Best Cybersecurity Software for Elasticsearch

Find and compare the best Cybersecurity software for Elasticsearch in 2026

Use the comparison tool below to compare the top Cybersecurity software for Elasticsearch on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Criminal IP Reviews
    Top Pick

    Criminal IP

    AI SPERA

    $0/month
    17 Ratings
    See Software
    Learn More
    Criminal IP is a cyber threat intelligence search engine that detects vulnerabilities in personal and corporate cyber assets in real time and allows users to take preemptive actions. Coming from the idea that individuals and businesses would be able to boost their cyber security by obtaining information about accessing IP addresses in advance, Criminal IP's extensive data of over 4.2 billion IP addresses and counting to provide threat-relevant information about malicious IP addresses, malicious links, phishing websites, certificates, industrial control systems, IoTs, servers, CCTVs, etc. Using Criminal IP’s four key features (Asset Search, Domain Search, Exploit Search, and Image Search), you can search for IP risk scores and vulnerabilities related to searched IP addresses and domains, vulnerabilities for each service, and assets that are open to cyber attacks in image forms, in respective order.
  • 2
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    $5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 3
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 4
    SOC Prime Platform Reviews
    SOC Prime equips security teams with the largest and most robust platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. Backed by a zero-trust approach and cutting-edge technology powered by Sigma and MITRE ATT&CK®️, SOC Prime enables smart data orchestration, cost-efficient threat hunting, and dynamic attack surface visibility to maximize the ROI of SIEM, EDR, XDR & Data Lake solutions while boosting detection engineering efficiency. SOC Prime’s innovation is recognized by independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. SOC Prime is backed by DNX Ventures, Streamlined Ventures, and Rembrandt Venture Partners, having received $11.5M in funding in October 2021. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture.
  • 5
    Infocyte Reviews
    Security teams can use the Infocyte Managed Response Platform to detect and respond to cyber threats and vulnerabilities within their network. This platform is available for physical, virtual and serverless assets. Our MDR platform offers asset and application discovery, automated threats hunting, and incident response capabilities on-demand. These proactive cyber security measures help organizations reduce attacker dwell time, reduce overall risk, maintain compliance, and streamline security operations.
  • 6
    Sandfly Security Reviews
    Renowned for securing critical infrastructure worldwide, Sandfly offers agentless Linux security that eliminates the need for endpoint agents, ensuring a hassle-free experience. Its deployment is immediate, prioritizing system stability without sacrificing security. As an agentless platform, Sandfly is designed to monitor Linux systems quickly and securely. It safeguards a wide range of Linux environments, from contemporary cloud infrastructures to legacy devices, irrespective of their distribution or CPU type. In addition to standard Endpoint Detection and Response (EDR) features, Sandfly effectively manages SSH credentials, identifies weak passwords through audits, detects unauthorized modifications with drift detection, and incorporates customizable modules to identify novel and evolving threats. This comprehensive approach guarantees maximum safety, efficiency, and compatibility across Linux systems. Furthermore, Sandfly stands out in the market by providing extensive coverage for various Linux distributions and architectures, including AMD, Intel, Arm, MIPS, and POWER CPUs. With Sandfly, organizations can ensure their Linux security is both robust and versatile, catering to their diverse technological landscapes.
  • 7
    D3 Smart SOAR Reviews
    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency. Smart SOAR’s Event Pipeline is a powerful asset for enterprises and MSSPs that streamlines alert-handling with automated data normalization, threat triage, and auto-dismissal of false positives—ensuring that only genuine threats get escalated to analysts. When a real threat is identified, Smart SOAR brings together alerts and rich contextual data to create high-fidelity incidents that provide analysts with the complete picture of an attack. Clients have seen up to a 90% decrease in mean time to detect (MTTD) and mean time to respond (MTTR), focusing on proactive measures to prevent attacks. In 2023, over 70% of our business was from companies dropping their existing SOAR in favor of D3. If you’re frustrated with your SOAR, we have a proven program to get your automation program back on track.
  • 8
    Splunk SOAR Reviews
    Splunk SOAR (Security Orchestration, Automation, and Response) serves as a robust solution that assists organizations in optimizing and automating their security operations. By integrating seamlessly with a variety of security tools and systems, it empowers teams to automate mundane tasks, coordinate workflows, and respond to incidents with increased agility. Security teams can develop playbooks using Splunk SOAR to streamline incident response procedures, which significantly decreases the time required to identify, investigate, and mitigate security threats. Additionally, the platform provides sophisticated analytics, immediate threat intelligence, and collaborative features that bolster decision-making and elevate overall security effectiveness. Through the automation of routine undertakings and the facilitation of more efficient resource allocation, Splunk SOAR enables organizations to react to threats with enhanced speed and precision, thus reducing potential risks and strengthening their cybersecurity resilience. Ultimately, this leads to a more proactive approach to security management, allowing teams to focus on strategic initiatives rather than being bogged down by repetitive tasks.
  • 9
    SeeMetrics Reviews
    Introducing a cutting-edge platform designed for cybersecurity performance management, enabling security leaders to monitor, analyze, and enhance their operations effectively. Access a comprehensive overview of your security program's performance from a single dashboard. Rely on a unified source to evaluate the effectiveness of your technology stack while identifying areas for improvement. Eliminate the hassle of gathering and merging data from various sources. Make decisions, strategize, and allocate resources based on concrete data rather than relying solely on instincts. With actionable insights regarding products, personnel, and budgets, you can optimize your corporate security strategies more effectively. Uncover vulnerabilities in your cyber resilience and performance through cross-product analyses and responses to real-time threats. Benefit from ready-to-use, dynamic metrics that can be easily communicated with non-technical stakeholders. With SeeMetrics’ agentless platform, you can seamlessly integrate all your current tools and start deriving valuable insights within just a few minutes, enhancing your security posture significantly. This streamlined approach not only saves time but also allows for a proactive stance against evolving cybersecurity challenges.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB