Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Explore 1727 curated cybersecurity tools, with 14,858 visitors searching for solutions
Online platform offering 700+ hands-on web security exercises and training
Online platform offering 700+ hands-on web security exercises and training
Data normalization engine that unifies telemetry across security tools
Data normalization engine that unifies telemetry across security tools
Real-time threat detection and telemetry routing platform for security data
Real-time threat detection and telemetry routing platform for security data
Mobile app for security operations incident response and threat management
Mobile app for security operations incident response and threat management
Native SOAR platform for automating security response workflows
Native SOAR platform for automating security response workflows
24/7 MDR service with threat detection, incident response, and monitoring
24/7 MDR service with threat detection, incident response, and monitoring
Managed SOAR service for incident response automation and orchestration
Managed SOAR service for incident response automation and orchestration
24x7 MDR service providing threat detection, response, and hunting capabilities
24x7 MDR service providing threat detection, response, and hunting capabilities
Managed XDR service powered by Rapid7 platform from Integrity360
Managed XDR service powered by Rapid7 platform from Integrity360
Managed SIEM service for log collection, analysis, and threat detection
Managed SIEM service for log collection, analysis, and threat detection
Managed Detection & Response service by Integrity360
Managed Detection & Response service by Integrity360
Managed XDR service combining Microsoft's XDR platform with SOC services
Managed XDR service combining Microsoft's XDR platform with SOC services
Managed XDR service integrating threat intel, assessments, and GRC
Managed XDR service integrating threat intel, assessments, and GRC
SIEM platform for SAP security monitoring and threat detection
SIEM platform for SAP security monitoring and threat detection
SIEM platform with compliance reporting for regulatory standards
SIEM platform with compliance reporting for regulatory standards
SOAR platform automating threat detection, incident response, and workflows
SOAR platform automating threat detection, incident response, and workflows
Fraud orchestration platform for financial institutions
Fraud orchestration platform for financial institutions
AI-powered fraud detection platform for transaction monitoring and prevention
AI-powered fraud detection platform for transaction monitoring and prevention
SOAR platform for security orchestration, automation, and incident response
SOAR platform for security orchestration, automation, and incident response
SOAR platform with automated threat hunting and investigation capabilities
SOAR platform with automated threat hunting and investigation capabilities
AI-driven SOC platform for automated alert triage, investigation, and response
AI-driven SOC platform for automated alert triage, investigation, and response
Workflow automation platform for building and monitoring security workflows
Workflow automation platform for building and monitoring security workflows
Security hyperautomation platform for SOC workflow automation with AI agents
Security hyperautomation platform for SOC workflow automation with AI agents
Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs