IBM Security QRadar is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Falcon Complete: Endpoint protection delivered as a service. The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.
The price is okay, although you're not going to get away cheap when it comes to security.
At approximately €60 per machine, per year, I think that it's a good price point.
The price is okay, although you're not going to get away cheap when it comes to security.
At approximately €60 per machine, per year, I think that it's a good price point.
Binary Defense provides a Managed Detection and Response service using an Open XDR strategy that detects and isolates threats early in the attack lifecycle. Expert security analysts in the Binary Defense Security Operations Center leverage an attacker’s mindset, monitoring your environments for security events 24x7x365 and acting as an extension of your security teams. When a security event occurs, Binary Defense analysts triage, disposition, and prioritize the event. Analysts conduct full kill chain analysis and supply tactical and strategic mitigation recommendations to your security team with the goal of increasing your organization’s security posture against the latest adversary threats.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Built on the industry’s only cloud-native platform to deliver security operations as a concierge service, the Arctic Wolf® Managed Detection and Response (MDR) solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security® Team (CST) works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.
I find their pricing to be reasonable and competitive.
The pricing is fair.
I find their pricing to be reasonable and competitive.
The pricing is fair.
Hackers are constantly evolving, exploiting new vulnerabilities and dwelling in small business environments—until they meet Huntress. Discover the power of managed detection and response backed by ThreatOps.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
Reduce time to protection and minimize risk exposure with continuous threat monitoring and response from SentinelOne.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
Threat Notification Isn’t the Solution – It’s a Starting Point
Other managed detection and response (MDR) services simply notify you of attacks or suspicious events. Then it’s up to you to manage things from there.
The cost of the solution is based on how many users use it.
The solution is expensive.
The cost of the solution is based on how many users use it.
The solution is expensive.
Red Canary Managed Detection and Response (MDR) is designed to enhance security operations through robust threat detection and response capabilities. Organizations leverage this product to swiftly identify and mitigate potential threats, ensuring continuous system security. It is highly effective for continuous monitoring and analysis of security data, which improves situational awareness and proactively addresses vulnerabilities. Red Canary MDR integrates seamlessly with existing security tools, streamlining and optimizing security operations. Its ability to conduct detailed investigations following security incidents facilitates thorough understanding and remediation of breaches.
Key features include exceptional threat detection, proactive threat intelligence with timely updates and alerts, and detailed, actionable reporting for prompt risk mitigation. Users report that Red Canary MDR has streamlined processes, improved efficiency, and enhanced communication within teams, resulting in quicker decision-making and increased productivity. Consequently, it has positively impacted organizational growth and operational effectiveness, making it a vital component of their cybersecurity arsenal.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
Alert Logic specializes in log management, security configuration, SIEM, SaaS monitoring, network protection, and MDR services. It is suitable for sectors such as utilities, financial services, and government.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
Trend Micro XDR applies the most effective AI and expert analytics to the activity data collected from its native sensors in the environment to produce fewer, higher-fidelity alerts. Global threat intelligence from the Trend Micro Smart Protection Network™ combined with expert detection rules continually updated from our threat experts maximize the power of AI and analytical models in unparalleled ways.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
Standing up an effective detection and response program isn’t as simple as buying and implementing the latest security products. It requires a dedicated SOC, staffed with highly skilled and specialized security experts, and 24/7 vigilance using the best technology to ensure stealthy attackers have nowhere to hide. Creating such a program can be expensive, difficult to maintain, and provides limited assurance that you’ve advanced your overall security. Rapid7 MDR is built from the ground up to help security teams of all sizes and security experiences strengthen their security posture, find attackers, and stay ahead of emerging threats. Our MDR service uses a combination of security expertise and technology to detect dynamic threats quickly across your entire ecosystem, providing the hands-on, 24/7/365 monitoring, proactive threat hunting*, effective response support, and tailored security guidance needed to stop nefarious activity and help you accelerate your security maturity.
The product is not overly priced.
The product is not overly priced.
Expel Workbench is a cutting-edge security operations platform designed to enhance and streamline your cybersecurity measures. Its primary use case is to provide robust monitoring and alerting mechanisms for potential threats, thereby aiding in the identification and investigation of security incidents. This capability is crucial for maintaining a secure environment and is complemented by the platform's incident response features, which offer clarity and actionable insights during breaches.
One of the standout aspects of Expel Workbench is its user-friendly interface. The dashboard is easy to navigate and delivers real-time visibility into security threats, allowing teams to act swiftly. Automated response capabilities are another key feature, reducing the time required for incident management and allowing security teams to focus their efforts more efficiently. The platform's threat detection capabilities are also highly valued, as they help in pinpointing and addressing security issues before they can escalate.
Expel Workbench further shines through its integration prowess, seamlessly working with existing security tools to create a cohesive defense mechanism. Customizable alerts and notifications keep users informed and ready to take immediate action against potential threats. Many organizations have reported enhanced efficiency and productivity due to smoother workflows, better task management, and improved team collaboration. By simplifying processes and reducing administrative overhead, Expel Workbench allows staff to focus on strategic initiatives, thereby fostering a more organized and effective work environment.
Managed detection and response (MDR) services identify and limit the impact of security incidents within a customer’s environment.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
ReliaQuest GreyMatter unifies security tools for visibility across layers, aggregated alerting, faster investigation and response, bolstered by proactive threat hunting and attack simulation to continually improve your posture, all wrapped with security advisory expertise for accelerating key initiatives.
Adlumin provides the premier command center for security operations built specifically for the channel. Stop advanced cyber threats, eliminate vulnerabilities, and take command of sprawling IT Operations with Adlumin's MDR platform plus security services.
eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints, Microsoft Office 365, cloud applications, and identity. Our experts will investigate anything they find, then hand off the contextual alert information along with remediation instructions so you can quickly respond.
The cybersecurity landscape is growing more complex by the day with the arrival of new threats and new tools supposedly designed for combating them. The problem is it’s all creating more noise and confusion for security professionals to sort through.
I've told CRITICALSTART that I think the managed service they provide is cheaper than it should be. It's a really good deal.
It costs a lot for what we felt comfortable to spend.
I've told CRITICALSTART that I think the managed service they provide is cheaper than it should be. It's a really good deal.
It costs a lot for what we felt comfortable to spend.
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services.
BlueVoyant provides a comprehensive suite of cybersecurity services designed to identify, detect, and respond to potential security incidents in real-time. Their MDR service offers 24/7 monitoring and threat hunting by a team of experts, utilizing advanced analytics and machine learning to enhance detection capabilities. The digital risk protection service extends the perimeter of security by monitoring external threats such as phishing attacks, data leaks, and brand impersonation. Additionally, BlueVoyant's supply chain defense focuses on safeguarding the extended enterprise by assessing and monitoring the cybersecurity posture of third-party vendors.
Our MDR security solution provides critical insight into attacks using automated machine learning algorithms to validate and prioritize alerts and uncover new threats. Our world-class team of security experts monitors threats in VMware Carbon Black Cloud, and provides rapid response along with threat containment during an incident and policy recommendations to remediate threats.
Cyderes Managed Services delivers world class security-as-a-service. We enable our customers to focus their resources on growing their business while we help address their threats in a way that’s better, faster, more cost effective, and more scalable than in-house solutions.
deepwatch delivers results-driven managed security services by extending customers’ cybersecurity teams and proactively advancing their SecOps maturity. Powered by its cloud SecOps platform, deepwatch is trusted by leading global organizations to provide 24/7/365 managed security services.
Verizon Managed Security Information and Event Management (MSIEM) enhances your organization's cybersecurity by integrating your existing SIEM solution with Verizon's expertise and resources. This service offers enhanced monitoring and analytics through Verizon's Security Operations Centers (SOCs), staffed by security analysts who monitor security alerts and events 24/7. Verizon's experts analyze these alerts, assess potential risks, and escalate real threats according to your predefined protocols. Incorporating threat intelligence from various sources, Verizon proactively identifies and analyzes potential security threats, sharing this knowledge to empower your security decisions. By combining your SIEM with Verizon's capabilities, Managed SIEM provides a comprehensive security monitoring solution, enabling faster incident response, reducing the security burden on your internal IT resources, and improving your overall security posture.
Trustwave Managed Security Services offers the following:
Optiv's Managed Security Services are designed to serve as a remote extension of your security staff. As a manged security service provider, we provide turnkey solutions for your complex information security challenges. By combining and correlating log activity, our services help eliminate blind spots and provide visibility to what really matters.
Cyber threats have not slowed down and are increasing in their complexity and sophistication. The integration and reliance on technology to enable growth is also increasing, which poses serious risks to organizations if they don’t have proper security measures.
The cost is good in relation to the benefit.
The cost is good in relation to the benefit.
Our solutions are delivered along our secure network infrastructure.
ArmorPoint protects network devices, virtualized systems, operating systems, databases, applications, cloud applications and instances.