Introducing G2.ai, the future of software buying.Try now

Best Incident Response Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Incident response software automates the process of and/or provides users with the tools necessary to find and resolve security breaches. Companies utilize the tools to monitor networks, infrastructure, and endpoints for intrusions and abnormal activity. They then use the programs to inspect and resolve intrusions and malware in the system. These products provide capabilities to resolve issues that arise after threats have bypassed firewalls and other security mechanisms. They alert administrators of unapproved access of applications and networks. They also have the ability to detect a variety of malware variants. Many tools automate the process of remedying these issues, but others guide users through known resolution processes.

Many incident response solutions function similarly to security information and event management (SIEM) software, but SIEM products provide a larger scope of security and IT management features.

To qualify for inclusion in the Incident Response category, a product must:

Monitor for anomalies within an IT system
Alert users of abnormal activity and detected malware
Automate or guide users through remediation process
Store incident data for analytics and reporting
Show More
Show Less

Featured Incident Response Software At A Glance

Intezer
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Incident Response Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
104 Listings in Incident Response Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach w

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Continuity Engine Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Implementation Ease
    1
    Monitoring
    1
    Performance Efficiency
    1
    Setup Ease
    1
    Time-saving
    1
    Cons
    Difficult Setup
    1
    Poor Documentation
    1
    Setup Difficulty
    1
    Unclear Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Engine features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    7.5
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Neverfail
    Year Founded
    1993
    HQ Location
    Austin, US
    Twitter
    @neverfail
    1,026 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach w

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Continuity Engine Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Implementation Ease
1
Monitoring
1
Performance Efficiency
1
Setup Ease
1
Time-saving
1
Cons
Difficult Setup
1
Poor Documentation
1
Setup Difficulty
1
Unclear Documentation
1
Continuity Engine features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
7.5
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Neverfail
Year Founded
1993
HQ Location
Austin, US
Twitter
@neverfail
1,026 Twitter followers
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security QRadar Network Detection and Response (NDR is a comprehensive solution designed to enhance network security by providing real-time visibility and advanced analytics. By analyzing network

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security QRadar NDR features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    6.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    708,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security QRadar Network Detection and Response (NDR is a comprehensive solution designed to enhance network security by providing real-time visibility and advanced analytics. By analyzing network

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
IBM Security QRadar NDR features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
6.7
Incident Logs
Average: 8.8
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
708,968 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Canary Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Affordable
    1
    Ease of Use
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Canary features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Canary Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Affordable
1
Ease of Use
1
Cons
This product has not yet received any negative sentiments.
Canary features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CimSweep features and usability ratings that predict user satisfaction
    0.0
    No information available
    3.3
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GitHub
    Year Founded
    2008
    HQ Location
    San Francisco, CA
    Twitter
    @github
    2,597,040 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,874 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
CimSweep features and usability ratings that predict user satisfaction
0.0
No information available
3.3
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
GitHub
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@github
2,597,040 Twitter followers
LinkedIn® Page
www.linkedin.com
5,874 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cofense Triage is the first phishing-specific incident response platform that allows security operation (SOC) and incident responders to automate the prioritization, analysis and response to phishing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cofense Triage features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.3
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cofense
    Year Founded
    2011
    HQ Location
    Leesburg, Virginia
    Twitter
    @Cofense
    5,980 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cofense Triage is the first phishing-specific incident response platform that allows security operation (SOC) and incident responders to automate the prioritization, analysis and response to phishing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Cofense Triage features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.3
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Cofense
Year Founded
2011
HQ Location
Leesburg, Virginia
Twitter
@Cofense
5,980 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GreatHorn features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GreatHorn
    HQ Location
    Waltham, US
    Twitter
    @greathorn
    790 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
GreatHorn features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
GreatHorn
HQ Location
Waltham, US
Twitter
@greathorn
790 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deliver real-time messages across dispersed audiences, providing relevant information during critical incidents to ensure business continuity.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Klaxon - Incident Management features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Klaxon
    Year Founded
    2015
    HQ Location
    Leeds, GB
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Deliver real-time messages across dispersed audiences, providing relevant information during critical incidents to ensure business continuity.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Klaxon - Incident Management features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Klaxon
Year Founded
2015
HQ Location
Leeds, GB
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    8.7
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    14,153 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
8.7
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
14,153 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Radar® Privacy is an award-winning SaaS solution that employs patented automation to streamline the management of data privacy and security incidents containing personal information to ensure complian

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Radar Privacy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Portland, US
    Twitter
    @radarfirst
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    66 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Radar® Privacy is an award-winning SaaS solution that employs patented automation to streamline the management of data privacy and security incidents containing personal information to ensure complian

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Radar Privacy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Portland, US
Twitter
@radarfirst
442 Twitter followers
LinkedIn® Page
www.linkedin.com
66 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Radiant Security delivers a centralized AI SOC platform that unifies agentic AI triage, integrated response, and log management in a single solution. The platform provides 100% alert triage coverage a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Radiant Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting System
    1
    Automated Response
    1
    Dashboard Customization
    1
    Detection Accuracy
    1
    Integration Capabilities
    1
    Cons
    Insufficient Information
    1
    Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Radiant features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    10.0
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Milpitas, California, United States
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Radiant Security delivers a centralized AI SOC platform that unifies agentic AI triage, integrated response, and log management in a single solution. The platform provides 100% alert triage coverage a

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Radiant Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting System
1
Automated Response
1
Dashboard Customization
1
Detection Accuracy
1
Integration Capabilities
1
Cons
Insufficient Information
1
Limitations
1
Radiant features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
10.0
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2021
HQ Location
Milpitas, California, United States
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SAINTCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    2
    Asset Management
    1
    Coverage
    1
    Deployment Ease
    1
    Ease of Implementation
    1
    Cons
    Inadequate Reporting
    2
    Limited Features
    2
    Missing Features
    2
    Poor Reporting
    2
    Asset Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAINTCloud features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    6.7
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Bethesda, MD
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to i

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SAINTCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
2
Asset Management
1
Coverage
1
Deployment Ease
1
Ease of Implementation
1
Cons
Inadequate Reporting
2
Limited Features
2
Missing Features
2
Poor Reporting
2
Asset Management
1
SAINTCloud features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
6.7
Incident Logs
Average: 8.8
Seller Details
Year Founded
1998
HQ Location
Bethesda, MD
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Siren is an all-in-one investigation platform used by organizations to safeguard people, assets and networks. Using AI, automation and advanced search, Siren links data from open source, vendors and c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Siren Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Data Analytics
    2
    Analytics
    1
    Automation
    1
    Features
    1
    Cons
    Expensive
    1
    Limited Customization
    1
    Limited Features
    1
    System Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Siren features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Siren.io
    Year Founded
    2014
    HQ Location
    Galway, County Galway, Ireland
    Twitter
    @sirensearch
    1,184 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Siren is an all-in-one investigation platform used by organizations to safeguard people, assets and networks. Using AI, automation and advanced search, Siren links data from open source, vendors and c

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Siren Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Data Analytics
2
Analytics
1
Automation
1
Features
1
Cons
Expensive
1
Limited Customization
1
Limited Features
1
System Limitations
1
Siren features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Quality of Support
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Siren.io
Year Founded
2014
HQ Location
Galway, County Galway, Ireland
Twitter
@sirensearch
1,184 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strand is a post-triage automation platform built for DFIR teams, cybersecurity consultants, and MSPs. It accelerates the slowest parts of incident response: evidence collection, timeline construction

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Strand Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    User Interface
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strand features and usability ratings that predict user satisfaction
    10.0
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    0.0
    No information available
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Strand is a post-triage automation platform built for DFIR teams, cybersecurity consultants, and MSPs. It accelerates the slowest parts of incident response: evidence collection, timeline construction

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Strand Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
User Interface
1
Cons
This product has not yet received any negative sentiments.
Strand features and usability ratings that predict user satisfaction
10.0
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
0.0
No information available
8.3
Incident Logs
Average: 8.8
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Control your website traffic with pat. pending click and block tech.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActivShield features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Boca Raton, US
    Twitter
    @ActivShield
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Control your website traffic with pat. pending click and block tech.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ActivShield features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Boca Raton, US
Twitter
@ActivShield
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
0 ratings
Save to My Lists
Entry Level Price:Starting at $4.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AirMDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AirMDR
    Year Founded
    2023
    HQ Location
    Menlo Park, US
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Innovative MDR Services Powered by AI Virtual Analysts AirMDR delivers the first Managed Detection and Response (MDR) service primarily operated by AI-powered virtual analysts. This innovation mate

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AirMDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AirMDR
Year Founded
2023
HQ Location
Menlo Park, US
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®