Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 2,060 security operations tools
Managed SOC service offering multiple deployment models for threat monitoring
Managed SOC service offering multiple deployment models for threat monitoring
Autonomous SOC platform with 24x7 monitoring, AI-driven triage, and threat hunting
Autonomous SOC platform with 24x7 monitoring, AI-driven triage, and threat hunting
XDR platform for threat detection & response across endpoints, identity, email
XDR platform for threat detection & response across endpoints, identity, email
Incident response & management service for detecting, containing & recovering
Incident response & management service for detecting, containing & recovering
NIST-aligned DFIR platform for incident containment, investigation, and recovery
NIST-aligned DFIR platform for incident containment, investigation, and recovery
Open XDR platform with SIEM, NDR, cloud detection, and threat intelligence
Open XDR platform with SIEM, NDR, cloud detection, and threat intelligence
Managed SOC service with SIEM, MDR, and MSS capabilities for threat detection
Managed SOC service with SIEM, MDR, and MSS capabilities for threat detection
AI-driven automation platform for accelerating cyber defense operations
AI-driven automation platform for accelerating cyber defense operations
Enterprise XDR platform for unified threat detection and incident response
Enterprise XDR platform for unified threat detection and incident response
Data collection tool for eDiscovery, investigations, and forensics
Data collection tool for eDiscovery, investigations, and forensics
Data analysis platform for transforming data into actionable intelligence
Data analysis platform for transforming data into actionable intelligence
eDiscovery workflow automation platform for legal hold to review processes
eDiscovery workflow automation platform for legal hold to review processes
Data processing & analysis platform for eDiscovery, investigations & forensics
Data processing & analysis platform for eDiscovery, investigations & forensics
Digital forensics & investigation platform for analyzing evidence & cases
Digital forensics & investigation platform for analyzing evidence & cases
Real-time threat detection and response platform for internal and external threats
Real-time threat detection and response platform for internal and external threats
Simulates cyber attack scenarios to test incident response readiness.
Simulates cyber attack scenarios to test incident response readiness.
Human-led threat hunting service for uncovering hidden adversaries
Human-led threat hunting service for uncovering hidden adversaries
Hosted SIEM-as-a-Service with 24/7 SOC monitoring and MXDR integration
Hosted SIEM-as-a-Service with 24/7 SOC monitoring and MXDR integration
Centralized XDR platform with MXDR services and threat hunting capabilities
Centralized XDR platform with MXDR services and threat hunting capabilities
XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection
XDR platform combining NDR, EDR, SIEM, SOAR & UEBA for threat detection
SIEM for log collection, correlation, archiving, and alerting within XDR platform
SIEM for log collection, correlation, archiving, and alerting within XDR platform
DNS traffic monitoring and threat blocking module within TEHTRIS XDR Platform
DNS traffic monitoring and threat blocking module within TEHTRIS XDR Platform
Integrated cyber defense platform delivered as SaaS on Google Cloud
Integrated cyber defense platform delivered as SaaS on Google Cloud
Unified SOAR platform for centralized security management and automation
Unified SOAR platform for centralized security management and automation
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox