Best IT Security Software for Cisco Umbrella

Find and compare the best IT Security software for Cisco Umbrella in 2025

Use the comparison tool below to compare the top IT Security software for Cisco Umbrella on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Blumira Reviews
    Top Pick
    See Software
    Learn More
    Empower Your Current Team to Achieve Enterprise-Level IT Security An all-in-one IT Security solution with SIEM, endpoint visibility, 24/7 monitoring, and automated response to reduce complexity, increase visibility and speed up time to respond. We handle the security heavy lifting, so you get time back in your day. With out-of-the-box detections, pre-filtered alerts, and response playbooks, your team can achieve real IT security value with Blumira. Quick Deployment, Immediate Results: Integrates with your tech stack and fully deploy, with no warm-up period, in hours All-You-Can-Eat Data Ingest: Predictable pricing and with unlimited data logging for full-lifecycle detection Compliance Made Easy: 1 year data retention included, pre-built reports, and 24/7 automated monitoring 99.7% CSAT Support: Solution Architects for product support, the Incident Detection and Response Team creating new detections, and 24/7 SecOps support
  • 2
    OpenDNS Reviews

    OpenDNS

    Cisco Umbrella

    $19.95 per year
    1 Rating
    Cisco Umbrella protects against internet threats such as malware, ransomware, phishing and adware. OpenDNS is a collection of consumer products that make the internet more reliable, faster, and safer. Our global data centers and peering relationships reduce the distance between any network and our data centres, making internet access even more speedy. You can protect your family from adult content with filtering or pre-configured protection. It's the easiest way for you to add parental and content filtering control to all devices in your home. OpenDNS can be installed in your home quickly. No need for a PhD in Computer Science. Setup is easy thanks to our knowledge base and helpful guides. High performance and blocking of more than 7,000,000 malicious IPs and domains. More than 60 000 new malicious destinations (domains and IPs) are identified each day. Our global network sustains over 620 billion DNS queries daily.
  • 3
    Techstep Essentials MDM Reviews

    Techstep Essentials MDM

    Techstep ASA

    $2/month/device
    Essentials MDM (previously FAMOC) helps companies make the most out of the mobile tools and devices their employees need to do their jobs. Essentials MDM makes it easy to deploy, configure and manage all smartphones and tablets within your organization. You can create profiles, enforce restrictions and set password and PIN policies all from one place. Enrolling devices on corporate-owned devices or BYOD is fast, simple, and free from error. Essentials MDM allows you to perform bulk operations on multiple devices as well as on one handset. We also help implement, maintain and support the everyday use of Essentials MDM by offering managed services.
  • 4
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 5
    JupiterOne Reviews

    JupiterOne

    JupiterOne

    $2000 per month
    Go beyond asset management. Turn complexity into capability. Our cyber asset analysis platform empowers security teams by providing total visibility into the assets, context and risks that make up their attack surface. With JupiterOne, organizations transform asset visibility from frustration into strength.
  • 6
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 7
    Zoho Directory Reviews
    Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD.
  • 8
    AT&T Alien Labs Open Threat Exchange Reviews
    The largest open threat intelligence network in the world that facilitates collaborative defense using actionable, community-powered threats data. The security industry's threat sharing is still ad-hoc and informal. It is fraught with frustrations, blind spots, and pitfalls. Our vision is that companies and government agencies can quickly gather and share information about cyberattacks and threats, as well as current breaches, as accurate, timely, and complete information as quickly as possible. This will allow us to avoid major breaches and minimize the damage caused by an attack. This vision is realized by the Alien Labs Open Threat Exchange (OTX) - which provides an open, transparent threat intelligence community. OTX allows open access to a global network of security professionals and threat researchers. There are now more than 100,000 participants from 140 countries who contribute over 19,000,000 threat indicators each day. It provides community-generated threat information, facilitates collaborative research, and automates the updating of your security infrastructure.
  • 9
    ThreatConnect Risk Quantifier (RQ) Reviews
    ThreatConnect RQ is a financial cyber risk quantification solution that allows users to identify and communicate the cybersecurity risks that matter most to an organization in terms of financial impact. It aims to enable users to make better strategic and tactical-level decisions by quantifying them based on the business, the technical environment, and industry data. RQ automates the generation of financial cyber risk reporting as it relates to the business, cybersecurity initiatives, and controls. Automated outputs are generated in hours for reporting that is more current and relevant. By automating risk modelling, the vendor states customers get a fast start and can critique, or tune models over time instead of having to create their own. They use historical breach data and threat intelligence upfront in order to save months of data collection and remove the burden of continuous updating.
  • 10
    Cisco SecureX Reviews
    SecureX is a cloud-native platform that connects your infrastructure to our Cisco Secure portfolio. It can dramatically reduce dwell time and human-powered tasks. Eliminate bottlenecks that hinder your teams' access and take them to the answers. SecureX comes with all Cisco Secure products. Integrate your existing ecosystem with third-party solutions and get an open platform that simplifies it all. Get unified visibility through a customizable dashboard. Maintain context around incidents with a consistent ribbon. Accelerate incident management and threat investigation by aggregating global intelligence and local context into one view. Automate routine tasks with pre-built workflows that are compatible with common use cases. You can also create your own workflows using our drag-and-drop, low-code canvas.
  • 11
    AuthPoint Reviews
    Our multi-factor authentication (MFA), solution helps reduce the risk of network disruptions and data breach arising from lost and stolen credentials. We also deliver this important capability entirely via the Cloud for easy setup and management. AuthPoint is more than traditional 2-Factor Authentication (2FA). It uses innovative methods to positively identify users. Our large ecosystem of integrations allows you to use MFA to protect access. WatchGuard AuthPoint is the perfect solution for businesses that need MFA to protect against attacks. AuthPoint uses a push notification, QR code or one-time password (OTP), to prove your identity. Our mobile device DNA matches the authorized user’s phone when granting access systems and applications. Any attacker who attempts to clone a user's device to gain access to a protected system will be blocked.
  • 12
    Panaseer Reviews
    Panaseer's continuous control monitoring platform is a powerful tool that can monitor and monitor all aspects of your organization. It provides trusted, automated insight into the organisation's security and risk posture. We create an inventory of all entities in your organization (devices and apps, people, accounts, and databases). The inventory identifies assets that are missing from different sources and identifies security risks. The platform provides metrics and measures that will help you understand your compliance and security status at all levels. The platform can ingest data from any source, cloud or on-premises. Data can be accessed across security, IT, and business domains using out-of-the box data connectors. It uses entity resolution to clean and normalise, aggregate and de-duplicate this data. This creates a continuous feed with unified assets and controls insights across devices and applications, people, database and accounts.
  • 13
    Cisco Secure Web Appliance Reviews
    Even legitimate websites can be infected by advanced threats. Users could click on unsafe sites and put your company at risk. Cisco Secure Web Appliance protects you organization by blocking dangerous sites and testing unknown sites before users can click on them. Cisco Secure Web Appliance protects your users with TLS 1.3 and high performance capabilities. Cisco Secure Web Appliance offers multiple ways to automatically detect web-based threats and block them. The Cisco Secure Web Appliance Premier license, powered by Talos threat research, includes in-depth URL filtering, reputation analysis, multiple antivirus engines and Layer 4 traffic monitoring. It also includes Malware Defense for Secure Web Appliance (CTA) and Cognitive Threat Analytics (CTA).
  • 14
    ThreatAware Reviews
    Using API feeds from existing tools, verify that your controls are correctly deployed across all cyber assets. Our clients come in all industries - from finance to legal, charities to retail. Leading organizations trust us to protect and discover their valuable cyber assets. Connect your existing systems to APIs and create a highly accurate inventory of devices. The workflow automation engine can take action via a webhook when issues arise. ThreatAware is a simple and clear way to understand the security control health for your cyber assets. You can get a macro-view of the health of your security controls, regardless of how many you are monitoring. You can group your cyber assets quickly for monitoring and configuration. Every alert is real when your monitoring system accurately depicts your actual environment.
  • 15
    Meraki Systems Manager Reviews
    Cisco Meraki Systems Manager, a cloud-based MDM solution, allows organizations to securely manage mobile devices remotely with agility and ease. It integrates endpoint security, network security, and application security in a single platform. This lays the foundation for a security model based on zero trust through Meraki and Cisco integrations. This allows for dynamic adjustments to access and enforcement of security policies on the network based on device compliance. Systems Manager automates configurations by importing them from security applications. It then deploys changes to thousands devices with minimum effort. It provides comprehensive security and management across diverse device ecosystems. The solution allows IT teams to monitor devices and troubleshoot them in real time with tools like remote desktops.
  • 16
    Swimlane Reviews
    Swimlane is a leader for security orchestration, automation, and response (SOAR). Swimlane automates manual, time-intensive processes and operational workflows, and delivers powerful, consolidated analytics and real-time dashboards from across your security infrastructure. This allows you to maximize the incident response capabilities for over-burdened, understaffed security operations. Swimlane was established to provide flexible, innovative, and scalable security solutions to organizations that are struggling with alert fatigue, vendor proliferation, and staffing shortages. Swimlane is a leader in the growing market for security orchestration and automation solutions that automate and organise security processes in repeatable ways to maximize resources and speed incident response.
  • 17
    Splunk SOAR Reviews
    Splunk SOAR is a powerful platform which allows organizations to streamline and automate security operations. It integrates with a variety of security tools and systems to allow teams to automate repetitive processes, orchestrate workflows and respond to incidents quicker. Splunk SOAR allows security teams to create playbooks which automate incident response processes. This reduces the time it takes to detect, investigate and resolve security threats. The platform offers advanced analytics, real time threat intelligence, and collaborative tools to improve decision-making and overall security posture. Splunk SOAR automates routine tasks and allows for more efficient resource use, helping organizations respond to threats faster and with greater accuracy. This reduces risks and enhances cybersecurity resilience.
  • 18
    Recorded Future Reviews
    Recorded Future is the largest provider of enterprise security intelligence in the world. Recorded Future provides timely, accurate, and practical intelligence by combining pervasive and persistent automated data collection and analysis with human analysis. Recorded Future gives organizations the visibility they need in a world of increasing chaos and uncertainty. It helps them identify and detect threats faster, take proactive action to disrupt adversaries, and protect their people and systems so that business can continue with confidence. Recorded Future has been trusted by over 1,000 businesses and government agencies around the globe. Recorded Future Security Intelligence Platform provides superior security intelligence that disrupts adversaries on a large scale. It combines analytics and human expertise to combine a wide range of open source, dark net, technical, and original research.
  • 19
    Proofpoint Identity Threat Defense Reviews
    In a hybrid world that is constantly changing, your organization relies on its employees and their virtual identities as well as the endpoints on which they operate to build and protect assets. By leveraging these identities, threat actors have discovered unique ways to move lateraly across your cloud environments. You need a new, innovative and agentless solution for detecting and responding to identity threats. This is a critical part of the attack chain today. Proofpoint Identity Threat Defense (previously Illusive) provides comprehensive prevention and visibility for all your identities, so you can fix identity vulnerabilities before they become real threats. You can also detect any lateral movement in your environments and activate the deception to ensure that threat actors are stopped before they gain access your corporate assets. You can stop real-time threats and prevent modern identity risks in action all in one place.
  • 20
    Cofense Triage Reviews
    Cofense Triage™ speeds up phishing email identification. Integration and automation can improve your response time. To automatically detect and analyze threats, we use Cofense Intelligence™, rules and an industry-leading email engine. Our robust API allows you to integrate intelligent phishing defense in your workflow so that your team can concentrate their efforts and protect your company. We understand that stopping phishing isn't always easy. CofenseTriage™, makes it easy to access expert help on-demand. They are just a click away, available at any time. Our Threat Intelligence and Research Teams constantly update our YARA rules library, making it easier to identify new campaigns and improve response times. The Cofense Triage Community Exchange makes it possible to crowd-source threat intelligence and phishing email analysis, so you are never alone.
  • 21
    Cisco Secure Endpoint Reviews
    Our cloud-native solution provides robust protection, detection, response, and remediation to threats - reducing remediation times up to 85 percent. Advanced endpoint detection and response (EDR), threat hunt and endpoint isolation reduce the attack surface. SecureX's integrated platform provides a unified view, simplified incident handling, and automated playbooks. This makes our extended detection response (XDR), the most comprehensive in the industry. Our Orbital Advanced search capability gives you the answers that you need about your endpoints quickly. You can find sophisticated attacks faster. Our proactive, human-driven hunts to find threats map to the MITRE AT&CK framework to help stop attacks before they cause harm. Secure Endpoint provides protection, detection, response, user access, and coverage to protect your endpoints.
  • 22
    Chronicle SOAR Reviews
    Playbooks can be used to speed up time-to-value, and allow for easy scaling as you grow. You can address common problems like ransomware and phishing with ready-to-use use cases that include playbooks, simulated alarms, and tutorials. Drag and drop is all it takes to create playbooks that organize hundreds of the tools that you rely upon. Automate repetitive tasks to help you respond faster and make more time for high-value work. Optimize, troubleshoot and iterate playbooks using lifecycle management capabilities such as run analytics, reusable blocks, version control, rollback, and run analytics. Integrate threat intelligence at each step and visualize the most relevant contextual data for each threat, including who did what and when, and the relationships between all entities attached to an event or product. The patent-pending technology automatically groups related alerts into one threat-centric case. This allows a single analyst the ability to efficiently investigate and respond.
  • 23
    Google Digital Risk Protection Reviews
    Learn what a solution for digital risk protection is and how you can be better prepared if you know who is targeting you, their goals, and the ways they plan to compromise your security. Google Digital Risk Protection offers a broad solution for digital risk protection, either as a self-managed SaaS product or as a comprehensive service. Both options provide security professionals with visibility outside their organization and the ability to identify high risk attack vectors, malicious orchestration on the dark and deep web, and attack campaign on the open internet. Google Digital Risk Protection also provides contextual information about threat actors, their tactics, techniques and procedures, to provide a secure cyber threat profile. Map your attack surface, and monitor deep and dark web activities to gain visibility into the risk factors that impact the extended enterprise and supply chains.
  • 24
    OctoXLabs Reviews
    In minutes, you can detect, prioritize and respond to security threats. Improve your visibility with Cyber asset attack surfaces management. Manage your cybersecurity inventory. Discover the vulnerabilities of all your assets. Fill in the gaps created by agent-based asset managers. Find out about server, client and cloud gaps, as well as IoT devices. Octoxlabs uses agentless technology to enhance your visibility. You can always keep track of the installed applications licenses. You can view how many licenses are left, how many you've used, and when the renewal is due from one place. You can always keep track of the installed application licenses. Users that you need to open separately for each application. Integrate intelligence services with your user data to enrich it. You can follow the local account for all products. Devices with a vulnerability, but no security agent installed, can be detected.
  • Previous
  • You're on page 1
  • Next