CrowdStrike Falcon is a comprehensive endpoint protection solution that offers threat detection, incident response, and threat intelligence capabilities. Users praise its effectiveness in defending against malware and ransomware attacks, stopping advanced threats in real-time, and providing actionable insights through threat intelligence. The platform's valuable features include advanced threat detection, real-time visibility into endpoint activities, easy-to-use interface, responsive customer support, detailed incident response options, customizable alerting settings, machine learning algorithms for proactive threat hunting, and seamless integration with other security tools. Users also note that CrowdStrike Falcon has greatly improved workflow efficiency, collaboration, and productivity within organizations.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
I do not have experience with the cost or licensing of the product.
The pricing will depend upon your volume of usage.
Wazuh is an enterprise-ready platform used for security monitoring. It is a free and open-source platform that is used for threat detection, incident response and compliance, and integrity monitoring. Wazuh is capable of protecting workloads across virtualized, on-premises, containerized, and cloud-based environments.
Wazuh is open-source, so I think it's an option for a small organization that cannot go for enterprise-grade solutions like Splunk.
There is not a license required for Wazuh.
Wazuh is open-source, so I think it's an option for a small organization that cannot go for enterprise-grade solutions like Splunk.
There is not a license required for Wazuh.
Cortex XDR by Palo Alto Networks is the first threat detection and response software to combine both visibility across all types of data as well as autonomous machine learning analytics. Threat detection very often requires analysts to divide their attention among many different data streams. This platform unifies a vast variety of data flows, which allows analysts to assess threats from a single location. Users can now maintain a level of visibility that other threat detection programs simply cannot offer. This level of transparency lends itself to both quick identification of problems that arise and the equally quick development of a potential solution.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
I feel it is fairly priced.
The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic.
Microsoft Defender XDR is a comprehensive security solution that helps organizations manage devices and vendor security compliance.
Its primary use case includes email filtering, vulnerability management, and detecting threats launched via emails. The solution offers advanced threat-hunting capabilities, integration with other Microsoft products, centralized management, automation features, and comprehensive threat protection.
It improves visibility, automates routine tasks, and provides threat intelligence and compliance management. Microsoft Defender XDR is praised for its advanced capabilities, ease of use, and integration with other Microsoft products.
It has proven to be a comprehensive and effective security solution for organizations.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license.
Pricing is fair.
Recorded Future is a powerful and effective cyber threat intelligence (CTI) platform that aims to empower administrators to protect their organizations from threats, both known and unknown. The machine learning engine that Recorded Future utilizes can process the same amount of data that 9,000 analysts working five days a week, eight hours a day for an entire year can process. It simplifies threat detection and remediation so that organizations can focus on other tasks.
There appear to be up to five different levels, with the most expensive version costing around $95,000 to $105,000 a year for subscription services.
The price of the solution is worth it. The overall performance of the solution outweighs the cost.
There appear to be up to five different levels, with the most expensive version costing around $95,000 to $105,000 a year for subscription services.
The price of the solution is worth it. The overall performance of the solution outweighs the cost.
Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK framework.
Cymulate's services are expensive.
The product is affordable.
Cymulate's services are expensive.
The product is affordable.
ThreatConnect Threat Intelligence Platform (TIP) is a comprehensive solution designed to help organizations effectively manage and analyze threat intelligence data. With its advanced capabilities, TIP enables users to collect, enrich, and analyze threat data from various sources, providing valuable insights and actionable intelligence.
One of the key features of TIP is its ability to aggregate threat data from multiple sources, including open-source feeds, commercial feeds, and internal sources. This allows organizations to have a holistic view of the threat landscape and identify potential risks and vulnerabilities. TIP also supports the integration of third-party tools and feeds, further enhancing its capabilities.
TIP provides powerful enrichment capabilities, allowing users to enrich threat data with additional context and information. This includes the ability to automatically correlate threat data with indicators of compromise (IOCs), threat actors, and other relevant information. The enrichment process helps organizations gain a deeper understanding of threats and enables them to make more informed decisions.
With its advanced analytics capabilities, TIP enables users to analyze threat data and identify patterns, trends, and anomalies. This includes the ability to perform advanced queries, create custom dashboards and reports, and visualize data in a meaningful way. These analytics capabilities help organizations identify emerging threats, prioritize response efforts, and proactively mitigate risks.
