Best TheHive Alternatives in 2025

Find the top alternatives to TheHive currently available. Compare ratings, reviews, pricing, and features of TheHive alternatives in 2025. Slashdot lists the best TheHive alternatives on the market that offer competing products that are similar to TheHive. Sort through TheHive alternatives below to make the best choice for your needs

  • 1
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    Compare Both
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 2
    Onspring Reviews

    Onspring

    Onspring GRC Software

    153 Ratings
    See Software
    Learn More
    Compare Both
    The GRC software you've been looking for: Onspring. A flexible, no-code, cloud-based platform, ranked #1 in GRC delivery for 5 years running. Easily manage and share information for risk-based decision-making, monitor risk evaluations and remediation results in real-time, and create reports with with KPIs and single-clicks into details. Whether leaving an existing platform or implementing GRC software for the first time, Onspring has the technology, transparency, and service-minded approach you need to achieve your goals rapidly. Our ready-made product products are designed to get you going as fast as 30 days. SOC, SOX, NIST, ISO, CMMC, NERC, HIPAA, PCI, GDPR, CCPA - name any regulation, framework, or standard, and you can capture, test, and report on controls and then activate remediation of risk findings. Onspring customers love the no-code platform because they can make changes on the fly and build new workflows or reports in minutes, all on their own without the need for IT or developers. When you need nimble, flexible, and fast, Onspring is the best software option on the market.
  • 3
    Resolver Reviews
    See Software
    Learn More
    Compare Both
    Over 1,000 organizations worldwide depend on Resolver’s security, risk and compliance software. From healthcare and hospitals to academic institutions, and critical infrastructure organizations including airports, utilities, manufacturers, hospitality, technology, financial services and retail. For security and risk leaders who are looking for a new way to manage incidents and risks, Resolver will help you move from incidents to insights.
  • 4
    PagerDuty Reviews
    Top Pick
    PagerDuty, Inc. (NYSE PD) is a leader for digital operations management. Organizations of all sizes rely on PagerDuty to deliver the best digital experience to their customers in an ever-on world. PagerDuty is used by teams to quickly identify and solve problems and to bring together the right people to prevent future ones. PagerDuty's 350+ integrations include Slack, Zoom and ServiceNow as well as Microsoft Teams, Salesforce and AWS. This allows teams to centralize their technology stack and get a holistic view on their operations. It also optimizes processes within their toolkits.
  • 5
    SpinOne Reviews
    Top Pick
    For enterprises that need to protect SaaS data in mission critical apps, SpinOne is an all-in-one SaaS security platform that helps IT security teams consolidate point solutions, save time by automating data protection, reduce downtime, and mitigate the risk of shadow IT, data leak and loss and ransomware. The all-in-one SaaS security platform from Spin is the only one that provides a layered defense to protect SaaS data, including SaaS security posture management (SSPM), SaaS data leak and loss prevention (DLP), and SaaS ransomware detection and response. Enterprises use these solutions to mitigate risk, save time, reduce downtime, and improve compliance.
  • 6
    Activu Reviews
    Activu makes all information visible, collaborative, proactive, and proactive to those who are responsible for monitoring critical operations or incidents. Our customers can instantly see, share, respond, and discuss events in real time, with context to improve incident response, decision making, and management. Software, systems, as well as services from Activu are a benefit to billions of people all over the globe. Activu was founded in 1983 by the first U.S.-based firm to develop video wall technology. Today, more than 1,000 control rooms rely on it.
  • 7
    CoScreen Reviews
    CoScreen enables multiple team members to share and edit application windows simultaneously on a joint desktop. Key features: - Crystal-clear audio and video chat - Multi-user screen sharing of any desktop or browser app with one click - Multi-user editing of shared windows using mouse and keyboard, 2-3x lower latency than Zoom, Slack, and Microsoft Teams - See who from your team is online and call them with one click - Integrate CoScreen with your favorite apps like Slack, VS Code, IntelliJ, and other JetBrains IDEs - Enterprise-grade compliance and securely encrypted connections At CoScreen, our mission is to help teams and organizations work together more seamlessly and effectively than ever before. We empower teams like yours to become more productive without getting burned out or video chat-fatigued - no matter if you work fully remotely, co-located, or hybrid. Top use cases: Team standups, 1:1s, sprint demos, pair programming, coding interviews, employee onboarding, incident management, incident response, and many more...
  • 8
    Klaxon Reviews

    Klaxon

    Klaxon Technologies

    $0.61 per user, per month
    Our major incident, mass notification, and planned maintenance solutions will keep your employees safe, informed, and productive. You can keep your team safe with timely communication updates. This prevents potentially dangerous events like cyber incidents, business continuity events, major incidents, and disasters from getting worse. Klaxon is the best tool to facilitate flexible and efficient communication in your company. Klaxon offers multiple notification channels. Users can choose how they want to receive major incidents notifications via email, SMS Voice/Telephone or Smartphone App. Two-way communication. Two-way communication. Recipients can use two-way communication to let you know if they have been affected, mark them as safe, and much more. Efficient incident management.
  • 9
    Cofense Reporter Reviews
    Our SaaS enabled email toolbar button allows your users to report suspicious emails in one click. It also standardizes the threat and contains it for incident responders. Your SOC can see real-time email threats and stop them faster. Organizations have not had an efficient way to gather, organize, and analyze user reports of suspicious email that could indicate the early stages of a Cyber Attack. Cofense Reporter is a cost-effective and simple way for organizations to fill this information void. Cofense Reporter for Mobile and Cofense Reporter for Desktop empower users to actively participate in a company's security program. Cofense Reporter simplifies the process of reporting suspicious emails by employees.
  • 10
    D3 Smart SOAR Reviews
    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency. Smart SOAR’s Event Pipeline is a powerful asset for enterprises and MSSPs that streamlines alert-handling with automated data normalization, threat triage, and auto-dismissal of false positives—ensuring that only genuine threats get escalated to analysts. When a real threat is identified, Smart SOAR brings together alerts and rich contextual data to create high-fidelity incidents that provide analysts with the complete picture of an attack. Clients have seen up to a 90% decrease in mean time to detect (MTTD) and mean time to respond (MTTR), focusing on proactive measures to prevent attacks. In 2023, over 70% of our business was from companies dropping their existing SOAR in favor of D3. If you’re frustrated with your SOAR, we have a proven program to get your automation program back on track.
  • 11
    LogicHub Reviews
    LogicHub is a platform that automates alert triage, threat hunting, and incident response. The LogicHub platform is unique in that it combines automation with advanced machine learning and correlation. The unique "whitebox" approach to LogicHub provides an easy way for analysts to tune and improve the system. It uses machine learning, advanced data science and deep correlation to rank each alert, IOC, or event. Analysts can quickly review and validate the results by reviewing the full explanation of the scoring logic. This means that 95% of false positives can safely be filtered out. New and previously unknown threats can be detected automatically in real-time, exponentially reducing Mean Time-to-Detect (MTTD). LogicHub integrates leading security and infrastructure solutions to create a holistic ecosystem for automated threat detection.
  • 12
    Query Federated Search Reviews
    Quickly access data from all sources with a single search, including non-security data sources and unstructured data in cloud storage. Control where and how to store data, reducing storage costs and eliminating expensive data churn projects. Supercharge your security investigations with a single view of normalized and enriched search results from across your data sources.
  • 13
    OnSolve Reviews
    You can quickly and accurately identify and respond to threats that affect your people, property, and places. Every minute matters™. OnSolve puts importance on speed, relevance, and usability in order to help customers achieve the best outcome for critical events. Communicate faster with the right people, on any device. You can quickly activate crisis response plans and work together in real-time. To make informed and proactive decisions, filter out irrelevant data. To ensure appropriate action, create custom incident plans and assign task assignments. Use the risk intelligence dashboard to identify all active incidents at a glance. To improve response times, you can enhance the alert sending process. Mobile apps allow you to access business continuity plans from anywhere.
  • 14
    HYAS Reviews
    HYAS Protect is proactive security that enables enterprises to make real-time automated, data-based risk assessment. HYAS Protect is able to detect and mitigate threats in real time, as well as provide a threat signal that can be used to improve security solutions. HYAS Insight gives threat and fraud response teams unparalleled visibility into the origins and infrastructure used to attack. It also shows them the infrastructure most likely to be used in future attacks. This allows them to speed up investigations and proactively protect enterprises. First West Credit Union is a Canadian financial institution that uses HYAS Insight to combat cyber fraud and respond to security incidents. This case study explains how HYAS aided in increasing analyst investigation speed by three times. We will communicate with you as a result of this submission. We also want to send you information, offers, and news about our products and services, as well as any other content we think may be of interest.
  • 15
    IBM QRadar SIEM Reviews
    The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
  • 16
    Swimlane Reviews
    Swimlane is a leader for security orchestration, automation, and response (SOAR). Swimlane automates manual, time-intensive processes and operational workflows, and delivers powerful, consolidated analytics and real-time dashboards from across your security infrastructure. This allows you to maximize the incident response capabilities for over-burdened, understaffed security operations. Swimlane was established to provide flexible, innovative, and scalable security solutions to organizations that are struggling with alert fatigue, vendor proliferation, and staffing shortages. Swimlane is a leader in the growing market for security orchestration and automation solutions that automate and organise security processes in repeatable ways to maximize resources and speed incident response.
  • 17
    Wazuh Reviews
    Wazuh is an enterprise-ready, free, open-source security monitoring solution that can be used for threat detection, integrity monitoring and incident response. Wazuh helps organizations detect intrusions and other threats by aggregating, indexing, and analyzing security data. Real-time monitoring and security analysis are essential for quick threat detection and remediation. Our light-weight agent provides the necessary monitoring, response capabilities, while the server component provides security intelligence and data analysis. Wazuh addresses the need to continuously monitor and respond to advanced threats. It focuses on providing security analysts with the right visibility and the insights to detect, investigate, and respond to threats and attack campaigns at multiple endpoints.
  • 18
    Tandem Software Reviews
    Tandem is an online tool that reduces regulatory compliance burdens and improves security posture. This is your all-in one information security and compliance solution. Tandem is our product because it works in partnership with you - in tandem. Tandem brings together your organization's knowledge and your needs. Tandem also offers software designed by information security professionals to help you organize, manage and monitor your information security program. Tandem will handle the new guidance, data tracking and structure, as well as report generation. You will be amazed at what you can do with the right tool for your job.
  • 19
    LMNTRIX Reviews
    LMNTRIX, an Active Defense company, specializes in detecting and responding quickly to advanced threats that go beyond perimeter controls. Be the hunter, not the prey. We think like the victim and respond to the attack. Continuous everything is the key. Hackers don't stop, and neither should we. This fundamental shift in thinking will change the way you think about how you detect and respond to threats. LMNTRIX helps you shift your security mindset away from an "incident response" approach to security. Systems are presumed to be compromised and need continuous monitoring and remediation. We help you become the hunter by thinking like an attacker and hunting down your network and systems. We then turn the tables and shift the economics of cyber defense to the attackers by weaving a deceptive coating over your entire network. Every endpoint, server, and network component is covered with deceptions.
  • 20
    WireX Systems Reviews
    A powerful central hub that streamlines the investigation and response process and accelerates knowledge sharing among team members. The framework integrates with various SIEM vendors to import ticket details (assembly and export them back at end of process), investigation management system, playbook modelling capabilities, as well enrichment tools such as Sandbox technologies, IP, host reputation, geolocation, and other threat feeds. Contextual Capture™ gives the world's most powerful organizations the technology foundation to automatically collect and analyze network data for security investigations. WireX Systems Contextual CaptureTM technology can help you overcome the limitations of full packet capture. It stores payload information for months, and eliminates the complexity of sifting through packets to "glue" them together.
  • 21
    Smartflow Reviews

