Security Operations
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 2,538 security operations tools
FEATURED
- Home
- Categories
- Security Operations
RELATED TASKS
FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence
FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.
Managed 24/7 threat detection, investigation & response service by Tuearis Cyber.
Managed 24/7 threat detection, investigation & response service by Tuearis Cyber.
Quantum network simulator for designing and testing quantum network protocols
Quantum network simulator for designing and testing quantum network protocols
Digital fraud prevention & detection platform for finance and e-commerce.
Digital fraud prevention & detection platform for finance and e-commerce.
Cybersecurity & digital forensics software for malware detection and DFIR.
Cybersecurity & digital forensics software for malware detection and DFIR.
24/7 AI-driven managed SOC & XDR services for MSPs and enterprises.
24/7 AI-driven managed SOC & XDR services for MSPs and enterprises.
AI-powered malware analysis & threat research platform with chat interface.
AI-powered malware analysis & threat research platform with chat interface.
R&D firm providing cyber defense & operational tech for DoD and DHS.
R&D firm providing cyber defense & operational tech for DoD and DHS.
Endpoint threat hunting, ransomware protection & cloud sandbox platform.
Deception-based breach detection tools including honeypots & canary tokens.
Deception-based breach detection tools including honeypots & canary tokens.
Security data pipeline platform for collecting, transforming, and routing telemetry.
Security data pipeline platform for collecting, transforming, and routing telemetry.
Suite of data forensics, migration, backup, and cybersecurity tools/services.
Suite of data forensics, migration, backup, and cybersecurity tools/services.
AI-powered SOC command center for centralized threat detection & response.
AI-powered SOC command center for centralized threat detection & response.
Canadian MSSP offering MDR, incident response, and CMMC compliance services.
Canadian MSSP offering MDR, incident response, and CMMC compliance services.
MDR service combining CrowdStrike EDR with 24/7 expert monitoring for SMEs.
MDR service combining CrowdStrike EDR with 24/7 expert monitoring for SMEs.
AI-powered IoT threat detection with runtime integrity verification.
AI-powered IoT threat detection with runtime integrity verification.
Web-based cyber hacking defense training platform with CTF-style exercises.
Web-based cyber hacking defense training platform with CTF-style exercises.
OSINT tool for investigating cybercrime activity on Telegram.
OSINT tool for investigating cybercrime activity on Telegram.
Expands a single malware hash into full family visibility via structural analysis.
Expands a single malware hash into full family visibility via structural analysis.
Turns a single IOC or hash into a full malware campaign investigation view.
Turns a single IOC or hash into a full malware campaign investigation view.
AI-powered file analysis platform delivering malware verdicts in natural language.
AI-powered file analysis platform delivering malware verdicts in natural language.
Patented ML-based behavioral analytics engine for CI/CD & cloud risk detection.
Patented ML-based behavioral analytics engine for CI/CD & cloud risk detection.
File analysis & threat intel search engine for SOC and IR teams.
Security Operations Tools - FAQ
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.