InsightIDR Features
Response (7)
Resolution Automation
Based on 41 InsightIDR reviews. Diagnose and resolve incidents without the need for human interaction.
Resolution Guidance
As reported in 42 InsightIDR reviews. Guide users through the resolution process and give specific instructions to remedy individual occurrences.
System Isolation
As reported in 41 InsightIDR reviews. Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Threat Intelligence
Gathers information related to threats in order to gain further information on remedies. This feature was mentioned in 42 InsightIDR reviews.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Response Orchestration
Integrates additional security tools to automate security and incident response processes.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly
Records (3)
Incident Logs
As reported in 42 InsightIDR reviews. Information on each incident is stored in databases for user reference and analytics.
Incident Reports
Based on 42 InsightIDR reviews. Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Resource Usage
Analyzes recurring incidents and remedies to ensure optimal resource usage. 42 reviewers of InsightIDR have provided feedback on this feature.
Management (6)
Incident Alerts
As reported in 43 InsightIDR reviews. Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Database Management
Adminstrators can access and organize data related to incidents to produce reports or make data more navigable. This feature was mentioned in 40 InsightIDR reviews.
Workflow Management
As reported in 40 InsightIDR reviews. Administrators can organize workflows to guide remedies to specific situations incident types.
Extensibility
Allows for customized support for hybrid environments
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Unified Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Network Management (3)
Activity Monitoring
Based on 18 InsightIDR reviews and verified by the G2 Product R&D team. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Asset Management
Based on 17 InsightIDR reviews and verified by the G2 Product R&D team. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Log Management
Based on 18 InsightIDR reviews and verified by the G2 Product R&D team. Provides security information and stores the data in a secure repository for reference.
Incident Management (6)
Event Management
Based on 17 InsightIDR reviews and verified by the G2 Product R&D team. Alerts users of incidents and allows users to intervene manually or triggers an automated response.
Automated Response
Based on 15 InsightIDR reviews and verified by the G2 Product R&D team. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reporting
Based on 17 InsightIDR reviews and verified by the G2 Product R&D team. Documents cases of abnormal activity and compromised systems.
Incident Logs
Information on each incident is stored in databases for user reference and analytics.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Incident Reporting
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Security Intelligence (4)
Threat Intelligence
Based on 17 InsightIDR reviews and verified by the G2 Product R&D team. Stores information related to common threats and how to resolve them once incidents occur.
Vulnerability Assessment
Based on 16 InsightIDR reviews and verified by the G2 Product R&D team. Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.
Advanced Analytics
Based on 17 InsightIDR reviews and verified by the G2 Product R&D team. Allows users to customize analytics with granulized metrics that are pertinent to your specific resources.
Data Examination
Based on 18 InsightIDR reviews and verified by the G2 Product R&D team. Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents.
Automation (4)
Metadata Management
Indexes metadata descriptions for easier searching and enhanced insights
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) or Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Functionality (4)
Multi-Network Capability
Provides monitoring capabilities for multiple networks at once.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Network Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Scalability
Provides features to allow scaling for large organizations.
Analysis (8)
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Data Context
Provide insights into why trends are occurring and what issues could be related.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Incident Reporting
Produces reports detailing trends and vulnerabilities related to their network and infrastructur
Network Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Metadata Enrichment
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Metadata Management
Indexes metadata descriptions for easier searching and enhanced insight
Detection (6)
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. This feature was mentioned in 10 InsightIDR reviews.
Activity Monitoring
Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
Multi-Network Monitoring
Provides monitoring capabilities for multiple networks at once.
Asset Discovery
Detect new assets as they enter a network and add them to asset inventory.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns
Detection & Response (4)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Rule-Based Detection
Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
Constantly monitors system to detect anomalies in real time.
Analytics (3)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Generative AI (2)
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Security Information and Event Management (SIEM) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - User and Entity Behavior Analytics (UEBA) (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Services - Network Detection and Response (NDR) (1)
Managed Services
Offers managed network detection and response services.
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.




