build to runtime — ensuring only compliant containers run in production.Integrate frictionless security early into the continuous integration/continuous delivery (CI/CD) pipeline, and automate protection that empowers DevSecOps to deliver production-ready applications without impacting build cycles.Build and run applications knowing they are protected. Get access to automated discovery, runtime protection, continuous threat detection and response for cloud workloads and containers, and managed cloud threat hunting in a single platform. Find hidden malware, embedded secrets, configuration issues and more in your images to help reduce the attack surface.
  • 30
    Falcon Cloud Workload Protection
    Falcon Cloud Workload Protection provides complete visibility into workload and container events and instance metadata enabling faster and more accurate detection, response, threat hunting and investigation, to ensure that nothing goes unseen in your cloud environment. Falcon Cloud Workload Protection secures your entire cloud-native stack, on any cloud, across all workloads, containers and Kubernetes applications. Automate security and detect and stop suspicious activity, zero-day attacks, risky behavior to stay ahead of threats and reduce the attack surface. Falcon Cloud Workload Protection key integrations support continuous integration/continuous delivery (CI/CD) workflows allowing you to secure workloads at the speed of DevOps without sacrificing performance
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next