Best Incident Response Software for Filigran

Find and compare the best Incident Response software for Filigran in 2025

Use the comparison tool below to compare the top Incident Response software for Filigran on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    IBM QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 2
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 3
    FortiSOAR Reviews
    Security teams need to expand their defense capabilities as the digital attack surface grows. However, increasing the number of security monitoring tools is not always the best solution. Additional monitoring tools can lead to more alerts that security teams can investigate and more context switching during the investigation process. Security teams face many challenges, including alert fatigue, a shortage of qualified security personnel to handle new tools, and slower response time. FortiSOAR security automation, response and orchestration (SOAR), is integrated into the Fortinet Security Fabric. This solves some of the most pressing cybersecurity challenges. Security operation center (SOC), teams can create an automated framework that combines all their tools. This unifies operations, eliminates alert fatigue, and reduces context switching. This allows enterprises to adapt and optimize their security processes.
  • 4
    Intezer Analyze Reviews
    Intezer’s Autonomous SOC platform triages alerts 24/7, investigates threats, and auto-remediates incidents for you. "Autonomously" investigate and triage every incident, with Intezer’s platform working like your Tier 1 SOC to escalate only the confirmed, serious threats. Easily integrate your security tools to get immediate value and streamline your existing workflows. Using intelligent automation built for incident responders, Intezer saves your team from time wasted on false positives, repetitive analysis tasks, and too many escalated alerts. What is Intezer? Intezer isn't really a SOAR, sandbox, or MDR platform, but it could replace any of those for your team. Intezer goes beyond automated SOAR playbooks, sandboxing, or manual alert triage to autonomously take action, make smart decisions, and give your team exactly what you need to respond quickly to serious threats. Over the years, we’ve fine-tuned and expanded the capabilities of Intezer’s proprietary code-analysis engine, AI, and algorithms to automate more and more of the time-consuming or repetitive tasks for security teams. Intezer is designed to analyze, reverse engineer, and investigate every alert while "thinking" like an experienced security analyst.
  • 5
    LogRhythm SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 6
    Flashpoint Reviews
    Flashpoint Intelligence Platform gives you access to our archive data. This includes data from illegal forums, chat services, chat sites, chat services, blogs and paste sites. It also contains technical data, card shops, and vulnerability data. Our platform increases Flashpoint's internal team, which includes multilingual intelligence analysts who can quickly respond to customers. Flashpoint experts used illicit online communities to access the finished intelligence and primary data for these reports. Expand the scope of intelligence beyond traditional threat identification and get scalable, contextual, rich outcomes that help teams make better business decisions and protect their ability across the enterprise. Our platform provides relevant intelligence that will empower you to make better decisions and reduce risk in any area of your organization, no matter if you are an expert intel or a novice to risk assessment.
  • 7
    TheHive Reviews

    TheHive

    TheHive Project

    Open source, scalable and free Security Incident Response Platform. It is tightly integrated with MISP (Malware information Sharing Platform). This platform was designed to make life easier and to speed up the resolution of security incidents. Multiple SOC and CERT analysts may collaborate on investigations simultaneously. All team members have access to real-time information, including new and existing cases, tasks, observations, and IOCs, thanks to the integrated live stream. They can also view and manage new tasks and alerts from multiple sources, such as email reports and CTI providers, and SIEMs. They can then import them and start investigating them. A simple but powerful template engine can be used to create cases and associated tasks.
  • Previous
  • You're on page 1
  • Next