Security Operations

Explore 148 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Exabeam Security Operations Platform Logo

Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.

0
Anomali Logo

Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.

0
ISO2HANDLE Logo

ISO2HANDLE is a powerful software that provides a total solution for Q&R professionals, trusted by over 50,000 users and 750+ organizations worldwide.

0
CrowdStrike Secure AI Logo

AI security solution protecting models, agents, data, and prompts

0
Crowdstrike Charlotte AI Logo

GenAI assistant that provides faster intelligence for security operations

0
SentinelOne Purple AI Logo

AI-powered security operations platform for automated threat analysis and response

0
FortiAI Logo

FortiAI is an AI assistant that uses generative AI combined with Fortinet's security expertise to guide analysts through threat investigation, response automation, and complex SecOps workflows.

-1
InfinityAI Logo

Infinity Platform / Infinity AI is an AI-powered threat intelligence and generative AI service that combines AI-powered threat intelligence with generative AI capabilities for comprehensive threat prevention, automated threat response, and efficient security administration.

0
MutableSecurity Logo

A CLI program that simplifies cybersecurity solution management through automated deployment, configuration, monitoring, and lifecycle operations across multiple hosts.

0
Acapulco (Attack Community grAPh COnstruction) Logo

A Splunk application that processes honeypot data from hpfeeds channels to generate clustered meta-events and visualizations for security analysis.

0
Cloud Sniper Logo

Cloud Sniper is a centralized cloud security operations platform that provides incident response, threat correlation, and automated security actions for cloud infrastructure protection.

0
Security Week Logo

A general cybersecurity news site providing discussions and news on various cybersecurity topics.

0
Ripple Logo

A panic button application that triggers coordinated emergency responses across multiple connected security applications and systems.

0
Tenzir Logo

Tenzir is a data pipeline solution that provides security data management capabilities through pipelines, nodes, and a centralized platform for analytics and detection operations.

0
Synthetic Adversarial Log Objects (SALO) Logo

SALO is a framework that generates synthetic log events for security testing and research without requiring actual infrastructure or triggering real events.

0
MozDef Logo

Automate security incident handling and facilitate real-time activities of incident handlers.

0
InsightConnect Plugins Logo

An open source repository of plugins for Rapid7 InsightConnect that enables security orchestration and automation through integrations with various security tools and services.

0
Detection Lab Logo

DetectionLab is a pre-configured Windows domain environment with security tooling and logging designed for cybersecurity training and detection capability development.

0
Shuffle Workflows Logo

A collection of automation workflows for the Shuffle security orchestration platform that covers common cybersecurity use-cases and can be customized for organizational needs.

0
RedEye Logo

RedEye is a visual analytic tool that provides enhanced situational awareness and operational insights for both Red and Blue Team cybersecurity operations.

0
Sandia Cyber Omni Tracker (SCOT) Logo

SCOT is a cybersecurity incident tracking and management platform that enables security operations centers to document, analyze, and coordinate responses to security events through collaborative workflows.

0
Palo Alto Networks Cortex XSOAR Logo

SOAR platform for orchestrating security products and automating SOC tasks

0
Cert Spotter Logo

A Certificate Transparency log monitor that alerts users when SSL/TLS certificates are issued for their domains, helping detect unauthorized certificate issuance and potential security threats.

0
Shellclear Logo

A command-line tool that secures shell command history by clearing sensitive commands, displaying command summaries, and providing stash functionality for presentations across multiple shell environments.

0