    Smartflow

    Smartflow

    €295 Entry Fee / Monthly Price
    You can easily digitalize all your field inspections using Smartflow. Use the platform to digitalize inspections, operations, daily tasks, opera rounds, checklists, and other processes. With Smartflow you can create complex workflows using our drag & drop functionality. You get full control over the processes while you tailor them to meet the challenges & goals of your business objectives. You can easily add data from different sources or systems and use it when you create workflows. Smartflow provides you with instant analytics and data reports that you can share with all your customers.
  • 22
    CA Compliance Event Manager Reviews
    Non-compliance can lead to out-of-control expenses and a serious impact on your bottom line. CA Compliance Event Manager can help you ensure data security and compliance. Advanced compliance management tools allow you to gain insight into your company's risk profile, protect your business, as well as comply with regulations. For complete control over your security systems and data, monitor users, security settings, system files, and alert to suspicious activity. Receive real-time notifications to address potential threats. Filter and forward security events to SIEM platforms to get a complete view of your security infrastructure. Reduce costs by reducing the number of security alerts that are subject to real-time analysis. For deeper insight into your risk posture, you can inspect the source of the incident using detailed audit and compliance information.
  • 23
    Orna Reviews

    Orna

    Orna

    $833 per month
    The most intuitive cyber incident management and case management platform, with 200+ integrations and an on-call SME. Orna detects and groups attacks and anomalies in the entire infrastructure 24/7/365. It then enriches these data with threat intelligence from 28 public and privately-held sources. ORNA's AI analyzes and estimates the severity, not only of the alert, but also the assets affected. Dashboards with color-coded breakdowns of attacks by asset, type and technique, time and more, speeding up operations. ORNA's email and SMS notifications are highly configurable and secure based on team member roles, sources, and severity. This helps to avoid alert fatigue. Quick and decisive action is crucial when an attack occurs. ORNA allows you to mount a world class response as all alerts are able to be escalated from alerts into incidents by a single action.
  • 24
    Intezer Analyze Reviews
    Intezer’s Autonomous SOC platform triages alerts 24/7, investigates threats, and auto-remediates incidents for you. "Autonomously" investigate and triage every incident, with Intezer’s platform working like your Tier 1 SOC to escalate only the confirmed, serious threats. Easily integrate your security tools to get immediate value and streamline your existing workflows. Using intelligent automation built for incident responders, Intezer saves your team from time wasted on false positives, repetitive analysis tasks, and too many escalated alerts. What is Intezer? Intezer isn't really a SOAR, sandbox, or MDR platform, but it could replace any of those for your team. Intezer goes beyond automated SOAR playbooks, sandboxing, or manual alert triage to autonomously take action, make smart decisions, and give your team exactly what you need to respond quickly to serious threats. Over the years, we’ve fine-tuned and expanded the capabilities of Intezer’s proprietary code-analysis engine, AI, and algorithms to automate more and more of the time-consuming or repetitive tasks for security teams. Intezer is designed to analyze, reverse engineer, and investigate every alert while "thinking" like an experienced security analyst.
  • 25
    Cyber Triage Reviews
    Forensics to Respond to Incidents Fast and Affordable Automated incident response software allows for quick, thorough, and simple intrusion investigations. An alert is generated by SIEM or IDS. SOAR is used to initiate an endpoint investigation. Cyber Triage is used to collect data at the endpoint. Cyber Triage data is used by analysts to locate evidence and make decisions. The manual incident response process is slow and leaves the entire organization vulnerable to the intruder. Cyber Triage automates every step of the endpoint investigation process. This ensures high-quality remediation speed. Cyber threats change constantly, so manual incident response can be inconsistent or incomplete. Cyber Triage is always up-to-date with the latest threat intelligence and scours every corner of compromised endpoints. Cyber Triage's forensic tools can be confusing and lack features that are necessary to detect intrusions. Cyber Triage's intuitive interface makes it easy for junior staff to analyze data, and create reports.
  • 26
    Belkasoft Remote Acquisition Reviews
