Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 2,060 security operations tools
AI-powered data management system for forensics, e-discovery, and privacy
AI-powered data management system for forensics, e-discovery, and privacy
Digital forensics suite for processing, analyzing & reporting computer/mobile data
Digital forensics suite for processing, analyzing & reporting computer/mobile data
Forensic imaging tool for disk acquisition, iOS collection, and encryption
Forensic imaging tool for disk acquisition, iOS collection, and encryption
Enterprise log management appliance for collecting, indexing, and searching logs
Enterprise log management appliance for collecting, indexing, and searching logs
Enterprise log management software for collecting and centralizing log data
Enterprise log management software for collecting and centralizing log data
Open-source log collection, processing, and forwarding tool for log management
Open-source log collection, processing, and forwarding tool for log management
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting and investigating attacks
XDR platform correlating multi-source telemetry into attack stories (MalOps)
XDR platform correlating multi-source telemetry into attack stories (MalOps)
Managed detection and response service with 24/7 monitoring and remediation
Managed detection and response service with 24/7 monitoring and remediation
Cloud-based platform for search, observability, and security use cases
Cloud-based platform for search, observability, and security use cases
Search AI platform with vector database for logs, threat hunting, and AI apps
Search AI platform with vector database for logs, threat hunting, and AI apps
Observability platform for logs, metrics, traces, and APM with AI-driven analysis
Observability platform for logs, metrics, traces, and APM with AI-driven analysis
Log parsing and processing platform for observability and incident response
Log parsing and processing platform for observability and incident response
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Data ingestion platform for collecting logs, metrics, traces from multiple sources
Open source interface for querying, analyzing, and visualizing Elasticsearch data
Open source interface for querying, analyzing, and visualizing Elasticsearch data
Distributed search and analytics engine for real-time data storage and retrieval
Distributed search and analytics engine for real-time data storage and retrieval
24/7 managed SOC service combining Cortex XSIAM platform with Unit 42 expertise
24/7 managed SOC service combining Cortex XSIAM platform with Unit 42 expertise
24/7 MDR service built on Cortex XDR with threat hunting and remediation
24/7 MDR service built on Cortex XDR with threat hunting and remediation
AI-driven SOC platform combining SIEM, SOAR, EDR, NDR, and CDR capabilities
AI-driven SOC platform combining SIEM, SOAR, EDR, NDR, and CDR capabilities
Agentic AI platform for building, deploying & governing AI agent workforce
Agentic AI platform for building, deploying & governing AI agent workforce
XDR platform with 24x7 SOC, threat detection, and automated response
XDR platform with 24x7 SOC, threat detection, and automated response
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Malware scanning tool for DFIR using 40+ engines from ReversingLabs
Standalone DFIR data collector for Windows systems with adaptive collection
Standalone DFIR data collector for Windows systems with adaptive collection
Data pipeline mgmt for SOC transformation with real-time data processing
Data pipeline mgmt for SOC transformation with real-time data processing
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox