Security Operations

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Browse 2,538 security operations tools

FourCore ATTACK Logo

FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence

0
HexPrism Logo

HexPrism is a fast, privacy-first hex editor built for CTFs and digital forensics.

0
Managed Detection & Response (MDR) Logo

Managed 24/7 threat detection, investigation & response service by Tuearis Cyber.

0
Aliro Simulator Logo

Quantum network simulator for designing and testing quantum network protocols

0
XTN Cognitive Security Logo

Digital fraud prevention & detection platform for finance and e-commerce.

0
WetStone Labs Logo

Cybersecurity & digital forensics software for malware detection and DFIR.

0
Vijilan Logo

24/7 AI-driven managed SOC & XDR services for MSPs and enterprises.

0
Unknown Cyber Magic™ Logo

AI-powered malware analysis & threat research platform with chat interface.

0
Two Six Technologies Logo

R&D firm providing cyber defense & operational tech for DoD and DHS.

0
TriagingX Logo

Endpoint threat hunting, ransomware protection & cloud sandbox platform.

0
Thinkst Applied Research Logo

Deception-based breach detection tools including honeypots & canary tokens.

0
Tenzir Logo

Security data pipeline platform for collecting, transforming, and routing telemetry.

0
SysTools Logo

Suite of data forensics, migration, backup, and cybersecurity tools/services.

0
StrikeReady Security Command Center Logo

AI-powered SOC command center for centralized threat detection & response.

0
StreamScan Logo

Canadian MSSP offering MDR, incident response, and CMMC compliance services.

0
Stoïk MDR Logo

MDR service combining CrowdStrike EDR with 24/7 expert monitoring for SMEs.

0
Sternum Threat Detection Logo

AI-powered IoT threat detection with runtime integrity verification.

0
Stealien Cyber Drill System Logo

Web-based cyber hacking defense training platform with CTF-style exercises.

0
StealthMole Telegram Tracker Logo

OSINT tool for investigating cybercrime activity on Telegram.

0
Stairwell Variant Discovery Logo

Expands a single malware hash into full family visibility via structural analysis.

0
Stairwell Run to Ground Logo

Turns a single IOC or hash into a full malware campaign investigation view.

0
Stairwell Intelligent Analysis Logo

AI-powered file analysis platform delivering malware verdicts in natural language.

0
Start Left® SPACE Behavioral Analytics Engine Logo

Patented ML-based behavioral analytics engine for CI/CD & cloud risk detection.

0
Stairwell Logo

File analysis & threat intel search engine for SOC and IR teams.

0

Security Operations Tools - FAQ

Common questions about Security Operations tools including selection guides, pricing, and comparisons.

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.

Have more questions? Browse our categories or search for specific tools.