Introducing G2.ai, the future of software buying.Try now

Best Incident Response Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Incident response software automates the process of and/or provides users with the tools necessary to find and resolve security breaches. Companies utilize the tools to monitor networks, infrastructure, and endpoints for intrusions and abnormal activity. They then use the programs to inspect and resolve intrusions and malware in the system. These products provide capabilities to resolve issues that arise after threats have bypassed firewalls and other security mechanisms. They alert administrators of unapproved access of applications and networks. They also have the ability to detect a variety of malware variants. Many tools automate the process of remedying these issues, but others guide users through known resolution processes.

Many incident response solutions function similarly to security information and event management (SIEM) software, but SIEM products provide a larger scope of security and IT management features.

To qualify for inclusion in the Incident Response category, a product must:

Monitor for anomalies within an IT system
Alert users of abnormal activity and detected malware
Automate or guide users through remediation process
Store incident data for analytics and reporting
Show More
Show Less

Featured Incident Response Software At A Glance

Intezer
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
104 Listings in Incident Response Available
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 65% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Information Accuracy
    1
    Investigation
    1
    Response Time
    1
    Security Investigation
    1
    Threat Detection
    1
    Cons
    Alerting Issues
    1
    Alert Management
    1
    Difficult Customization
    1
    Difficult Setup
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    8.7
    Database Management
    Average: 8.4
    9.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,229 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,238 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 65% Mid-Market
  • 32% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Information Accuracy
1
Investigation
1
Response Time
1
Security Investigation
1
Threat Detection
1
Cons
Alerting Issues
1
Alert Management
1
Difficult Customization
1
Difficult Setup
1
Ineffective Alerts
1
InsightIDR features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
8.7
Database Management
Average: 8.4
9.1
Incident Logs
Average: 8.8
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,229 Twitter followers
LinkedIn® Page
www.linkedin.com
3,238 employees on LinkedIn®
Ownership
NASDAQ:RPD
(119)4.6 out of 5
Optimized for quick response
14th Easiest To Use in Incident Response software
View top Consulting Services for Blumira Automated Detection & Response
Save to My Lists
Entry Level Price:$12.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Blumira Automated Detection & Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    30
    Setup Ease
    21
    Alert Management
    19
    Customer Support
    19
    Alerting
    18
    Cons
    Limited Customization
    10
    Alert System
    6
    Expensive
    6
    Faulty Detection
    6
    Inefficient Alerts
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
    9.1
    Threat Intelligence
    Average: 8.7
    9.5
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Blumira
    Company Website
    Year Founded
    2018
    HQ Location
    Ann Arbor, Michigan
    Twitter
    @blumira
    1 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Mid-Market
  • 38% Small-Business
Blumira Automated Detection & Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
30
Setup Ease
21
Alert Management
19
Customer Support
19
Alerting
18
Cons
Limited Customization
10
Alert System
6
Expensive
6
Faulty Detection
6
Inefficient Alerts
5
Blumira Automated Detection & Response features and usability ratings that predict user satisfaction
9.1
Threat Intelligence
Average: 8.7
9.5
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Blumira
Company Website
Year Founded
2018
HQ Location
Ann Arbor, Michigan
Twitter
@blumira
1 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 65% Mid-Market
    • 23% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UnderDefense MAXI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    3
    Customer Support
    2
    Cybersecurity
    2
    Easy Integrations
    2
    Information Accuracy
    2
    Cons
    Lack of Automation
    1
    Limited Control
    1
    Limited Integration
    1
    Setup Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UnderDefense MAXI features and usability ratings that predict user satisfaction
    9.7
    Threat Intelligence
    Average: 8.7
    10.0
    Quality of Support
    Average: 8.8
    9.3
    Database Management
    Average: 8.4
    10.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, NY
    Twitter
    @underdefense
    157 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security and Compliance Automation Platform for complete business protection 24/7. - Monitor and prevent threats 24/7 - Detect, respond, and remediate - Comply with ISO 27001 and SOC 2 - Integrate yo

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 65% Mid-Market
  • 23% Small-Business
UnderDefense MAXI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
3
Customer Support
2
Cybersecurity
2
Easy Integrations
2
Information Accuracy
2
Cons
Lack of Automation
1
Limited Control
1
Limited Integration
1
Setup Difficulty
1
UnderDefense MAXI features and usability ratings that predict user satisfaction
9.7
Threat Intelligence
Average: 8.7
10.0
Quality of Support
Average: 8.8
9.3
Database Management
Average: 8.4
10.0
Incident Logs
Average: 8.8
Seller Details
Year Founded
2017
HQ Location
New York, NY
Twitter
@underdefense
157 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Threat Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Email Security
    2
    Automated Response
    1
    Phishing Prevention
    1
    Security
    1
    Threat Detection
    1
    Cons
    Email Management
    1
    False Positives
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    8.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,065 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Users
No information available
Industries
No information available
Market Segment
  • 53% Mid-Market
  • 24% Small-Business
Proofpoint Threat Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Email Security
2
Automated Response
1
Phishing Prevention
1
Security
1
Threat Detection
1
Cons
Email Management
1
False Positives
1
Learning Curve
1
Proofpoint Threat Response features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
8.5
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,065 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

    Users
    • Student
    Industries
    • Law Enforcement
    • Computer & Network Security
    Market Segment
    • 59% Small-Business
    • 15% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Belkasoft Evidence Center is a digital forensics and incident response (DFIR) tool that consolidates data from various sources into a single platform for streamlined investigations.
    • Users like the tool's intuitive interface, comprehensive training modules, and the integration of AI-powered feature BelkaGPT, which identifies speech and images to uncover key evidence quickly.
    • Reviewers noted that the installation process can be challenging, the interface can feel overwhelming for beginners due to the multitude of features, and the tool lacks support for analyzing some key artifacts.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Belkasoft Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Features
    18
    User Interface
    11
    Time-Saving
    10
    Performance Efficiency
    8
    Cons
    Slow Performance
    6
    Expensive
    5
    Feature Limitations
    3
    Not User-Friendly
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Belkasoft features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    9.4
    Quality of Support
    Average: 8.8
    7.6
    Database Management
    Average: 8.4
    9.0
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Belkasoft
    Year Founded
    2002
    HQ Location
    Sunnyvale, California
    Twitter
    @Belkasoft
    11,074 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Belkasoft X is a complete digital forensic and incident response solution for conducting in-depth investigations on all types of digital media devices and data sources, including computers, mobile dev

Users
  • Student
Industries
  • Law Enforcement
  • Computer & Network Security
Market Segment
  • 59% Small-Business
  • 15% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Belkasoft Evidence Center is a digital forensics and incident response (DFIR) tool that consolidates data from various sources into a single platform for streamlined investigations.
  • Users like the tool's intuitive interface, comprehensive training modules, and the integration of AI-powered feature BelkaGPT, which identifies speech and images to uncover key evidence quickly.
  • Reviewers noted that the installation process can be challenging, the interface can feel overwhelming for beginners due to the multitude of features, and the tool lacks support for analyzing some key artifacts.
Belkasoft Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Features
18
User Interface
11
Time-Saving
10
Performance Efficiency
8
Cons
Slow Performance
6
Expensive
5
Feature Limitations
3
Not User-Friendly
3
UX Improvement
3
Belkasoft features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
9.4
Quality of Support
Average: 8.8
7.6
Database Management
Average: 8.4
9.0
Incident Logs
Average: 8.8
Seller Details
Seller
Belkasoft
Year Founded
2002
HQ Location
Sunnyvale, California
Twitter
@Belkasoft
11,074 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(50)4.6 out of 5
15th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk On-Call features and usability ratings that predict user satisfaction
    0.0
    No information available
    9.2
    Quality of Support
    Average: 8.8
    6.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk On-Call makes on-call management less frustrating while reducing mean time to acknowledge and resolve incidents. Splunk On-Call empowers DevOps teams by delivering alerts to the right people so

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 34% Enterprise
Splunk On-Call features and usability ratings that predict user satisfaction
0.0
No information available
9.2
Quality of Support
Average: 8.8
6.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,782 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(40)4.4 out of 5
View top Consulting Services for Splunk SOAR (Security Orchestration, Automation and Response)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

    Users
    No information available
    Industries
    • Information Technology and Services
    • Consulting
    Market Segment
    • 40% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    3
    Automation
    2
    Detection Accuracy
    2
    Integrations
    2
    Security
    2
    Cons
    Learning Curve
    2
    Complexity
    1
    Difficult Learning
    1
    Expensive
    1
    Not Intuitive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
    8.8
    Threat Intelligence
    Average: 8.7
    8.8
    Quality of Support
    Average: 8.8
    8.0
    Database Management
    Average: 8.4
    8.9
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk SOAR provides security orchestration, automation and response capabilities that allow security analysts to work smarter by automating repetitive tasks; respond to security incidents faster with

Users
No information available
Industries
  • Information Technology and Services
  • Consulting
Market Segment
  • 40% Mid-Market
  • 35% Enterprise
Splunk SOAR (Security Orchestration, Automation and Response) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
3
Automation
2
Detection Accuracy
2
Integrations
2
Security
2
Cons
Learning Curve
2
Complexity
1
Difficult Learning
1
Expensive
1
Not Intuitive
1
Splunk SOAR (Security Orchestration, Automation and Response) features and usability ratings that predict user satisfaction
8.8
Threat Intelligence
Average: 8.7
8.8
Quality of Support
Average: 8.8
8.0
Database Management
Average: 8.4
8.9
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,782 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    8.9
    Quality of Support
    Average: 8.8
    7.4
    Database Management
    Average: 8.4
    8.6
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,065 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,801 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious afte

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 33% Mid-Market
Proofpoint Threat Response Auto-Pull features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
8.9
Quality of Support
Average: 8.8
7.4
Database Management
Average: 8.4
8.6
Incident Logs
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,065 Twitter followers
LinkedIn® Page
www.linkedin.com
4,801 employees on LinkedIn®
Ownership
NASDAQ: PFPT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Mid-Market
    • 6% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darktrace / NETWORK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Artificial Intelligence
    4
    Threat Detection
    4
    Cybersecurity
    3
    Implementation Ease
    3
    Monitoring
    3
    Cons
    Learning Curve
    6
    Expensive
    3
    Alert Issues
    2
    False Positives
    2
    Feature Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darktrace / NETWORK features and usability ratings that predict user satisfaction
    8.3
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    7.7
    Database Management
    Average: 8.4
    8.3
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Darktrace
    Company Website
    Year Founded
    2013
    HQ Location
    Cambridgeshire, England
    Twitter
    @Darktrace
    18,225 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,537 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Darktrace / NETWORK™ is the industry’s most advanced Network Detection and Response (NDR) solution. It learns what normal behavior is for your entire modern network, using Self-Learning AI to detect a

Users
No information available
Industries
No information available
Market Segment
  • 88% Mid-Market
  • 6% Enterprise
Darktrace / NETWORK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Artificial Intelligence
4
Threat Detection
4
Cybersecurity
3
Implementation Ease
3
Monitoring
3
Cons
Learning Curve
6
Expensive
3
Alert Issues
2
False Positives
2
Feature Issues
2
Darktrace / NETWORK features and usability ratings that predict user satisfaction
8.3
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
7.7
Database Management
Average: 8.4
8.3
Incident Logs
Average: 8.8
Seller Details
Seller
Darktrace
Company Website
Year Founded
2013
HQ Location
Cambridgeshire, England
Twitter
@Darktrace
18,225 Twitter followers
LinkedIn® Page
www.linkedin.com
2,537 employees on LinkedIn®
(114)4.4 out of 5
9th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LevelBlue
    HQ Location
    Dallas, Texas, United States
    LinkedIn® Page
    www.linkedin.com
    455 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
LevelBlue
HQ Location
Dallas, Texas, United States
LinkedIn® Page
www.linkedin.com
455 employees on LinkedIn®
(152)4.2 out of 5
View top Consulting Services for LogRhythm SIEM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

    Users
    • Information Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LogRhythm SIEM features and usability ratings that predict user satisfaction
    8.7
    Threat Intelligence
    Average: 8.7
    8.5
    Quality of Support
    Average: 8.8
    8.7
    Database Management
    Average: 8.4
    8.8
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,378 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    874 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rapidly deploy LogRhythm SIEM, the leading self-hosted SIEM, to secure your organization with powerful detections, synchronized threat intelligence, automated workflows, and achieve faster, more accur

Users
  • Information Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
LogRhythm SIEM features and usability ratings that predict user satisfaction
8.7
Threat Intelligence
Average: 8.7
8.5
Quality of Support
Average: 8.8
8.7
Database Management
Average: 8.4
8.8
Incident Logs
Average: 8.8
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,378 Twitter followers
LinkedIn® Page
www.linkedin.com
874 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

    Users
    • Software Engineer
    • Student
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intezer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Detection Accuracy
    2
    Ease of Use
    2
    Information Accuracy
    2
    Malware Protection
    2
    Cons
    Complex Interface
    2
    Poor Interface Design
    2
    UX Improvement
    2
    Access Control
    1
    Data Privacy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intezer features and usability ratings that predict user satisfaction
    8.9
    Threat Intelligence
    Average: 8.7
    8.6
    Quality of Support
    Average: 8.8
    7.8
    Database Management
    Average: 8.4
    9.4
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intezer
    Year Founded
    2015
    HQ Location
    New York
    Twitter
    @IntezerLabs
    10,295 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intezer automates the entire alert triage process, like an extension of your team handling Tier 1 SOC tasks for every alert at machine-speed. Intezer monitors incoming incidents from endpoint, reporte

Users
  • Software Engineer
  • Student
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 23% Mid-Market
Intezer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Detection Accuracy
2
Ease of Use
2
Information Accuracy
2
Malware Protection
2
Cons
Complex Interface
2
Poor Interface Design
2
UX Improvement
2
Access Control
1
Data Privacy
1
Intezer features and usability ratings that predict user satisfaction
8.9
Threat Intelligence
Average: 8.7
8.6
Quality of Support
Average: 8.8
7.8
Database Management
Average: 8.4
9.4
Incident Logs
Average: 8.8
Seller Details
Seller
Intezer
Year Founded
2015
HQ Location
New York
Twitter
@IntezerLabs
10,295 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cybersecurity
    6
    Easy Setup
    5
    Insights
    5
    Monitoring
    5
    Cons
    Inadequate Reporting
    4
    Poor Reporting
    4
    Lack of Information
    2
    Limited Customization
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.2
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.3
    Database Management
    Average: 8.4
    9.2
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cybersecurity
6
Easy Setup
5
Insights
5
Monitoring
5
Cons
Inadequate Reporting
4
Poor Reporting
4
Lack of Information
2
Limited Customization
2
Limited Features
2
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.2
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.3
Database Management
Average: 8.4
9.2
Incident Logs
Average: 8.8
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
309 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(27)4.7 out of 5
6th Easiest To Use in Incident Response software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SIRP features and usability ratings that predict user satisfaction
    9.8
    Threat Intelligence
    Average: 8.7
    9.8
    Quality of Support
    Average: 8.8
    8.8
    Database Management
    Average: 8.4
    9.5
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SIRP
    Year Founded
    2017
    HQ Location
    London
    Twitter
    @sirp_io
    73 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    60 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response. Through a single integrated plat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Small-Business
  • 37% Mid-Market
SIRP features and usability ratings that predict user satisfaction
9.8
Threat Intelligence
Average: 8.7
9.8
Quality of Support
Average: 8.8
8.8
Database Management
Average: 8.4
9.5
Incident Logs
Average: 8.8
Seller Details
Seller
SIRP
Year Founded
2017
HQ Location
London
Twitter
@sirp_io
73 Twitter followers
LinkedIn® Page
www.linkedin.com
60 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
    8.1
    Threat Intelligence
    Average: 8.7
    9.2
    Quality of Support
    Average: 8.8
    8.1
    Database Management
    Average: 8.4
    9.1
    Incident Logs
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to d

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 40% Small-Business
Splunk Synthetic Monitoring features and usability ratings that predict user satisfaction
8.1
Threat Intelligence
Average: 8.7
9.2
Quality of Support
Average: 8.8
8.1
Database Management
Average: 8.4
9.1
Incident Logs
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,782 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO