Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated CimSweep Alternatives

CimSweep Reviews & Product Details

CimSweep Overview

What is CimSweep?

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

CimSweep Details
Show LessShow More
Product Description

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.


Seller Details
Seller
GitHub
Year Founded
2008
HQ Location
San Francisco, CA
Twitter
@github
2,613,551 Twitter followers
LinkedIn® Page
www.linkedin.com
6,253 employees on LinkedIn®
Description

GitHub Inc. provides code hosting services. It allows users to share codes with friends, co-workers, classmates, and strangers; offers control system for the collaborative development of software; allows users to fork, send pull requests, and manage various public and private repositories; and offers collaborator management, wikis, downloads, code review, and graphs. The company allows individuals and team members to discuss about codes; and track and assign issues to other teammates. GitHub Inc. was founded in 2008 and is based in San Francisco, California.

Recent CimSweep Reviews

Verified User
A
Verified UserEnterprise (> 1000 emp.)
3.5 out of 5
"Powershell for the win!"
Powershell-based commands makes discovery so much easier. I've got scripts written to speed up the whole process. Using the standard windows tools ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

CimSweep Media

Answer a few questions to help the CimSweep community
Have you used CimSweep before?
Yes

1 CimSweep Reviews

3.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 CimSweep Reviews
3.5 out of 5
1 CimSweep Reviews
3.5 out of 5
G2 reviews are authentic and verified.
Verified User in Gambling & Casinos
AG
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about CimSweep?

Powershell-based commands makes discovery so much easier. I've got scripts written to speed up the whole process. Using the standard windows tools (powershell) and adding to them is a great way to implement this solution, since I can bring other tools into powershell to aid in my discovery process. Review collected by and hosted on G2.com.

What do you dislike about CimSweep?

Support can be challenging, but so far I haven't had too many issues. Review collected by and hosted on G2.com.

What problems is CimSweep solving and how is that benefiting you?

Responding to security incidents and gathering evidence. Review collected by and hosted on G2.com.

There are not enough reviews of CimSweep for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,323)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Datadog Logo
Datadog
4.3
(541)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
3
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.6
(483)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
4
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
5
IBM Instana Logo
IBM Instana
4.4
(389)
Instana automatically discovers, maps, and monitors all services and infrastructure components across on-prem and cloud, providing AI-driven application context, issue remediation to enhance IT operations. Instana’s zero-configuration dashboards help reduce toil for SRE and DevOps teams, helping them spend more innovating than troubleshooting. Its automated playbooks seamlessly address common issues and precise ML-driven alerts help manage rapid change, thereby enhancing infrastructure availability. These capabilities in help in predicting and managing IT budgets to support increase in demand during peak cycles.​
6
Sumo Logic Logo
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
7
Tines Logo
Tines
4.8
(240)
Tines allows security teams automate any workflow regardless of complexity. It works by receiving or fetching alerts from external systems. Tines can perform an unlimited number of steps including log and threat intelligence searches to reliably determine if the alert warrants action.
8
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(208)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
9
Intezer Logo
Intezer
4.5
(192)
Automate your malware analysis. Get answers quickly about any suspicious file, URL, endpoint or memory dump.
10
Resolver Logo
Resolver
4.3
(160)
All implementations include training and advice on the most effective way to manage your processes within the application.
Show More