Zabbix is a comprehensive monitoring solution that is widely used across various industries. Its primary use case is for monitoring infrastructure, including physical, virtual, and network aspects.
Zabbix helps organizations by providing valuable metrics for preventive maintenance and capacity planning, proactive monitoring and alerting, monitoring a wide range of hardware equipment, optimizing work processes, improving customer experiences, enabling remote appointments with visual communication, and providing an overview of bandwidth consumption.
With Zabbix, organizations can conveniently monitor network metrics in one place, saving time and improving efficiency.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
PRTG Network Monitor runs on a Windows machine within your network, collecting various statistics from the machines, software, and devices which you designate. PRTG comes with an easy-to-use web interface with point-and-click configuration. You can easily share data from it with non-technical colleagues and customers, including via live graphs and custom reports. This will let you plan for network expansion, see what applications are using most of your connection, and make sure that no one is hogging the entire network just to torrent videos.
Licenses are very expensive, so I would like to see cheaper licensing.
If you're looking for a cost effective software I’d suggest this product.
Licenses are very expensive, so I would like to see cheaper licensing.
If you're looking for a cost effective software I’d suggest this product.
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
It is worth the cost.
Pricing is much higher compared to other solutions.
It is worth the cost.
Pricing is much higher compared to other solutions.
Remote secure access VPN is a solution that provides users with remote access to an organization’s network. The host may have VPN client software loaded or use a web-based client. The solution leverages security features like multi-factor authentication, endpoint scanning, and encryption of all data in motion.
The price of this product is good.
Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.
The price of this product is good.
Organizations that already have the Check Point NGFW need to purchase an additional license to have access to the VPN functionality.
FortiSIEM (formerly AccelOps 4) provides an actionable security intelligence platform to monitor security, performance and compliance through a single pane of glass.
Please be cheaper and more simplified.
We bought the perpetual license, so we own the product, but there is a three-year support renewal fee for that.
Please be cheaper and more simplified.
We bought the perpetual license, so we own the product, but there is a three-year support renewal fee for that.
In the past, industrial control systems weren’t considered high risk for cyberattacks because they weren’t connected to enterprise systems or the internet.
Today, the use of common technology platforms, IT/OT data sharing, and cloud-based applications and analytics have made OT and IoT systems a primary target for threat actors. CIOs and CISOs are now expected to protect the entire IT/OT landscape, including all physical assets and industrial processes. To achieve this, OT and IoT security needs to be part of an overall digital security strategy managed by a collaborative IT/OT team.
I have not seen any competition in terms of pricing, and it is quite reasonable.
I have not seen any competition in terms of pricing, and it is quite reasonable.
For our environment, we pay approximately $25,000 USD yearly.
The licensing for this solution is based on the number of nodes.
For our environment, we pay approximately $25,000 USD yearly.
The licensing for this solution is based on the number of nodes.
BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.
This product provides value for money.
Bomgar has a very fair pricing structure.
This product provides value for money.
Bomgar has a very fair pricing structure.
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
The licensing cost for this solution is based on the number of endpoints.
The price is pretty expensive, but you get what you pay for and this is a great product.
We provide industrial asset identification, threat detection, and response to help organizations stay ahead of adversaries. The Dragos platform delivers codified industrial cybersecurity expertise that enables security teams to detect and respond faster to industrial cybersecurity threats, reducing dwell time and down time. We enhance ICS defenders’ efficiency and effectiveness via the Dragos platform, Dragos WorldView intelligence reports, and the Dragos Threat Operations Center.
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
Get in-depth operational technology (OT) asset visibility to better understand, manage and reduce your cyber risk. Tenable OT Security (formerly Tenable.ot) is an industrial security solution for your modern industrial enterprise. It can help you identify assets in your OT environment, communicate risk, prioritize action and enable your IT and OT security teams to work better together.
The product is inexpensive.
The product is inexpensive.
Armis eliminates the IoT security blind spot, letting enterprises instantly see and control unmanaged or rogue devices and networks.
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
The solution is open source so it is free.
I am using the standard free version of Nmap.
The solution is open source so it is free.
I am using the standard free version of Nmap.
Microsoft Defender for IoT is a specialized asset discovery, vulnerability management, and threat monitoring solution for IoT/OT environments. Defender for IoT is an open system that also works with tools such as Splunk, IBM QRadar, and ServiceNow.
Zscaler Cloud IPS enables you to have all threat and alert data in one place. Full user, file and app context is available. Streaming to a SIEM allows further integration into the SOC ecosystem.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Seamlessly connecting to an existing OT network, our flagship platform, XSense, provides instant results by collecting data from across the OT environment utilizing Big Data and Machine Learning to optimize the detection of operational behaviors. Supporting security needs of industries such as energy and utilities, oil and gas, chemical and pharmaceuticals, manufacturing, transportation and more, XSense monitors physical devices to detect operational incidents and cyber-attacks.
OT network connectivity has become a mandatory business requirement. It requires a shift in the security mindset from “How can I air gap or isolate?” to “How can I stay secure while connected?”
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
The price is affordable.
SentinelOne seemed to offer more while being priced lower than its competitors.
The price is affordable.
SentinelOne seemed to offer more while being priced lower than its competitors.
Pricing is reasonable but licensing should unlimited.
The yearly cost varies as per the number of devices being monitored. The cost for 25,000 devices is about $4500.
Pricing is reasonable but licensing should unlimited.
The yearly cost varies as per the number of devices being monitored. The cost for 25,000 devices is about $4500.
Ensure asset integrity with rapid, installation-free asset and device scans, allowing for defense of air-gapped environments and improved supply chain security.
The OT zero trust-based malware inspection and cleanup tool that prevents insider threat and supply chain attacks.
MetaDefender OT Security gives you full visibility into your organization’s OT assets and networks by continuously discovering assets, monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues.
OTORIO's RAM² is an OT security solution with a unified framework built to help you proactively manage cyber security risks, build resilient operations, and future-proof operational environments.
In the hyper-connected enterprise, in which everything from simple IoT devices to complex multi-million-dollar systems are connected, traditional agent-based and human-generated security models simply cannot scale. Ordr solves this problem, providing enterprises with complete visibility and exhaustive control over every class of network-connected device and system. The Ordr Systems Control Engine is the only purpose-built solution to fully map the device flow genome at massive scale, using machine learning to completely and continuously inspect, classify and baseline the behavior of every device. Ordr’s software architecture is unique in its ability to process enormous quantities of data in real-time, using sophisticated AI to deliver closed loop security, automatically generating policies for each class of device and implementing those policies directly through the organization’s existing multi-vendor network and security infrastructure.