Security Operations for Threat Detection

Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management. Task: Threat Detection

Explore 68 curated cybersecurity tools, with 14,626+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Microsoft Defender XDR Logo

XDR solution for unified detection and response across Microsoft 365

0
ORNA Cyber Incident Response Platform Logo

AI-powered platform for cyber incident response and crisis management

0
Zeronsec Anrita Logo

Real-time threat detection and monitoring platform with SIEM capabilities

0
Guardpot Honeypots Logo

Deception platform using honeypots to detect and analyze network threats

0
With Secure Elements Platform Logo

WithSecure Elements Cloud is a modular cybersecurity platform that combines AI-powered software and expert services to provide comprehensive protection across endpoints, identities, and cloud environments.

0
Logpoint SIEM Logo

A security information and event management solution that collects, normalizes, and analyzes log data from across an organization's infrastructure to enhance threat detection and compliance reporting.

0
Netenrich Resolution Intelligence Logo

A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.

0
BitLyft AIR Platform Logo

BitLyft AIR Platform is a managed detection and response solution that combines AI-driven security monitoring with human expertise to provide comprehensive threat detection and incident response services.

0
Trellix Insights Logo

A GenAI-powered security platform that integrates endpoint, email, network, data, cloud, and security operations capabilities for comprehensive threat detection and response.

0
Tracebit Logo

A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.

1
Anvilogic Logo

Anvilogic is a SIEM platform that streamlines detection engineering, offers cost-effective data management, and enhances threat detection capabilities.

0
LogRythm SIEM Logo

LogRhythm SIEM is a comprehensive security information and event management platform that collects, analyzes, and responds to security events across an organization's IT infrastructure.

0
Exabeam Security Operations Platform Logo

Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

0
Akamai Hunt Logo

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

0
SentinelOne Purple AI Logo

AI-powered security operations platform for automated threat analysis and response

0
scrying Logo

A tool for collecting and analyzing screenshots from remote desktop protocols, web applications, and VNC connections.

0
yara_rules Logo

A collection of YARA rules for Windows, Linux, and Other threats.

0
Manuka by SpaceRaccoon Logo

An open-source OSINT honeypot that monitors threat actor reconnaissance attempts and generates early-warning intelligence for blue teams during the pre-attack phase.

0
ConventionEngine Logo

ConventionEngine is a Yara rule collection that analyzes PE files by examining PDB paths for suspicious keywords, terms, and anomalies that may indicate malicious software.

0
AWS Incident Response Investigation of API activity using Athena and notification of actions using EventBridge Logo

An AWS incident response framework that uses Athena to analyze CloudTrail events and EventBridge for notifications to investigate API activity and detect security misconfigurations.

0
Falco Rules Logo

A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.

0
YaraHunter Logo

YaraHunter scans container images, running Docker containers, and filesystems using YARA rules to detect malware indicators and signs of compromise.

0
yara-rules Logo

A repository of YARA rules for identifying and classifying malware through pattern-based detection.

0
GridPot Logo

GridPot is a honeypot framework that combines GridLAB-D, Conpot, and libiec61850 to simulate industrial control systems and detect attacks on power grid infrastructure.

0