Best Incident Response Software

Products Buyer's Guide
8.2
TheHive
★★★★★

TheHive

TheHive is a scalable, open source and free security incident response solution.

Excelent tool on Enterprise Level - Industry Analyst / Tech Writer in Telecommunications

Ease of use
8.3
Support
8.1
Ease of Setup
8.3

Languages supported: English

8.4
LogRhythm NextGen SIEM Platform
★★★★★

LogRhythm NextGen SIEM Platform

LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats

Strong Product - Has All that's needed. Still room for improvement. - Administrator in Financial Services

Ease of use
8.2
Support
8.3
Ease of Setup
0.0

Languages supported: English

8.8
AlienVault USM (from AT&T Cybersecurity)
★★★★★

AlienVault USM (from AT&T Cybersecurity)

AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Security that is out of this world - Karl H.

Ease of use
8.2
Support
8.7
Ease of Setup
0.0

Languages supported: English

9.0
Dynatrace
★★★★★

Dynatrace

Dynatrace has redefined how you monitor today's digital ecosystems. AI-powered, full stack and completely automated, it's the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world's leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.

Brilliant Application Performance Monitoring Solution - Ayodele A.

Ease of use
8.3
Support
9.1
Ease of Setup
0.0

Languages supported: German, English, French, Italian, Japanese, Korean, Spanish, Chinese (Simplified)

9.0
Cofense Reporter
★★★★★

Cofense Reporter

To date, organizations have lacked an efficient process for gathering, organizing, and analyzing user reports of suspicious emails that may indicate early stages of a cyber attack. Cofense Reporter provides organizations with a simple, cost-effective way to fill this information gap.

Great Phishing Reporting Tool - User in Capital Markets

Ease of use
Support
Ease of Setup
9.0
Activu vis|ability
★★★★★

Activu vis|ability

ActivLink is middle-ware that integrates ActivWare, Activus visualization and collaboration software platform, with a customers analytical or monitoring software to automatically present actionable information based on a triggering event or alarm condition, leading to better, faster incident response

Amazing incident response system - Nimita N.

Ease of use
Support
Ease of Setup
8.0
FireEye Helix
★★★★★

FireEye Helix

FireEye Helix is a intelligence-led platform designed to simplify, integrate and automate security operations.

Easy Implementation - Kunal G.

Ease of use
Support
Ease of Setup
7.0
CimSweep
★★★★★

CimSweep

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

Powershell for the win! - Administrator in Gambling & Casinos

Ease of use
Support
Ease of Setup
6.0
Continuity Engine
★★★★★

Continuity Engine

Continuity Engine protects your most mission-critical applications with a goal of zero downtime. It delivers near instantaneous failover with near-zero recovery times by proactively monitoring the health of your applications and ensuring that it is always in a healthy condition and in a healthy site. That site can be at the primary site, a secondary site or even a tertiary site.

Decent Experience - User in Insurance

Ease of use
Support
Ease of Setup
6.0
Datev
★★★★★

Datev

DATEV in one sentence: tax consultants, lawyers, auditors, small and medium-sized enterprises, municipalities, and founders using DATEV software that meets all requirements at high standards regarding reliability, topicality, data protection, and data security.

Datev Anwalt Classic - Consultant in Legal Services

Ease of use
Support
Ease of Setup
10.0
Radar
★★★★★

Radar

Quickly and consistently determine if your privacy or security incidents require notification under global data breach laws

Positive review for our use of RADAR - Vicky E.

Ease of use
Support
Ease of Setup

Languages supported: English

10.0
Mozilla Enterprise Defense Platform
★★★★★

Mozilla Enterprise Defense Platform

The Mozilla Enterprise Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

MozDef is the best secure, flexible, effective enterprise protection solution - Sandro Roberto L.

Ease of use
Support
Ease of Setup
10.0
GreatHorn
★★★★★

GreatHorn

Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

A Great Barrier For Attackers - Lisa K.

Ease of use
Support
Ease of Setup
0.0
CYREBRO
★★★★★

CYREBRO

CYREBRO was founded in 2012 as CyberHat to help companies take cyber protection to new and unprecedented heights.Today, we have evolved into CYREBRO and are on a mission to completely revolutionize cybersecurity operations by putting the power of a full-fledged Security Operations Center (SOC) in the hands of any user in any organization.Our team of premier cybersecurity experts has developed the industry's first cloud-based, technology-agnostic ...

-

Ease of use
Support
Ease of Setup
0.0
JASK
★★★★★

JASK

JASK is modernizing security operations by delivering an advanced SIEM platform that provides better visibility, better automation and a better architecture. Built on cloud-native technologies, the JASK Autonomous Security Operations Center (ASOC) platform streamlines security analyst workflows by automating many of the repetitive tasks that restrict productivity, freeing them for higher-value roles--like threat hunting and vulnerability ...

-

Ease of use
Support
Ease of Setup

Languages supported: English

B2B Software Guide