Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Compliance
Explore 104 curated cybersecurity tools, with 14,421 visitors searching for solutions
24/7 MDR service with threat hunting, containment, and SOC collaboration
24/7 MDR service with threat hunting, containment, and SOC collaboration
AI-powered MDR combining agentic AI with human expertise for threat detection
AI-powered MDR combining agentic AI with human expertise for threat detection
24/7 MDR service with threat detection, incident response, and monitoring
24/7 MDR service with threat detection, incident response, and monitoring
Managed SOAR service for incident response automation and orchestration
Managed SOAR service for incident response automation and orchestration
24x7 MDR service providing threat detection, response, and hunting capabilities
24x7 MDR service providing threat detection, response, and hunting capabilities
Managed XDR service combining Microsoft's XDR platform with SOC services
Managed XDR service combining Microsoft's XDR platform with SOC services
SIEM platform for SAP security monitoring and threat detection
SIEM platform for SAP security monitoring and threat detection
SIEM platform with compliance reporting for regulatory standards
SIEM platform with compliance reporting for regulatory standards
SOAR platform automating threat detection, incident response, and workflows
SOAR platform automating threat detection, incident response, and workflows
Fraud orchestration platform for financial institutions
Fraud orchestration platform for financial institutions
Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Managed SIEM with 24/7 AI-assisted SOC for threat detection and compliance
Cloud-based log analytics platform for security monitoring and threat detection
Cloud-based log analytics platform for security monitoring and threat detection
Cloud-native SIEM for real-time threat detection and investigation
Cloud-native SIEM for real-time threat detection and investigation
SIEM platform with anomaly detection and centralized log management
SIEM platform with anomaly detection and centralized log management
Data pipeline mgmt platform that reduces SIEM costs & optimizes log data
Data pipeline mgmt platform that reduces SIEM costs & optimizes log data
AI-powered SIEM for cloud security across Microsoft 365, Azure, AWS, and GCP
AI-powered SIEM for cloud security across Microsoft 365, Azure, AWS, and GCP
Digital forensics & incident response services for cyber incident investigation
Digital forensics & incident response services for cyber incident investigation
24x7 MDR service with monitoring, detection, investigation, and response
24x7 MDR service with monitoring, detection, investigation, and response
Managed SIEM service with 24x7 expert support and threat hunting capabilities
Managed SIEM service with 24x7 expert support and threat hunting capabilities
Cloud-native MXDR platform with CSPM, CDR, and CIEM for multi-cloud security
Cloud-native MXDR platform with CSPM, CDR, and CIEM for multi-cloud security
Cloud-native SIEM for forensic investigations, compliance, and threat detection
Cloud-native SIEM for forensic investigations, compliance, and threat detection
Managed SIEM service with log collection, threat detection, and compliance
Managed SIEM service with log collection, threat detection, and compliance
Security operations platform for centralized tool mgmt and alert correlation
Security operations platform for centralized tool mgmt and alert correlation
Managed detection & response with network detection & response capabilities
Managed detection & response with network detection & response capabilities
Get the latest cybersecurity updates in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs