Introducing G2.ai, the future of software buying.Try now

Best Incident Response Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Incident response software automates the process of and/or provides users with the tools necessary to find and resolve security breaches. Companies utilize the tools to monitor networks, infrastructure, and endpoints for intrusions and abnormal activity. They then use the programs to inspect and resolve intrusions and malware in the system. These products provide capabilities to resolve issues that arise after threats have bypassed firewalls and other security mechanisms. They alert administrators of unapproved access of applications and networks. They also have the ability to detect a variety of malware variants. Many tools automate the process of remedying these issues, but others guide users through known resolution processes.

Many incident response solutions function similarly to security information and event management (SIEM) software, but SIEM products provide a larger scope of security and IT management features.

To qualify for inclusion in the Incident Response category, a product must:

Monitor for anomalies within an IT system
Alert users of abnormal activity and detected malware
Automate or guide users through remediation process
Store incident data for analytics and reporting
Show More
Show Less

Featured Incident Response Software At A Glance

Cydarm
Sponsored
Highest Performer:
Top Trending:
Show LessShow More
Highest Performer:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Incident Response Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
104 Listings in Incident Response Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 65% Mid-Market
    • 23% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UnderDefense MAXI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    3
    Customer Support
    2
    Cybersecurity
    2
    Easy Integrations
    2
    Information Accuracy
    2
    Cons
    Lack of Automation
    1
    Limited Control
    1
    Limited Integration
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UnderDefense MAXI features and usability ratings that predict user satisfaction
    9.7
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    9.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, NY
    Twitter
    @underdefense
    158 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 65% Mid-Market
  • 23% Small-Business
UnderDefense MAXI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
3
Customer Support
2
Cybersecurity
2
Easy Integrations
2
Information Accuracy
2
Cons
Lack of Automation
1
Limited Control
1
Limited Integration
1
Setup Difficulty
1
UnderDefense MAXI features and usability ratings that predict user satisfaction
9.7
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
9.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, NY
Twitter
@underdefense
158 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
(119)4.6 out of 5
Optimized for quick response
13th Easiest To Use in Incident Response software
View top Consulting Services for Blumira Automated Detection & Response
Save to My Lists
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Setup Ease
    21
    Alert Management
    19
    Customer Support
    19
    Alerting
    18
    Cons
    Limited Customization
    10
    Alert System
    6
    Expensive
    6
    Faulty Detection
    6
    Inefficient Alerts
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    9.5
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Setup Ease
21
Alert Management
19
Customer Support
19
Alerting
18
Cons
Limited Customization
10
Alert System
6
Expensive
6
Faulty Detection
6
Inefficient Alerts
5
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
9.5
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Threat Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    2
    Automated Response
    1
    Phishing Prevention
    1
    Security
    1
    Threat Detection
    1
    Cons
    Email Management
    1
    False Positives
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,082 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Small-Business
Proofpoint Threat Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
2
Automated Response
1
Phishing Prevention
1
Security
1
Threat Detection
1
Cons
Email Management
1
False Positives
1
Learning Curve
1
Proofpoint Threat Response features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,082 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(114)4.4 out of 5
7th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LevelBlue USM Anywhere Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LevelBlue
    HQ Location
    Dallas, Texas, United States
    LinkedIn® Page
    www.linkedin.com
    455 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
LevelBlue USM Anywhere Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
LevelBlue
HQ Location
Dallas, Texas, United States
LinkedIn® Page
www.linkedin.com
455 employees on LinkedIn®
(50)4.6 out of 5
15th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk On-Call features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    723,927 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 34% Enterprise
Splunk On-Call features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
723,927 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    7.4
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,082 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 33% Mid-Market
Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
7.4
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,082 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR, Darktrace brings its powerful, multi-layered AI to your data to neutralize known and unknown threats in real time. While other N

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Mid-Market
    • 6% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace/Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Artificial Intelligence
    4
    Threat Detection
    4
    Cybersecurity
    3
    Implementation Ease
    3
    Monitoring
    3
    Cons
    Learning Curve
    6
    Expensive
    3
    Alert Issues
    2
    False Positives
    2
    Feature Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace/Network features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    7.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Company Website
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,239 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,527 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for NDR, Darktrace brings its powerful, multi-layered AI to your data to neutralize known and unknown threats in real time. While other N

Users
No information available
Industries
No information available
Market Segment
  • 88% Mid-Market
  • 6% Enterprise
Darktrace/Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Artificial Intelligence
4
Threat Detection
4
Cybersecurity
3
Implementation Ease
3
Monitoring
3
Cons
Learning Curve
6
Expensive
3
Alert Issues
2
False Positives
2
Feature Issues
2
Darktrace/Network features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
7.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Darktrace
Company Website
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,239 Twitter followers
LinkedIn® Page
www.linkedin.com
2,527 employees on LinkedIn®
(152)4.2 out of 5
View top Consulting Services for LogRhythm SIEM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

    Users
    • Information Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogRhythm SIEM features and usability ratings that predict user satisfaction
    8.7
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.8
    8.7
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    874 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

Users
  • Information Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
LogRhythm SIEM features and usability ratings that predict user satisfaction
8.7
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.8
8.7
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,387 Twitter followers
LinkedIn® Page
www.linkedin.com
874 employees on LinkedIn®
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Automation
    2
    Detection Accuracy
    2
    Integrations
    2
    Security
    2
    Cons
    Learning Curve
    2
    Complexity
    1
    Difficult Learning
    1
    Expensive
    1
    Not Intuitive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    723,927 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Automation
2
Detection Accuracy
2
Integrations
2
Security
2
Cons
Learning Curve
2
Complexity
1
Difficult Learning
1
Expensive
1
Not Intuitive
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
723,927 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 41% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OneTrust Tech Risk & Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Compliance Management
    5
    Automation
    4
    Compliance Simplification
    3
    Helpful
    3
    Cons
    UX Improvement
    4
    Complex Implementation
    3
    Difficult Customization
    3
    Difficult Setup
    3
    Not User-Friendly
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    9.0
    Quality of Support
    Average: 8.8
    9.2
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OneTrust
    Company Website
    Year Founded
    2016
    HQ Location
    Atlanta, Georgia
    Twitter
    @OneTrust
    6,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,558 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OneTrust's Tech Risk & Compliance solution simplifies compliance and effectively manage risks. You can scale your resources and optimize your risk and compliance lifecycle by automating governance

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 41% Small-Business
OneTrust Tech Risk & Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Compliance Management
5
Automation
4
Compliance Simplification
3
Helpful
3
Cons
UX Improvement
4
Complex Implementation
3
Difficult Customization
3
Difficult Setup
3
Not User-Friendly
3
OneTrust Tech Risk & Compliance features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
9.0
Quality of Support
Average: 8.8
9.2
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
OneTrust
Company Website
Year Founded
2016
HQ Location
Atlanta, Georgia
Twitter
@OneTrust
6,560 Twitter followers
LinkedIn® Page
www.linkedin.com
2,558 employees on LinkedIn®
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Mid-Market
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Information Accuracy
    1
    Investigation
    1
    Response Time
    1
    Security Investigation
    1
    Threat Detection
    1
    Cons
    Alerting Issues
    1
    Alert Management
    1
    Difficult Customization
    1
    Difficult Setup
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    8.7
    Database Management
    Average: 8.4
    9.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,143 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,071 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Mid-Market
  • 30% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Information Accuracy
1
Investigation
1
Response Time
1
Security Investigation
1
Threat Detection
1
Cons
Alerting Issues
1
Alert Management
1
Difficult Customization
1
Difficult Setup
1
Ineffective Alerts
1
InsightIDR features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
8.7
Database Management
Average: 8.4
9.1
Incident Logs
Average: 8.8
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,143 Twitter followers
LinkedIn® Page
www.linkedin.com
3,071 employees on LinkedIn®
Ownership
NASDAQ:RPD
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    2
    Real-time Monitoring
    2
    Threat Detection
    2
    Affordable
    1
    Alerts
    1
    Cons
    Integration Issues
    1
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    310 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
2
Real-time Monitoring
2
Threat Detection
2
Affordable
1
Alerts
1
Cons
Integration Issues
1
Poor Integration
1
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
310 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(27)4.7 out of 5
6th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.8
    Database Management
    Average: 8.4
    9.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    71 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.8
Database Management
Average: 8.4
9.5
Incident Logs
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
71 Twitter followers
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

    Users
    No information available
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 15% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
    • Users frequently mention the user-friendly interface, the ease of learning its features, the prompt customer service, and the tool's ability to extract data from various sources rapidly.
    • Reviewers experienced difficulty in figuring out where some features existed, the absence of an overall search option, occasional slow response times, and issues with mobile extractions requiring frequent updates.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Belkasoft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    15
    Customer Support
    7
    Training
    7
    Artificial Intelligence
    6
    Cons
    Expensive
    5
    Slow Performance
    3
    Difficult Setup
    2
    Not User-Friendly
    2
    Poor Navigation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Belkasoft features and usability ratings that predict user satisfaction
    8.6
    Threat Intelligence
    Average: 8.7
    9.4
    Quality of Support
    Average: 8.8
    7.6
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Belkasoft
    Year Founded
    2002
    HQ Location
    Sunnyvale, California
    Twitter
    @Belkasoft
    11,059 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

Users
No information available
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 15% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Belkasoft X is a digital forensics and incident response tool that consolidates vital incident response data in one location and offers features for data collection, analysis, and visualization.
  • Users frequently mention the user-friendly interface, the ease of learning its features, the prompt customer service, and the tool's ability to extract data from various sources rapidly.
  • Reviewers experienced difficulty in figuring out where some features existed, the absence of an overall search option, occasional slow response times, and issues with mobile extractions requiring frequent updates.
Belkasoft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
15
Customer Support
7
Training
7
Artificial Intelligence
6
Cons
Expensive
5
Slow Performance
3
Difficult Setup
2
Not User-Friendly
2
Poor Navigation
2
Belkasoft features and usability ratings that predict user satisfaction
8.6
Threat Intelligence
Average: 8.7
9.4
Quality of Support
Average: 8.8
7.6
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
Belkasoft
Year Founded
2002
HQ Location
Sunnyvale, California
Twitter
@Belkasoft
11,059 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 55% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Accuracy
    3
    Ease of Use
    3
    Security
    3
    Accuracy of Information
    2
    Customer Support
    2
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    7.8
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,331 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 55% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Accuracy
3
Ease of Use
3
Security
3
Accuracy of Information
2
Customer Support
2
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Alert Issues
1
Intezer features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
7.8
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,331 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®