Find out what your peers are saying about Carbon Black, FireEye, Proofpoint and others in Security Incident Response. Updated: January 2021. 456,966 professionals have used our research since 2012. |
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs. 456,966 professionals have used our research since 2012. | |
Questions from the Community | |
Ask a question Earn 20 points | Top Answer: The integration is very useful and very easy. You can have an API connection with any cloud and I'll be able to do both ways of communication with the help of APA. Top Answer: If a customer uses FireEye cloud-based network security solution, Helix is free for them no matter how many logs or EPS they use. But they need a license for third-party logs. Licensing is done per… more » Top Answer: Helix will do well after the pandemic because everybody will be looking for a cloud solution and it is cloud-native. There are certain changes we are bringing onto our endpoint and our ETP network… more » |
Ranking | |
Views 661 Comparisons 509 Reviews 0 Average Words per Review 0 Rating N/A | Views 2,821 Comparisons 1,967 Reviews 2 Average Words per Review 679 Rating 9.0 |
Popular Comparisons | |
![]() Compared 30% of the time. ![]() Compared 16% of the time. ![]() Compared 16% of the time. ![]() Compared 13% of the time. ![]() Compared 13% of the time. | ![]() Compared 24% of the time. ![]() Compared 8% of the time. ![]() Compared 8% of the time. ![]() Compared 8% of the time. ![]() Compared 6% of the time. |
Also Known As | |
FireEye Threat Analytics | |
Learn | |
D3 Security | FireEye |
Overview | |
D3 Security provides a full-lifecycle incident management platform—one that enables multiple detection sources, enriches standards-based workflows with threat intelligence, orchestrates response, and always guides its users to conclusive remediation. The system is unique in its ability to eliminate incident recurrence, through root cause and corrective action discovery, digital forensics case management, and by generating a foundation of actionable intelligence that supports policies, countermeasures and controls. | FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Available with any FireEye solution, FireEye Helix integrates your security tools and augments them with next-generation SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security investments. Designed by security experts, for security experts, it empowers security teams to efficiently conduct primary functions, such as alert management, search, analysis, investigations and reporting. |
Offer | |
Learn more about D3 Security | Learn more about FireEye Helix |
Sample Customers | |
Pfizer, AIG, Microsoft, GAP, Chevron, Cognizant, Oracle, SpaceX, AMD, Visa, NBC, UPMC, St. Lawrence College | Police Bank, Verisk Analytics, Teck Resources |
Top Industries | |
No Data Available | Computer Software Company32% Comms Service Provider22% Media Company7% Educational Organization5% |
D3 Security is ranked 8th in Security Incident Response while FireEye Helix is ranked 3rd in Security Incident Response with 2 reviews. D3 Security is rated 0.0, while FireEye Helix is rated 9.0. On the other hand, the top reviewer of FireEye Helix writes "We can have an API connection with any cloud, the integration is very easy". D3 Security is most compared with Palo Alto Networks Cortex XSOAR, Fortinet FortiSOAR, Splunk Phantom, ServiceNow Security Operations and IBM Resilient, whereas FireEye Helix is most compared with Splunk, Secureworks Red Cloak Threat Detection and Response, IBM QRadar, ServiceNow Security Operations and Rapid7 InsightIDR.
See our list of best Security Incident Response vendors.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.