    Belkasoft Remote Acquisition (Belkasoft R), a new digital forensic tool, is designed to remote extract data from hard and removable drives, RAM, mobile devices, and other types. Belkasoft R is useful for cases where an incident response analyst or digital forensic investigator must quickly gather evidence and the devices are located in geographically dispersed locations.
  • 27
    The Respond Analyst Reviews
    XDR Cybersecurity Solutions can accelerate investigations and increase analyst productivity. The Respond Analyst™, an XDR Engine automates the detection of security incidents. It transforms resource-intensive monitoring into consistent investigations. The Respond Analyst connects disparate evidence with probabilistic mathematics and integrated reasoning, determining whether events are malicious and possible actionable. The Respond Analyst enhances security operations teams by significantly reducing false positives, allowing for more time for threat hunting. The Respond Analyst lets you choose the best-of-breed controls for modernizing your sensor grid. The Respond Analyst integrates seamlessly with leading security vendors across key categories, including EDR, IPS Web Filtering and EPP, Vulnerability Scanning, Authentication and more.
  • 28
    Blackpanda Reviews
    Blackpanda Digital Forensics services and Incident Response experts help you identify, prioritize and contain security issues in the event that there is a breach. This will allow you to minimize damage and respond more effectively for future incidents. Our incident response specialists work with your team to identify and prioritize vulnerable assets. They also create organizational response plans and bespoke playbooks for common attacks and communication protocols. All processes are thoroughly tested to ensure the best response. Our cyber security services help prevent damage from ever occurring. Digital actions leave digital footprints. Our digital forensics experts collect, analyze, preserve, and preserve digital evidence to trace the details of an incident, recover stolen or lost data, and testify before stakeholders or law enforcement if necessary. Our forensic cyber security experts can assist in private, corporate, and legal cases.
  • 29
    ProDiscover Reviews
    The ProDiscover forensics suite covers a wide range cybercrime scenarios that are encountered by law enforcement officers and corporate internal security investigators. ProDiscover is used extensively in Computer Forensics and Incident Response. The product suite also includes tools for electronic discovery and diagnostics. ProDiscover is a tool that helps you quickly find files and data. Dashboards, timeline views, and wizards are all useful in quickly locating vital information. Investigators have access to a variety of tools and integrated viewers that allow them to examine the evidence disks and extract relevant artifacts. ProDiscover offers speed, accuracy, and ease-of-use at a reasonable price. ProDiscover was launched in 2001. It has a rich history. ProDiscover was the first product to support remote forensic capabilities.
  • 30
    Cado Reviews
    Investigate all alerts that have been escalated with unmatched speed and depth. Security Operations and Incident Response Teams can revolutionize the way they investigate cyber attacks. You need a platform that can deliver answers in today's complex, evolving hybrid world. Cado Security empowers your teams with unmatched data acquisition, extensive contextualization, and unparalleled speed. The Cado Platform offers automated, detailed data, so teams don't need to scramble for the information they need. This allows for faster resolutions and better teamwork. Once the data is gone with ephemeral, it's gone. Act in real time. Cado Platform, the only tool that can perform full forensic captures and use instant triage collection methods, is able to acquire cloud-based resources such as containers as well as SaaS apps and on-premises endpoints.
  • 31
    Sophos Cloud Native Security Reviews
    Multi-cloud security coverage that covers all environments, workloads, identities, and identities. A single integrated cloud security platform can increase efficiency. Sophos Cloud Native Security unifies security tools across cloud environments, workloads, and entitlements management. Integrated with SIEM, collaboration and workflow tools, to increase agility within an organization. Your cloud environments must be resilient, difficult to compromise, and easy to recover from. You can use our intuitive and comprehensive security and remediation tools to manage your security teams or through Managed Services to accelerate your cyber resilience to meet today's security threats. Our extended detection and response (XDR), tools can be used to detect and stop malware, exploits and misconfigurations. To optimize investigation and response, hunt for threats and prioritize detections.
  • 32
    UTMStack Reviews

