Loading...
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Browse 1,741 security operations tools
Unified MDR platform with SIEM, threat hunting, and SOAR capabilities
Unified MDR platform with SIEM, threat hunting, and SOAR capabilities
Unified Security-as-Code platform integrating MDR, SOC, and pentesting services
Unified Security-as-Code platform integrating MDR, SOC, and pentesting services
Emergency MDR service for orgs experiencing active cyber incidents or attacks
Emergency MDR service for orgs experiencing active cyber incidents or attacks
Managed detection and response service with 24/7 SOC monitoring
Managed detection and response service with 24/7 SOC monitoring
MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring
MDR service for CrowdStrike, Microsoft, and Trellix endpoints with 24/7 monitoring
Managed XDR service built on CrowdStrike Falcon LogScale platform
Managed XDR service built on CrowdStrike Falcon LogScale platform
Cloud-native MXDR platform with CSPM, CDR, and CIEM for multi-cloud security
Cloud-native MXDR platform with CSPM, CDR, and CIEM for multi-cloud security
Cloud-native SIEM for forensic investigations, compliance, and threat detection
Cloud-native SIEM for forensic investigations, compliance, and threat detection
Deception-based detection engine integrated into LMNTRIX XDR platform
Deception-based detection engine integrated into LMNTRIX XDR platform
Full-fidelity packet capture & forensics module for network threat hunting
Full-fidelity packet capture & forensics module for network threat hunting
Managed threat hunting service combining ML analytics and human expertise
Managed threat hunting service combining ML analytics and human expertise
Managed SIEM service with log collection, threat detection, and compliance
Managed SIEM service with log collection, threat detection, and compliance
Security operations platform for centralized tool mgmt and alert correlation
Security operations platform for centralized tool mgmt and alert correlation
24/7 MDR service with real-time SOC access via Microsoft Teams
24/7 MDR service with real-time SOC access via Microsoft Teams
XDR platform for unified threat detection, investigation, and response
XDR platform for unified threat detection, investigation, and response
Client-facing dashboard for cybersecurity posture visibility and monitoring
Client-facing dashboard for cybersecurity posture visibility and monitoring
Managed detection & response with network detection & response capabilities
Managed detection & response with network detection & response capabilities
Managed EDR/XDR service with 24/7 SOC monitoring and threat response
Managed EDR/XDR service with 24/7 SOC monitoring and threat response
Managed NDR service monitoring network traffic for threats via co-managed model
Managed NDR service monitoring network traffic for threats via co-managed model
Automated response-as-a-service for MDR with SOAR capabilities and threat containment
Automated response-as-a-service for MDR with SOAR capabilities and threat containment
24/7 MDR service with SOC-as-a-Service, threat detection, and response
24/7 MDR service with SOC-as-a-Service, threat detection, and response
Managed EDR service with 24/7 monitoring, threat hunting, and automated response
Managed EDR service with 24/7 monitoring, threat hunting, and automated response
Unified threat detection platform for network, endpoint, cloud, and user telemetry
Unified threat detection platform for network, endpoint, cloud, and user telemetry
GenAI assistant for SOC teams to detect, analyze, and respond to incidents
GenAI assistant for SOC teams to detect, analyze, and respond to incidents
Common questions about Security Operations tools including selection guides, pricing, and comparisons.
Security operations tools for SIEM, SOAR, threat hunting, incident response, and security operations center (SOC) management.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox