CimSweep

3.5
(1)

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

Work for CimSweep?

Learning about CimSweep?

We can help you find the solution that fits you best.

CimSweep Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 CimSweep review
LinkedIn Connections
AG
Administrator in Gambling & Casinos
Validated Reviewer
Verified Current User
Review Source
content

"Powershell for the win!"

What do you like best?

Powershell-based commands makes discovery so much easier. I've got scripts written to speed up the whole process. Using the standard windows tools (powershell) and adding to them is a great way to implement this solution, since I can bring other tools into powershell to aid in my discovery process.

What do you dislike?

Support can be challenging, but so far I haven't had too many issues.

What problems are you solving with the product? What benefits have you realized?

Responding to security incidents and gathering evidence.

Sign in to G2 to see what your connections have to say about CimSweep

What Incident Response solution do you use?

Thanks for letting us know!

There are not enough reviews of CimSweep for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sumo Logic Logo
Sumo Logic
4.3
(215)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
2
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(96)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
3
D3 Security Logo
D3 Security
4.1
(56)
D3 Security provides a proven incident management platform that empowers security operations with a full-lifecycle remediation solution and a single tool to determine the root cause of and corrective action for any threat- be it cyber, physical, financial, IP or reputational.
4
InsightIDR Logo
InsightIDR
4.4
(30)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
5
Cb Response Logo
Cb Response
4.2
(27)
Cb Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
6
Swimlane Logo
Swimlane
4.4
(23)
Swimlane is a security platform designed to prioritize alerts, remediate threats and improve operational performances.
7
LogRhythm Logo
LogRhythm
3.7
(25)
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
8
Trend Micro Smart Protection Logo
Trend Micro Smart Protection
4.0
(28)
Trend Micro develops server security, cloud security, and small business content security solutions.
9
DERDACK Enterprise Alert Logo
DERDACK Enterprise Alert
4.8
(22)
DERDACK Enterprise Alert® combines automated alert notification workflows, 24/7 duty scheduling, ad-hoc collaboration and anywhere IT troubleshooting – reducing unexpected IT downtimes at large enterprises and organizations by 60%.
10
Vectra AI Logo
Vectra AI
4.0
(15)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
Show more
Kate from G2

Learning about CimSweep?

I can help.
* We monitor all CimSweep reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.