Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 2,060 security operations tools
AI-powered XDR platform for automated threat detection and response
AI-powered XDR platform for automated threat detection and response
AI-powered unified security platform with centralized mgmt & quantum-secure VPN
AI-powered unified security platform with centralized mgmt & quantum-secure VPN
Unified cybersecurity platform with modular security controls and AI engine
Unified cybersecurity platform with modular security controls and AI engine
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
XDR platform with NDR, EDR, deception, AD security, and CNAPP capabilities
App-centric security mgmt platform for hybrid network environments
App-centric security mgmt platform for hybrid network environments
Subscription-based continuous red team testing across digital, physical & social
Subscription-based continuous red team testing across digital, physical & social
Managed detection and response platform combining XDR and incident response
Managed detection and response platform combining XDR and incident response
AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.
AI-powered DevOps platform for CI/CD, testing, security, and cost mgmt.
AI-powered SOC platform for autonomous alert triage, investigation & response
AI-powered SOC platform for autonomous alert triage, investigation & response
CI/CD pipeline security monitoring and supply chain attack prevention platform
CI/CD pipeline security monitoring and supply chain attack prevention platform
Cloud-based platform for unified mgmt of Sophos security solutions
Cloud-based platform for unified mgmt of Sophos security solutions
Red teaming service that emulates real-world adversaries to test defenses
Red teaming service that emulates real-world adversaries to test defenses
24x7 MDR service with global SOC teams for threat detection and response
24x7 MDR service with global SOC teams for threat detection and response
XDR platform for threat detection and response across multiple security layers
XDR platform for threat detection and response across multiple security layers
Searchable repository of Sigma detection rules for threat hunting and SIEM
Searchable repository of Sigma detection rules for threat hunting and SIEM
Cloud-native SIEM for log management, threat detection, investigation, and response
Cloud-native SIEM for log management, threat detection, investigation, and response
24/7 managed detection and response service for Microsoft 365 environments
24/7 managed detection and response service for Microsoft 365 environments
Centralized IT alert management platform for monitoring tools and applications
Centralized IT alert management platform for monitoring tools and applications
Incident management platform with automation, workflows, and playbooks
Incident management platform with automation, workflows, and playbooks
AI-driven malware sandbox for detecting evasive threats and zero-day attacks
AI-driven malware sandbox for detecting evasive threats and zero-day attacks
File integrity monitoring and security configuration management platform
File integrity monitoring and security configuration management platform
Threat emulation tool for adversary simulations and red team operations
Threat emulation tool for adversary simulations and red team operations
AI-native SIEM platform for consolidating security tools and data
AI-native SIEM platform for consolidating security tools and data
XDR platform with Agentic SIEM and SOAR for unified threat detection & response
XDR platform with Agentic SIEM and SOAR for unified threat detection & response
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox