Security Operations for Compliance

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Compliance

Explore 15 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

ORNA Cyber Incident Response Platform Logo

AI-powered platform for cyber incident response and crisis management

0
LogCraft Automated Security Control Assessment Logo

Automated Security Control Assessment platform for SOC optimization

0
Guardpot Honeypots Logo

Deception platform using honeypots to detect and analyze network threats

0
Turbine, the Agentic AI Automation Platform Logo

Agentic AI automation platform for SOC workflows and security operations

0
Logpoint SIEM Logo

A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

0
Cydarm Logo

A case management platform for Security Operations Centers that enables collaborative incident response, workflow automation, and compliance reporting throughout the cybersecurity incident response lifecycle.

0
Todyl Logo

Todyl is a modular cybersecurity platform that consolidates SASE, SIEM, EDR/NGAV, MXDR, and GRC capabilities into a single-agent solution with centralized management.

0
LogRhythm Axon Logo

A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.

0
Verisys File Integirty Monitoring Logo

A next-generation file integrity monitoring and change detection system

0
syslog-ng Logo

A log management solution that optimizes SIEM performance, provides rapid search and troubleshooting, and meets compliance requirements.

0
Falco Rules Logo

A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.

0
Security Response Automation Logo

An automated security response system for Google Cloud that processes Security Command Center findings and executes predefined remediation actions like disk snapshots, IAM revocation, and notifications.

0
Bastille-Linux Logo

Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

0
Altoro Mutual Online Banking Logo

Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.

0
Penguin OS Forensic (or Flight) Recorder (POFR) Logo

POFR is a Linux forensic data collection system that captures process execution, file access, and network activity for incident response and compliance analysis.

0