Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting. Automate and streamline your security operations with SOAR's workflow automation, threat intelligence, and analytics capabilities. Integrate with your existing security tools and systems to enhance your security posture and improve incident response efficiency.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A case management platform for Security Operations Centers that enables collaborative incident response, workflow automation, and compliance reporting throughout the cybersecurity incident response lifecycle.
AWS Community repository of custom Config rules with instructions for leveraging and developing AWS Config Rules.
Reveelium UEBA is a French-developed User and Entity Behavior Analytics solution that uses artificial intelligence to detect abnormal behaviors and security threats by analyzing user and entity activities within an organization's network.
An AI-powered SOC automation platform that performs autonomous alert triage, investigation, and incident response while augmenting human analyst capabilities.
Incident response and digital forensics tool for transforming data sources and logs into graphs.
CrowdStrike Falcon Orchestrator is a Windows-based application for workflow automation and security response.
Open-source security automation platform for automating security alerts and building AI-assisted workflows.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.