This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Dropzone AI Reviews & Product Details

Profile Status

This profile is currently managed by Dropzone AI but has limited features.

Are you part of the Dropzone AI team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Dropzone AI before?

Answer a few questions to help the Dropzone AI community

Dropzone AI Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Dropzone AI for G2 to provide buying insight. Below are some alternatives with more reviews:

1
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.5
(552)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
2
Tines Logo
Tines
4.7
(397)
Tines is an intelligent workflow platform that powers the world’s most important workflows. IT and security teams of all sizes, from Fortune 50 to startups, trust Tines for everything from phishing response, vulnerability and patch management, software lifecycle management, employee lifecycle management, and everything in between. Leaders across a wide array of industries –including Canva, Databricks, Elastic, Kayak, Intercom, and McKesson– use Tines AI-powered workflows to operate more effectively, mitigate risk, reduce tech debt, and do the work that matters most. Our workflow platform gives teams of any skillset (the most technical to your least technical) the tools to orchestrate, automate, and integrate your people, processes, and technology.
3
Sumo Logic Logo
Sumo Logic
4.3
(393)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
4
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(391)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
5
IBM QRadar SIEM Logo
IBM QRadar SIEM
4.4
(334)
IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on severity, helping quickly uncover critical threats while reducing false positives.
6
Microsoft Sentinel Logo
Microsoft Sentinel
4.4
(293)
Microsoft Azure Sentinel is a cloud-native SIEM that provides intelligent security analytics for your entire enterprise, powered by AI.
7
Cynet Logo
Cynet
4.7
(250)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
8
Splunk Enterprise Security Logo
Splunk Enterprise Security
4.3
(246)
Splunk Enterprise Security (ES) is a SIEM software that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to enables security teams to quickly detect and respond to internal and external attacks to simplify threat management while minimizing risk and safeguarding business
9
SentinelOne Singularity Endpoint Logo
SentinelOne Singularity Endpoint
4.7
(201)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
10
Intezer Logo
Intezer
4.5
(193)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Dropzone AI