Best Incident Response Software

Products Buyer's Guide
9.2
FireEye Redline
★★★★★

FireEye Redline

Redline provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile.

Review from Controls Engineer - User in Oil & Energy

Ease of use
Support
Ease of Setup
8.2
ServiceNow Security Operations
★★★★★

ServiceNow Security Operations

ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It's built on the intelligent workflows, automation, orchestration, and deep connection with IT of the ServiceNow platform.

Very powerful tool - Oussama R.

Ease of use
6.1
Support
8.5
Ease of Setup
0.0
8.4
D3 Security
★★★★★

D3 Security

D3 Security provides a proven incident management platform that empowers security operations with a full-lifecycle remediation solution and a single tool to determine the root cause of and corrective action for any threat- be it cyber, physical, financial, IP or reputational.

The best security operation platform - George K.

Ease of use
8.7
Support
8.2
Ease of Setup
9.2
9.2
LogicHub
★★★★★

LogicHub

Automatically learns from human analysts and automates detection and response, never having analysts repeat the same investigations ever again.

Powerful SOAR platform with good value proposition and great potential. - Martin Spencer S.

Ease of use
Support
Ease of Setup

Languages supported: English

9.0
InsightIDR
★★★★★

InsightIDR

InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.

Very good SIEM alternative for smaller size businesses - Linus L.

Ease of use
9.2
Support
8.8
Ease of Setup
0.0

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.0
Proofpoint Threat Response
★★★★★

Proofpoint Threat Response

Proofpoint Threat Response takes the manual labor and guesswork out of incident response to help you resolve threats faster and more efficiently.

Proofpoint handles DLP with ease - User in Financial Services

Ease of use
Support
Ease of Setup
8.8
StealthDEFEND
★★★★★

StealthDEFEND

Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data.

StealthDefend is like boarder security - keeps harmful stuff out - Matt D.

Ease of use
Support
Ease of Setup
10.0
LMNTRIX
★★★★★

LMNTRIX

LMNTRIX has reimagined cybersecurity, turning the tables in favor of the defenders once again. We have cut out the bloat of SIEM, log analysis and false positives resulting in alert fatigue, and we created new methods for confounding even the most advanced attackers. We believe that in a time of continuous compromise you need continuous response – not incident response. Our approach turns inward and assumes that you're already breached and that ...

LMNTRIX will always win in my playbook! They keep out the Threats, so YOU don't have to sweat! - Henry D.

Ease of use
Support
Ease of Setup

Languages supported: English

9.6
DERDACK Enterprise Alert
★★★★★

DERDACK Enterprise Alert

DERDACK Enterprise AlertВ® combines automated alert notification workflows, 24/7 duty scheduling, ad-hoc collaboration and anywhere IT troubleshooting – reducing unexpected IT downtimes at large enterprises and organizations by 60%.

Solution for IT alerting - Christopher H.

Ease of use
8.9
Support
9.8
Ease of Setup
8.1

Languages supported: German, English, Dutch

9.6
FortiEDR
★★★★★

FortiEDR

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks.

Complete protection before and after the presence of a threat - Ava H.

Ease of use
Support
Ease of Setup
9.4
Cybereason Defense Platform
★★★★★

Cybereason Defense Platform

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.

Truly a leader in the EDR space! - Nick L.

Ease of use
Support
Ease of Setup
9.0
Darktrace Antigena Network
★★★★★

Darktrace Antigena Network

Antigena Network is the world's first Autonomous Response solution for the enterprise. Powered by self-learning AI, it is the only solution that can interrupt attacks at machine speed and with surgical precision, even if the threat is targeted or entirely unknown.By taking swift and targeted action, Antigena Network stops emerging threats that other tools miss. The technology provides 24/7 coverage of your entire workforce, when security teams ...

Excellent cyber Defence platform - Anand V.

Ease of use
Support
Ease of Setup
9.0
ThreatConnect
★★★★★

ThreatConnect

ThreatConnect is a in-platform analytics and automation solution.

Investigate, validate, respond and solve any kind of threat with threat connect. - Salome W.

Ease of use
Support
Ease of Setup
9.4
SIRP
★★★★★

SIRP

SIRP Security orchestration and automation platform helps you improve response time, reduce risk exposure, and maintain consistency of your process across your security program.

Data Aggregation, Ease of Access and Quick Reporting - Iqra Z.

Ease of use
9.5
Support
9.4
Ease of Setup
9.3

Languages supported: English

9.0
Resolve
★★★★★

Resolve

The Resolve Software is used to accelerate incident resolution for all types of incidents in customer care, network, and IT operation centers.

Good Workflow Automation tool with tons of integration but needs improvement on the stability & DR - Prateek Kumar G.

Ease of use
8.9
Support
9.1
Ease of Setup
8.3
8.6
Sumo Logic
★★★★★

Sumo Logic

Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions

Makes life easy for support! - Kshiitija (Prachii) D.

Ease of use
8.1
Support
8.6
Ease of Setup
0.0

Languages supported: English

9.4
Defendify Cybersecurity Platform
★★★★★

Defendify Cybersecurity Platform

Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.

Great set of tools at a reasonable price. - Ryan J.

Ease of use
9.7
Support
8.9
Ease of Setup
9.4

Languages supported: English

8.8
Swimlane
★★★★★

Swimlane

Swimlane is a security platform designed to prioritize alerts, remediate threats and improve operational performances.

It is a platform that is used in process flow diagram or flowcharts. - User in Information Technology and Services

Ease of use
9.3
Support
8.5
Ease of Setup
0.0
8.4
Datadog
★★★★★

Datadog

Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.

An all in one solution for metrics, logs, and infrastructure success for your DevOps team. - Randy N.

Ease of use
7.9
Support
8.2
Ease of Setup
8.5

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.6
Blumira Automated Detection & Response
★★★★★

Blumira Automated Detection & Response

Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.

strong incident detection and response capability - Administrator in Electrical/Electronic Manufacturing

Ease of use
9.4
Support
9.5
Ease of Setup
9.5

Languages supported: English

8.8
Proofpoint Threat Response Auto-Pull
★★★★★

Proofpoint Threat Response Auto-Pull

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators to move malicious or unwanted messages to quarantine, after delivery. It follows forwarded mail and distribution lists and creates an auditable activity trail.

Taking email threat response to the next level. - Dana S.

Ease of use
8.8
Support
8.8
Ease of Setup
8.5

Languages supported: Arabic, Bulgarian, Czech, Danish, German, English, Finnish, French, Hebrew, Hindi, Hungarian, Indonesian, Italian, Japanese, Korean, Malay, Dutch, Norwegian, Polish, Portuguese, Romanian, Russian, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese, Chinese (Simplified)

9.6
SmartEvent Event Management
★★★★★

SmartEvent Event Management

SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, compliance, and reporting. Respond to security incidents immediately and gain network true insights.

Logs and events correlation for your NGFWs - Aleh P.

Ease of use
Support
Ease of Setup
8.6
The Respond Analyst
★★★★★

The Respond Analyst

The Respond Analyst is trained as an expert cyber security analyst that combines human reasoning with machine power to make complex decisions with 100% consistency. The Respond Analyst works with your existing detection solutions and escalates complete, vetted security incidents that need response.

Only way to reduce alert fatigue - Aaron B.

Ease of use
Support
Ease of Setup
8.6
DomainTools
★★★★★

DomainTools

DomainTools' data and products work in harmony to enable security teams to start getting ahead of attacks, gain context and visibility into potential threats, and lower the skills barrier.

Love Their WhoIs Lookup - User in Internet

Ease of use
Support
Ease of Setup
8.6
IBM Security QRadar
★★★★★

IBM Security QRadar

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on ...

Excellent SIEM - Jonathan S.

Ease of use
8.2
Support
8.7
Ease of Setup
8.3

Languages supported: German, English, French, Italian, Japanese, Korean, Portuguese, Russian, Spanish, Chinese (Simplified)

9.0
PhishER
★★★★★

PhishER

PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous ...

Great Security Tool for Businesses! - Cody R.

Ease of use
9.0
Support
9.0
Ease of Setup
9.2
8.6
Vectra AI
★★★★★

Vectra AI

Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.

Easy to deploy and works great at finding evil. - Joel V.

Ease of use
8.3
Support
8.7
Ease of Setup
0.0

Languages supported: English

8.8
Cyber Triage
★★★★★

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their alerts.

Manager IT - Consultant in Information Technology and Services

Ease of use
9.0
Support
8.9
Ease of Setup
7.0
B2B Software Guide