CrowdStrike Falcon is a comprehensive endpoint protection solution that offers threat detection, incident response, and threat intelligence capabilities. Users praise its effectiveness in defending against malware and ransomware attacks, stopping advanced threats in real-time, and providing actionable insights through threat intelligence. The platform's valuable features include advanced threat detection, real-time visibility into endpoint activities, easy-to-use interface, responsive customer support, detailed incident response options, customizable alerting settings, machine learning algorithms for proactive threat hunting, and seamless integration with other security tools. Users also note that CrowdStrike Falcon has greatly improved workflow efficiency, collaboration, and productivity within organizations.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
SentinelOne is a leading comprehensive enterprise-level autonomous security solution that is very popular in today’s marketplace. SentinelOne will ensure that today’s aggressive dynamic enterprises are able to defend themselves more rapidly, at any scale, and with improved precision, by providing comprehensive, thorough security across the entire organizational threat surface.
The price is competitive, if you compare it with other solutions on the market.
The price for it is very competitive compared to other Next Gen EPP.
The price is competitive, if you compare it with other solutions on the market.
The price for it is very competitive compared to other Next Gen EPP.
Microsoft Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. With Microsoft Sentinel, you can:
It comes with a Microsoft subscription which the customer has, so they don't have to invest somewhere else.
The licensing requirements are not very clear from the outset.
It comes with a Microsoft subscription which the customer has, so they don't have to invest somewhere else.
The licensing requirements are not very clear from the outset.
IBM Security QRadar is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
VMware Carbon Black Endpoint Security is a comprehensive endpoint protection platform (EPP) designed to safeguard enterprises from advanced cyber threats, malware, ransomware, and other forms of malicious attacks. Leveraging cloud-native architecture, it provides a robust set of tools to detect, prevent, investigate, and respond to cybersecurity incidents across environment. The solution stands out for its advanced behavioral analytics, real-time threat hunting, and customizable policies, making it a preferred choice for businesses seeking to fortify their defenses in the evolving cybersecurity landscape.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
The cost/benefit factor has great relevance in Cb Defense implementations.
I am not really involved in the pricing of this product. But, from my understanding, it is OK for us.
Tanium Endpoint Platform reduces security risk, improves agility & increases efficiency, a fundamentally new approach to endpoint security's threat detection, indicent response, vulnerability assessment and configuration compliance & with management's software distribution, asset utilization, asset inventory and patch management.
There is an annual license required to use this solution.
It's an expensive solution. It would be nice if the cost were lower.
There is an annual license required to use this solution.
It's an expensive solution. It would be nice if the cost were lower.
AWS Security Hub is a comprehensive security service that provides a centralized view of security alerts and compliance status across an AWS environment. It collects data from various AWS services, partner solutions, and AWS Marketplace products to provide a holistic view of security posture. With Security Hub, users can quickly identify and prioritize security issues, automate compliance checks, and streamline remediation efforts.
The price of the solution is not very competitive but it is reasonable.
The price of AWS Security Hub is average compared to other solutions.
The price of the solution is not very competitive but it is reasonable.
The price of AWS Security Hub is average compared to other solutions.
Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
Sumo Logic empowers the people who power modern, digital business. Our cloud-native SaaS analytics platform powered by logs helps customers deliver reliable and secure cloud-native applications. With Sumo Logic, practitioners and developers can ensure application reliability, secure and protect against modern threats and gain insights into their cloud infrastructures. Customers worldwide rely on our scalable platform to get powerful real-time analytics and insights across observability and security solutions for their cloud-native applications. For more information, visit: SUMOLOGIC.COM
Purchasing Sumo Logic through the AWS Marketplace was a simple step.
Purchasing the solution through the AWS Marketplace is very easy.
Purchasing Sumo Logic through the AWS Marketplace was a simple step.
Purchasing the solution through the AWS Marketplace is very easy.
Cybereason's Endpoint Detection and Response platform detects in real-time both signature and non-signature-based attacks and accelerates incident investigation and response. Cybereason connects together individual pieces of evidence to form a complete picture of a malicious operation.
I do not have experience with the licensing of the product.
In terms of cost, this is a good choice for our needs.
I do not have experience with the licensing of the product.
In terms of cost, this is a good choice for our needs.
Built on the industry’s only cloud-native platform to deliver security operations as a concierge service, the Arctic Wolf® Managed Detection and Response (MDR) solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security® Team (CST) works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.
I find their pricing to be reasonable and competitive.
The pricing is fair.
I find their pricing to be reasonable and competitive.
The pricing is fair.
Splunk SOAR offers features like automation and orchestration of manual tasks, speeding up work, detection and response to advanced and emerging threats.
I don't know the exact price, but for my region, it is very expensive.
In my opinion, the price is high, but if you want good products, you have to be willing to pay for them.
I don't know the exact price, but for my region, it is very expensive.
In my opinion, the price is high, but if you want good products, you have to be willing to pay for them.
Exabeam Fusion SIEM is a cloud-delivered solution that that enables you to:
-Leverage turnkey threat detection, investigation, and response
-Collect, search and enhance data from anywhere
-Detect threats missed by other tools, using market-leading behavior analytics
-Achieve successful SecOps outcomes with prescriptive, threat-centric use case packages
-Enhance productivity and reduce response times with automation
-Meet regulatory compliance and audit requirements with ease
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
ThreatConnect Threat Intelligence Platform (TIP) is a comprehensive solution designed to help organizations effectively manage and analyze threat intelligence data. With its advanced capabilities, TIP enables users to collect, enrich, and analyze threat data from various sources, providing valuable insights and actionable intelligence.
One of the key features of TIP is its ability to aggregate threat data from multiple sources, including open-source feeds, commercial feeds, and internal sources. This allows organizations to have a holistic view of the threat landscape and identify potential risks and vulnerabilities. TIP also supports the integration of third-party tools and feeds, further enhancing its capabilities.
TIP provides powerful enrichment capabilities, allowing users to enrich threat data with additional context and information. This includes the ability to automatically correlate threat data with indicators of compromise (IOCs), threat actors, and other relevant information. The enrichment process helps organizations gain a deeper understanding of threats and enables them to make more informed decisions.
With its advanced analytics capabilities, TIP enables users to analyze threat data and identify patterns, trends, and anomalies. This includes the ability to perform advanced queries, create custom dashboards and reports, and visualize data in a meaningful way. These analytics capabilities help organizations identify emerging threats, prioritize response efforts, and proactively mitigate risks.
ThreatConnect Threat Intelligence Platform also provides collaboration features, allowing users to share threat intelligence with internal teams, partners, and the broader security community. This includes the ability to create and manage secure communities, share indicators and reports, and collaborate on investigations. By fostering collaboration, TIP helps organizations leverage collective intelligence and improve their overall security posture.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
ServiceNow Security Operations is a cutting-edge security solution designed to elevate organizations' security incident response (SIR) processes through automation and orchestration. Going beyond traditional SOAR, this comprehensive Security Operations Suite integrates seamlessly with other ServiceNow products and offers a wide array of features. Its components include Security Incident Response (SIR), which automates incident workflows and offers pre-built playbooks; Security Configuration Compliance (SCC), continuously scanning and automating compliance tasks; Vulnerability Response (VR), prioritizing and remediating vulnerabilities; Threat Intelligence (TI), aggregating threat data for proactive threat hunting; and additional features like IT Service Management integration, Machine Learning and AI, reporting, and a mobile app. The benefits span improved incident response speed, reduced mean time to resolution, increased security posture, enhanced compliance, collaborative synergy between security and IT teams, and operational cost reductions.
This product is a good value for the money.
The solution is more expensive than BMC Remedy, the other ITSM tool available in the market.
This product is a good value for the money.
The solution is more expensive than BMC Remedy, the other ITSM tool available in the market.
Fortinet FortiSOAR (Security Orchestration, Automation, and Response) is a comprehensive security operations platform created to help SOC teams effectively respond to the growing volume of alarms, repetitive manual tasks, and resource shortage. This patented and customizable security operations workbench provides companies with automated playbooks, incident triaging, and real-time remediation to identify, defend, and counter threats. FortiSOAR effortlessly integrates with more than 350 security products and performs more than 3,000 actions to increase SOC team productivity. With this solution, response times are accelerated, containment is simplified, and mitigation times are cut from hours to seconds.
Pricing is fine compared to other solutions.
The solution offers both licensing and subscription models that are similar in price to other products.
Pricing is fine compared to other solutions.
The solution offers both licensing and subscription models that are similar in price to other products.
By design, XSIAM operates across both cloud and enterprise security operations, providing true end-to-end-management of threats, wherever they originate. While companies born in the cloud benefit from the scale and automation of XSIAM and the ease of integration with public cloud and SaaS telemetry, organizations with legacy SIEM deployments can seamlessly transition to XSIAM as the next-generation autonomous SOC platform.
In terms of pricing, we found Cortex XSIAM to offer a very reasonable and competitive rate.
The solution comes at a significant cost.
In terms of pricing, we found Cortex XSIAM to offer a very reasonable and competitive rate.
The solution comes at a significant cost.
Using a centralized combination of network and endpoint analysis, behavioral analysis, data science techniques and threat intelligence, NetWitness XDR helps analysts detect and resolve known and unknown attacks while automating and orchestrating the incident response lifecycle. With these capabilities on one platform, security teams can collapse disparate tools and data into a powerful, blazingly fast user interface.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.
They can easily adjust if you have the requirements which are required. If you have a budget cut or a budget constraint, they can bend.
It is highly scalable. It can be bought based on your requirements.
Compared to other Antivirus products, the cost of this solution is a bit high.
This solution is priced in the mid-range.
Compared to other Antivirus products, the cost of this solution is a bit high.
This solution is priced in the mid-range.
The Resilient Incident Response Platform (IRP) is the leading platform for orchestrating and automating incident response processes.
It is very expensive.
There is a license you need to pay for in order to use this product.
It is very expensive.
There is a license you need to pay for in order to use this product.
Trellix Helix is a cutting-edge product that revolutionizes the way businesses manage their data and streamline their operations. With its advanced features and user-friendly interface, Trellix Helix offers a comprehensive solution for businesses of all sizes. One of the key features of Trellix Helix is its powerful data management capabilities.
It could be cheaper, but that applies to every product.
FireEye Helix is a little expensive.
It could be cheaper, but that applies to every product.
FireEye Helix is a little expensive.
Swimlane is a leader in security orchestration, automation and response (SOAR). By automating time-intensive, manual processes and operational workflows and delivering powerful, consolidated analytics, real time dashboards and reporting from across your security infrastructure, Swimlane maximizes the incident response capabilities of over-burdened and understaffed security operations.
Tines helps the world's most security-conscious companies automate their repetitive workflows. With a laser-focus on automation, Tines is powerful, flexible, and robust enough to run all of the security team’s critical workflows.
Our security operations platform, Expel Workbench, is fueled by automation and analysis to achieve clear answers and prescriptive outcomes with our managed security products.
Siemplify offers the ability to: Manage security operations from a single platform, build repeatable, automated security processes, and track, measure and improve SOC performance.
eDiscovery collection tools address the rise in dispersed and remote workforces, the proliferation of mobile devices and new sources of data. Comprehensively collecting data across all data sources, including endpoints, such as desktops and laptops, is critical to defensibility. Collection analytics and culling is key to efficient digital investigations, narrowing the document collection to drive down the cost of legal review.
The product is affordable and user-friendly.
EnCase is an affordable solution.
The product is affordable and user-friendly.
EnCase is an affordable solution.
ThreatQ is a Threat Intelligence Platform (TIP) designed to enable threat operations and management. ThreatQ is the only solution with an integrated Threat Library, Adaptive Workbench and Open Exchange that help you to act upon the most relevant threats facing your organization and to get more out of your existing security infrastructure.
SECDO enables security teams to identify and remediate incidents fast. Using thread-level endpoint monitoring and causality analytics, SECDO provides visibility into every endpoint along with the context necessary for understanding whether a suspicious activity is a genuine threat. Unique deception techniques force threats like ransomware out into the open early, and trigger automated containment and remediation.
Be sure of the actual number of endpoints in your company.
The price of this solution is the highest in the market, although there are no costs in addition to the standard licensing fees.
Be sure of the actual number of endpoints in your company.
The price of this solution is the highest in the market, although there are no costs in addition to the standard licensing fees.
The cybersecurity landscape is growing more complex by the day with the arrival of new threats and new tools supposedly designed for combating them. The problem is it’s all creating more noise and confusion for security professionals to sort through.
I've told CRITICALSTART that I think the managed service they provide is cheaper than it should be. It's a really good deal.
It costs a lot for what we felt comfortable to spend.
I've told CRITICALSTART that I think the managed service they provide is cheaper than it should be. It's a really good deal.
It costs a lot for what we felt comfortable to spend.
Torq no-code security automation unifies and automates the security stack to drive unparalleled protection and productivity. Torq provides enterprise-scale automation and orchestration with a simple no-code platform.
Pricing for this solution could be made lower.
The solution is very inexpensive so there is great cost savings to using it.
Pricing for this solution could be made lower.
The solution is very inexpensive so there is great cost savings to using it.
With InsightConnect, your team will get more done and respond to security events faster than ever before. And with significant time savings and productivity gains across overall security operations, you’ll go from overwhelmed to operating at maximum efficiency in no time flat.
Rapid, playbook-driven investigations and automated incident response actions contain and minimize the damage from a threat quickly.
No defense can stop every attack. When something does get through, Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently. Get an actionable view of threats, enrich alerts, and automate forensic collection and comparison. For verified threats, quarantine and contain users, hosts, and malicious email attachments - automatically or at the push of a button.
It's quite affordable to have it with this much functionality and ease to administrate.
It's quite affordable to have it with this much functionality and ease to administrate.
D3 Security provides a full-lifecycle incident management platform—one that enables multiple detection sources, enriches standards-based workflows with threat intelligence, orchestrates response, and always guides its users to conclusive remediation. The system is unique in its ability to eliminate incident recurrence, through root cause and corrective action discovery, digital forensics case management, and by generating a foundation of actionable intelligence that supports policies, countermeasures and controls.
IBM Cloud Pak for Security is comprised of containerized software pre-integrated with Red Hat OpenShift. The platform connects to your existing security tools – and through the use of open standards – allows you to search for threat indicators across your hybrid, multicloud environment.
Cyware Fusion and Threat Response
A threat response automation platform that combines cyber fusion, advanced orchestration, and automation to stay ahead of increasingly sophisticated cyber threats affecting enterprises in real-time
DFLabs' Security Orchestration, Automation and Response (SOAR) platform, IncMan SOAR, is designed for SOCs, CSIRTs and MSSPs to automate, orchestrate and measure security operations and incident response processes and tasks, all from within one single, intuitive platform. By integrating security tools, fusing intelligence, sharing knowledge and implementing seamless workflows, IncMan SOAR enables every security incident to be detected, responded to, and remediated in the fastest possible time frame.
STORM SOAR software means better incident management.
STORM powered by OTRS is cybersecurity incident management software that quickly manages orchestration, automation and response of security incidents.
Plus, there’s a bonus — structured communication. Securely coordinate between IT, security, SOC, risk and management teams too.