    UTMStack

    UTMStack

    $25 per device per month
    A centralized management dashboard gives you complete visibility into the organization. All solutions in the stack can be integrated with one another and report to a single database. This makes it easy to perform daily tasks like monitoring, investigation and incident response. Both active and passive vulnerability scanners are available for early detection. They also provide compliance audit reports. Manage accounts access and permission changes. Alerts are sent when suspicious activity occurs. Remotely manage your environment, and respond to attacks from your dashboard. Keep track of all changes and gain access to classified information. Advanced threat protection protects servers and endpoints.
  • 33
    OpenText Security Suite Reviews
    OpenText™, Security Suite powered by OpenText™ EnCase™, offers 360-degree visibility across all devices, including laptops, desktops, and servers, for proactive discovery and remediation. It also allows for discreet, forensically sound data collection and investigation. Security Suite is the industry standard for digital investigations and incident response. Security Suite has agents deployed on over 40 million endpoints and clients that include 78 Fortune 100 companies. EnCase solutions are designed to help law enforcement, government agencies, and enterprises address a variety of issues, including file analytics, endpoint detection, response (EDR), and digital forensics. They offer the most trusted cybersecurity and digital forensics software. Security Suite solves problems that are often overlooked or left unsolved at the endpoint. It restores confidence for customers and companies with its unparalleled reliability and breadth.
  • 34
    Symmetry Incident Management Reviews
    Organizations must be proactive in investigating and managing safety incidents at work. It doesn't matter if it's a malfunctioning light bulb in a garage or an active shooter situation. Companies must properly manage, analyze, document, and document incidents so they can be addressed. An organization can save money and improve efficiency by understanding how security officers operate throughout the day. Through configurable questions, instant notifications and computer-aided dispatch, you can understand how events unfold and create intelligent narratives that include images, videos, documentation, and documentation specific to your location. Understanding the consequences of every action taken during and following an event will allow you to make informed and data-backed business decisions involving resources, staffing and reporting.
  • 35
    LogRhythm SIEM Reviews
    We understand that your job is not easy. Log management, machine learning and NDR are all part of our solution. This gives you broad visibility to your environment, so you can quickly spot threats and minimize risk. A mature SOC does more than stop threats. LogRhythm makes it easy to track your progress and baseline your security operations program. This will allow you to easily report on your successes to your board. Protecting your enterprise is a huge responsibility. That's why we designed our NextGen SIEM Platform for you. Protecting your business has never been easier thanks to intuitive, high-performance analytics, and a seamless workflow for responding to incidents. LogRhythm XDR Stack gives your team an integrated set of capabilities that can be used to deliver the core mission of your SOC, which is threat monitoring, threat hunting and incident response. It also comes at a low total cost.
  • 36
    Mitiga Reviews
    Imagine the best military cybersecurity experts in the world being in charge of your cloud’s Incident response & readiness. Imagine this knowledge and expertise being integrated into a new tech stack and delivered via managed services. Hybrid cloud environments present unique security risks that require special preparation. Mitiga helps organizations increase their security resilience by guiding them through the fogs of war that can result from an incident. This speeds up the process of getting back to business as usual, from days down to hours. Mitiga's managed services include a completely new Incident readiness and response tech stack. Mitiga's top-tier talent will quickly get you back to work and handle real-time incidents with precision.
  • 37
    FortiEDR Reviews
    Fortinet announced the acquisition by enSilo, Inc., a leader in advanced endpoint security. Combining Fortinet with enSilo provides enterprises with a complete suite of endpoint detection (EDR) capabilities that automate protection against advanced threats, post-execution and with real-time orchestrated incident response functionality. enSilo's integration of FortiSIEM and FortiSandbox firewalls, FortiSIEM and FortiClient, allows enterprises to have superior endpoint visibility as well as tightly coordinated, dynamic control over network, user and host activity in their environment. Service providers can also benefit from such integration by providing a comprehensive managed detection and response (MDR), service.
  • 38
    StackPulse Reviews
    StackPulse automates incident management and response, enabling continuous software service reliability. The StackPulse platform provides SREs, developers, and on-callers with the context and control to analyze, respond, and resolve incidents across all levels of the stack. StackPulse changes the way engineering and operations teams manage software and infrastructure services. Our Platform makes it easy for you to collaborate with a range of incident management tools, including automated war room creation, data capture, and auto-generated postmortems. These incidents provide data that can be used to generate recommendations for playbooks and triggers. This can help reduce MTTR and improve SLO compliance. StackPulse identifies risks based on the unique patterns of your organization's monitoring, infrastructure and operational data. Then, it recommends automated playbooks that are tailored to your company.
  • 39
    incident.io Reviews

    incident.io

    incident.io

    $16 per responder per month
    Simple. Powerful. Easy incident management. Prepare for incident management in a new way with a beautiful interface, powerful workflow automation and integrations with your existing tools. We make adoption simple by meeting your team where they already work, in Slack. We also integrate seamlessly with all of the tools you know and love including Jira Statuspage and PagerDuty. We guide your team through the most stressful situations. Now, anyone can run incidents confidently so that you can scale your business without slowing down. Our easy-to-build workflows will help you create consistency instantly. Automate repetitive processes, from sending updates to executives to compiling the post-mortems. This will allow you to focus on fixing and creating world-class products. By running more transparent incidents, you can avoid duplication and reduce distractions. You can assign roles, update incidents, and find a summary of all active incidents.
  • 40
    ACSIA Reviews

    ACSIA

    DKSU4Securitas Ltd

    Depends on number of servers
    ACSIA is a 'postperimeter' security tool that complements traditional perimeter security models. It is located at the Application or Data Layer. It protects the platforms (physical, VM/ Cloud/ Container platforms) that store the data. These platforms are the ultimate targets of every attacker. Many companies use perimeter defenses to protect their company from cyber adversaries. They also block known adversary indicators (IOC) of compromise. Pre-compromise adversaries are often carried out outside the enterprise's scope of view, making them harder to detect. ACSIA is focused upon stopping cyber threats in the pre-attack phase. It is a hybrid product that includes a SIEM (Security Incident and Event Management), Intrusion Detection Systems, Intrusion Prevention Systems, IPS, Firewall and many other features. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection
  • 41
    xMatters Reviews

    xMatters

    Everbridge

    $9 per user per month
    xMatters, an intelligent communications platform, is designed to accelerate critical business processes, including IT operations, DevOps, and major incident management processes. xMatters is trusted by more than 1000 global companies. It provides intelligent communication tools that enable effective IT management, business continuity management and employee engagement. The platform offers unparalleled reliability and innovative functionality.
  • 42
    ASGARD Management Center Reviews
    ASGARD Management Center is the ideal platform for incident response. It allows you to execute enterprise-wide thor scans. It provides an easy-to-use interface that allows you to execute complex response playbooks on up one million endpoints. All from one console. ASGARD ships as a hardened virtual appliance and features agents on Microsoft Windows, Linux AIX, MacOS, and MacOS. Its rich API allows interoperation with SOAR frameworks and sandboxes as well as antivirus systems, SIEM system, CMDBs, IPS, and other security devices. This demo shows how easy it can be to launch a scan using custom IOCs from an connected MISP. In this example, we select all events that have the keyword "Emotet", add them into a new rule set, and then use that rule set to launch a new Group Scan using THOR.
  • 43
    Alliance Reviews
    Alliance is a HIPAA-compliant, integrated Hospital Security Management System that is HIPAA compliant. It was created by law enforcement personnel to manage both day-to-day operations and major events. The software comes pre-packaged and includes 100s of reports that can be used by risk managers as well as hospital's Joint Commission Committee. Alliance's tools are optimized for efficiency and can handle everything from minor incidents to major events such as an act of terror, earthquake, flood, flood, or earthquake. Dispatch (Event Desk), a tightly integrated system that locates critical information quickly, reduces dispatcher stress and minimizes input mistakes. The interface is intuitive and automated tools make it easy to enter incident data quickly. This allows personnel to "populate" the database using forms that are specific to their task.
  • 44
    PT Industrial Security Incident Manager Reviews
    The PT ISIM hardware device monitors ICS network security and detects cyberattacks early. It also identifies staff negligence or malicious actions and encourages compliance with industry regulations and cybersecurity legislation. PT ISIM is a good choice for small businesses due to its ease of ICS connection and self learning technology. This is especially important when security personnel are scarce. PT ISIM can be used to power a security operation center (SOC), which monitors ICS threats and provides effective security management across geographically dispersed locations. PT ISIM's flexible mix of components makes it easy to deploy on any infrastructure, regardless of industry. Scaling up, no matter how rapid or gradual it is, is easy on even the most complex networks. PT ISIM's monitoring architecture is passive-only.
  • 45
    Agari Reviews
    Trusted Email Identity can be used to protect customers and workers from advanced email attacks. Advanced email attacks target a major security flaw that legacy email security measures do not address. Agari gives customers, employees, and partners the confidence to trust in their email. Unique AI with more than 300m daily machine-learning model updates understands the good and protects you from the bad. Global intelligence powered trillions of global emails provides deep insights into behavior and relationships. Global 2000 companies have adopted the email security standards based on years of experience.
  • 46
    Netwrix Threat Manager Reviews
    Netwrix's threat detection software detects and responds to advanced attacks and abnormal behavior with high accuracy. IT infrastructures are becoming more complex, and the amount of sensitive data stored in them is increasing. The threat landscape is changing rapidly as attacks become more sophisticated and costly. Real-time alerts via email or mobile notifications will help you improve your threat management process and be aware of any suspicious activity in your network. Share data between Netwrix Threat Manager, your SIEM, and other security solutions to maximize the value of your investment and improve security across your IT ecosystem. Use the extensive catalog of preconfigured responses to respond immediately when a threat is detected. Or, integrate Netwrix Threat Manager into your business processes by using PowerShell and webhooks.
  • 47
    Shoreline Reviews
    Shoreline is the only cloud reliability platform that allows DevOps engineers to build automations in a matter of minutes and fix problems forever. Shoreline’s modern “Operations at the Edge” architecture runs efficient agents in the background of all monitored hosts. Agents run as a DaemonSet on Kubernetes or an installed package on VMs (apt, yum). The Shoreline backend is hosted by Shoreline in AWS, or deployed in your AWS virtual private cloud. Debugging and repairing issues is easy with advanced tooling for your best SREs, Jupyter style notebooks for the broader team, and a platform that makes building automations 30X faster by allowing operators to manage their entire fleet as if it were a single box. Shoreline does the heavy lifting, setting up monitors and building repair scripts, so that customers only need to configure them for their environment.
  • 48
    Everbridge Risk Intelligence Reviews
    Everbridge Risk Intelligence, a risk monitoring system, integrates technology and resources to collect and analyze information about all hazards, improving your ability to monitor and respond to risks. Everbridge Risk Intelligence's real-time alerting combines thousands of data sources from the most reliable organizations with an experienced team at our Risk Intelligence Monitoring Center. This enables your organization to analyze and monitor worldwide incidents and events. This configurable, comprehensive risk monitoring solution provides actionable information to reduce risk wherever people live, travel, or work. Duty of Care obligations can be met with real-time threat assessment and hyper-local information of the threat landscape, wherever your employees work, live, or travel.
  • 49
    Proofpoint Threat Response Reviews
    When responding to threats that target employees within an organization, security teams face many challenges. These challenges include a shortage of staff, an overwhelming amount of alerts, and trying to reduce the time it takes for security teams to respond to and remediate threats. Proofpoint Threat Response is a leader in security orchestration, automation, and response (SOAR). It enables security teams respond more quickly and efficiently to changing threat landscapes. Threat Response orchestrates several key steps of the incident response process. It can automatically enrich and group any alerts from any source into incidents in seconds. Security teams get rich and valuable context by leveraging Proofpoint Threat Intelligence and third-party threat Intelligences to help understand the "who," "what and where" of attacks, prioritize, and quickly triage incoming events.
  • 50
    eRiskHub Reviews
    Let's face facts. There is no perfect security. Most organizations will be affected by a data breach, whether it's due to hacker activity, a computer glitch, or staff error. Your clients require immediate assistance and expertise in order to recover from a cyber attack. Because of the complexity of these events, clients need to be able to respond in multiple ways. This includes legal/regulatory compliance and information technology (IT), security, privacy, DR/BC and computer forensics. You can license the eRiskHub®, powered by NetDiligence®, to provide your clients with a one-stop resource for all things cybersecurity. This will help them strengthen their defenses and respond effectively in case of data breaches, network attacks, and other cyber incidents. There are many options available! Check out our options.