Best Incident Response Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Incident response software automates the process of and/or provides users with the tools necessary to find and resolve security breaches. Companies utilize the tools to monitor networks, infrastructure, and endpoints for intrusions and abnormal activity. They then use the programs to inspect and resolve intrusions and malware in the system. These products provide capabilities to resolve issues that arise after threats have bypassed firewalls and other security mechanisms. They alert administrators of unapproved access of applications and networks. They also have the ability to detect a variety of malware variants. Many tools automate the process of remedying these issues, but others guide users through known resolution processes.

Many incident response solutions function similarly to security information and event management (SIEM) software, but SIEM products provide a larger scope of security and IT management features.

To qualify for inclusion in the Incident Response category, a product must:

Monitor for anomalies within an IT system
Alert users of abnormal activity and detected malware
Automate or guide users through remediation process
Store incident data for analytics and reporting
Show More
Show Less

Featured Incident Response Software At A Glance

Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
108 Listings in Incident Response Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

    Users
    • Cyber Security Analyst
    • SOC Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Threat Detection
    37
    Integrations
    28
    Cybersecurity
    27
    Features
    27
    Cons
    Expensive
    28
    Difficult Learning
    17
    Complexity
    14
    Integration Issues
    14
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.4
    Threat Intelligence
    Average: 8.7
    8.2
    Quality of Support
    Average: 8.9
    8.2
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

Users
  • Cyber Security Analyst
  • SOC Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Threat Detection
37
Integrations
28
Cybersecurity
27
Features
27
Cons
Expensive
28
Difficult Learning
17
Complexity
14
Integration Issues
14
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.4
Threat Intelligence
Average: 8.7
8.2
Quality of Support
Average: 8.9
8.2
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,238 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 69% Mid-Market
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pondurance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Response Time
    3
    Cybersecurity
    2
    Continuous Monitoring
    1
    Customer Support
    1
    Real-time Monitoring
    1
    Cons
    Deployment Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pondurance features and usability ratings that predict user satisfaction
    9.4
    Threat Intelligence
    Average: 8.7
    9.7
    Quality of Support
    Average: 8.9
    8.9
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Indianapolis, US
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pondurance is the only provider of risk-based MDR services specifically engineered to eliminate breach risks. As a full-service provider of DFIR, MDR, and cybersecurity advisory and compliance service

Users
No information available
Industries
No information available
Market Segment
  • 69% Mid-Market
  • 23% Enterprise
Pondurance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Response Time
3
Cybersecurity
2
Continuous Monitoring
1
Customer Support
1
Real-time Monitoring
1
Cons
Deployment Issues
1
Pondurance features and usability ratings that predict user satisfaction
9.4
Threat Intelligence
Average: 8.7
9.7
Quality of Support
Average: 8.9
8.9
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Company Website
Year Founded
2008
HQ Location
Indianapolis, US
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(124)4.6 out of 5
Optimized for quick response
View top Consulting Services for Blumira Automated Detection & Response
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    33
    Customer Support
    20
    Setup Ease
    20
    Alerting
    16
    Alert Management
    16
    Cons
    Limited Customization
    11
    Alert System
    7
    Expensive
    6
    Faulty Detection
    6
    Inefficient Alert System
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    9.5
    Quality of Support
    Average: 8.9
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 36% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
33
Customer Support
20
Setup Ease
20
Alerting
16
Alert Management
16
Cons
Limited Customization
11
Alert System
7
Expensive
6
Faulty Detection
6
Inefficient Alert System
6
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
9.5
Quality of Support
Average: 8.9
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneTrust Tech Risk & Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Automation
    10
    Compliance Management
    9
    Risk Management
    9
    Features
    7
    Cons
    Complex Implementation
    6
    Difficult Setup
    6
    Complex Setup
    5
    Learning Curve
    5
    Learning Difficulty
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.9
    9.2
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneTrust
    Company Website
    Year Founded
    2016
    HQ Location
    Atlanta, Georgia
    Twitter
    @OneTrust
    6,559 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,543 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 39% Small-Business
OneTrust Tech Risk & Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Automation
10
Compliance Management
9
Risk Management
9
Features
7
Cons
Complex Implementation
6
Difficult Setup
6
Complex Setup
5
Learning Curve
5
Learning Difficulty
5
OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.9
9.2
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
OneTrust
Company Website
Year Founded
2016
HQ Location
Atlanta, Georgia
Twitter
@OneTrust
6,559 Twitter followers
LinkedIn® Page
www.linkedin.com
2,543 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

    Users
    • Student
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 59% Small-Business
    • 15% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Belkasoft Evidence Center is a tool for digital forensics and incident response work, supporting multiple evidence types such as disk images, memory dumps, mobile backups, and cloud data in one platform.
    • Reviewers appreciate the artifact-based analysis, fast indexing, and clear timeline view, which streamline investigations, and the tool's strength in memory forensics, mobile forensics, and chat analysis, which are useful for real-world cases.
    • Reviewers noted that the software requires high system resources, especially RAM and CPU, during large case analysis, and the interface and options can feel overwhelming for beginners, with a steep learning curve and high license cost for students and small labs.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Belkasoft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    43
    Features
    29
    Product Innovation
    18
    User Interface
    17
    Setup Ease
    16
    Cons
    Slow Performance
    13
    Expensive
    9
    Learning Curve
    7
    Not Intuitive
    5
    Difficult Setup
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Belkasoft features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    9.4
    Quality of Support
    Average: 8.9
    7.6
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Belkasoft
    Year Founded
    2002
    HQ Location
    Sunnyvale, California
    Twitter
    @Belkasoft
    11,062 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

Users
  • Student
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 59% Small-Business
  • 15% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Belkasoft Evidence Center is a tool for digital forensics and incident response work, supporting multiple evidence types such as disk images, memory dumps, mobile backups, and cloud data in one platform.
  • Reviewers appreciate the artifact-based analysis, fast indexing, and clear timeline view, which streamline investigations, and the tool's strength in memory forensics, mobile forensics, and chat analysis, which are useful for real-world cases.
  • Reviewers noted that the software requires high system resources, especially RAM and CPU, during large case analysis, and the interface and options can feel overwhelming for beginners, with a steep learning curve and high license cost for students and small labs.
Belkasoft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
43
Features
29
Product Innovation
18
User Interface
17
Setup Ease
16
Cons
Slow Performance
13
Expensive
9
Learning Curve
7
Not Intuitive
5
Difficult Setup
4
Belkasoft features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
9.4
Quality of Support
Average: 8.9
7.6
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
Belkasoft
Year Founded
2002
HQ Location
Sunnyvale, California
Twitter
@Belkasoft
11,062 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 65% Mid-Market
    • 23% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UnderDefense MAXI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    3
    Customer Support
    2
    Cybersecurity
    2
    Information Accuracy
    2
    Issue Resolution
    2
    Cons
    Lack of Automation
    1
    Limited Control
    1
    Limited Integration
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UnderDefense MAXI features and usability ratings that predict user satisfaction
    9.7
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.9
    9.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, NY
    Twitter
    @underdefense
    156 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    134 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 65% Mid-Market
  • 23% Small-Business
UnderDefense MAXI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
3
Customer Support
2
Cybersecurity
2
Information Accuracy
2
Issue Resolution
2
Cons
Lack of Automation
1
Limited Control
1
Limited Integration
1
Setup Difficulty
1
UnderDefense MAXI features and usability ratings that predict user satisfaction
9.7
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.9
9.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, NY
Twitter
@underdefense
156 Twitter followers
LinkedIn® Page
www.linkedin.com
134 employees on LinkedIn®
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Automation Ease
    1
    Customer Support
    1
    Deployment Ease
    1
    Detection Accuracy
    1
    Cons
    Difficult Learning
    1
    Learning Curve
    1
    Not Intuitive
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.9
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,514 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Automation Ease
1
Customer Support
1
Deployment Ease
1
Detection Accuracy
1
Cons
Difficult Learning
1
Learning Curve
1
Not Intuitive
1
Poor Interface Design
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.9
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,514 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.9
    7.4
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,020 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 33% Mid-Market
Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.9
7.4
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,097 Twitter followers
LinkedIn® Page
www.linkedin.com
5,020 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Accuracy
    3
    Ease of Use
    3
    Malware Protection
    3
    Security
    3
    Security Protection
    3
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.9
    7.8
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,252 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Accuracy
3
Ease of Use
3
Malware Protection
3
Security
3
Security Protection
3
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Data Privacy
1
Intezer features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.9
7.8
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,252 Twitter followers
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace / NETWORK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    5
    Artificial Intelligence
    4
    Threat Detection
    4
    Customer Support
    3
    Cybersecurity
    3
    Cons
    Learning Curve
    6
    Expensive
    4
    Alert Issues
    2
    Complex Setup
    2
    False Positives
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace / NETWORK features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.1
    Quality of Support
    Average: 8.9
    7.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Company Website
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,537 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect a

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
Darktrace / NETWORK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
5
Artificial Intelligence
4
Threat Detection
4
Customer Support
3
Cybersecurity
3
Cons
Learning Curve
6
Expensive
4
Alert Issues
2
Complex Setup
2
False Positives
2
Darktrace / NETWORK features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.1
Quality of Support
Average: 8.9
7.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Darktrace
Company Website
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,200 Twitter followers
LinkedIn® Page
www.linkedin.com
2,537 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.9
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LevelBlue
    HQ Location
    Dallas, Texas, United States
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.9
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
LevelBlue
HQ Location
Dallas, Texas, United States
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
(27)4.7 out of 5
6th Easiest To Use in Incident Response software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is an AI-native Autonomous SOC platform designed to evolve traditional Security Orchestration, Automation, and Response (SOAR) into governed, decision-driven security operations. Unlike legacy

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SIRP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.9
    8.8
    Database Management
    Average: 8.4
    9.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    Bethesda, Maryland
    Twitter
    @sirp_io
    72 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is an AI-native Autonomous SOC platform designed to evolve traditional Security Orchestration, Automation, and Response (SOAR) into governed, decision-driven security operations. Unlike legacy

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Customer Support
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
This product has not yet received any negative sentiments.
SIRP features and usability ratings that predict user satisfaction
9.8
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.9
8.8
Database Management
Average: 8.4
9.5
Incident Logs
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
Bethesda, Maryland
Twitter
@sirp_io
72 Twitter followers
LinkedIn® Page
www.linkedin.com
59 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

    Users
    • Information Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogRhythm SIEM features and usability ratings that predict user satisfaction
    8.7
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.9
    8.7
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,371 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    819 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

Users
  • Information Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
LogRhythm SIEM features and usability ratings that predict user satisfaction
8.7
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.9
8.7
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,371 Twitter followers
LinkedIn® Page
www.linkedin.com
819 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cybersecurity
    6
    Easy Setup
    5
    Insights
    5
    Monitoring
    5
    Cons
    Inadequate Reporting
    4
    Poor Reporting
    4
    Lack of Information
    2
    Limited Customization
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.9
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    307 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cybersecurity
6
Easy Setup
5
Insights
5
Monitoring
5
Cons
Inadequate Reporting
4
Poor Reporting
4
Lack of Information
2
Limited Customization
2
Limited Features
2
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.9
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
307 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

    Users
    • SOC Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wazuh - The Open Source Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Affordable
    2
    Cybersecurity
    1
    Easy Management
    1
    Easy Setup
    1
    Cons
    Complex Interface
    2
    Not User-Friendly
    2
    Complex Implementation
    1
    Difficult Learning
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
    8.5
    Threat Intelligence
    Average: 8.7
    8.2
    Quality of Support
    Average: 8.9
    7.9
    Database Management
    Average: 8.4
    9.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Campbell, US
    Twitter
    @wazuh
    7,855 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wazuh is a free and open source security platform that unifies XDR and SIEM capabilities. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh,

Users
  • SOC Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Small-Business
  • 38% Mid-Market
Wazuh - The Open Source Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Affordable
2
Cybersecurity
1
Easy Management
1
Easy Setup
1
Cons
Complex Interface
2
Not User-Friendly
2
Complex Implementation
1
Difficult Learning
1
Difficult Setup
1
Wazuh - The Open Source Security Platform features and usability ratings that predict user satisfaction
8.5
Threat Intelligence
Average: 8.7
8.2
Quality of Support
Average: 8.9
7.9
Database Management
Average: 8.4
9.1
Incident Logs
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Campbell, US
Twitter
@wazuh
7,855 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®