ThreatConnect Threat Intelligence Platform also provides collaboration features, allowing users to share threat intelligence with internal teams, partners, and the broader security community. This includes the ability to create and manage secure communities, share indicators and reports, and collaborate on investigations. By fostering collaboration, TIP helps organizations leverage collective intelligence and improve their overall security posture.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
LogRhythm UEBA enables your security team to quickly and effectively detect, respond to, and neutralize both known and unknown threats. Providing evidence-based starting points for investigation, it employs a combination of scenario analytics techniques (e.g., statistical analysis, rate analysis, trend analysis, advanced correlation), and both supervised and unsupervised machine learning (ML).
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Anomali ThreatStream is a Threat Intelligence Management Platform that automates the collection and processing of raw data and transforms it into actionable threat intelligence for security teams.
Cost is clearly a consideration, but the important thing is what we do with the data and how we protect it.
One of the fastest ways to cut costs is reducing staff, and this product can reduce staff by 70 percent.
Cost is clearly a consideration, but the important thing is what we do with the data and how we protect it.
One of the fastest ways to cut costs is reducing staff, and this product can reduce staff by 70 percent.
AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.
It is expensive.
The solution is reasonably priced.
It is expensive.
The solution is reasonably priced.
Group-IB Threat Intelligence is an extremely potent threat intelligence platform that is trusted by everyone from law enforcement organizations like Interpol to the threat analysts that rely on it. It helps users gain a deep understanding of the threat landscape that they face. Organizations that choose to use Threat Intelligence gain insights into how threat actors think so that they can counter them as effectively as possible.
Threat Intelligence is costly, but it gives value for money.
Group-IB Threat Intelligence's pricing is reasonable.
Threat Intelligence is costly, but it gives value for money.
Group-IB Threat Intelligence's pricing is reasonable.
Flashpoint Intelligence Platform grants access to our expansive archive of Finished Intelligence reports, Deep & Dark Web data, and Risk Intelligence Observables in a single, finished intelligence experience.
Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, and managed monitoring services. Founded by elite intelligence professionals born and bred in offense-first hunting, Cybereason gives enterprises the upper hand over cyber adversaries.
The solution is cheaper than Microsoft Defender. It has a subscription and no standard license.
The solution is cheaper than Microsoft Defender. It has a subscription and no standard license.
The pricing is fair.
The pricing is fair.
IntSights is the only all-in-one external threat intelligence and protection platform, purpose-built to neutralize threats outside the wire. With the IntSights solution suite, cybersecurity teams worldwide are equipped with the tools they need to detect, assess, and mitigate threats externally from the source, well-before before they reach the perimeter.
Threats are as vast as the internet. Defending your attack surface is a challenge of continuous change and global scale. RiskIQ Illuminate Internet Intelligence shows cyber threats relevant to your critical assets through connected digital relationships. It is the only security intelligence solution with tailored attack surface intelligence to uncover exposures, risks, and threats against your unique digital footprint, pinpointing what’s relevant to you—all in one place.
Xpanse provides a complete, accurate and continuously updated inventory of all global internet-facing assets. This allows you to discover, evaluate, and mitigate cyber attack surface risks. You can also evaluate supplier risk and assess the security of acquired companies.
Manual asset inventory maintenance is slow and prone to error. An outside-in view of your attack surface catches assets and exposures you never knew existed to help with attack surface reduction.
Cortex Xpanse is cheaper than other solutions.
Cortex Xpanse is cheaper than other solutions.
Legacy security testing approaches may help security teams find and remediate risks on-premises and directly managed infrastructure. But, they are no match for the rapidly expanding attack surface caused by modern, highly distributed IT ecosystems.
In this era of hybrid work, shadow IT creates an increasingly serious security risk. Microsoft Defender External Attack Surface Management helps cloud security teams see unknown and unmanaged resources outside the firewall.
IBM Security Randori Recon is an essential part of the IBM Security portfolio, offering a cloud-native attack surface management SaaS. It empowers organizations to proactively monitor and manage their external attack surfaces, uncovering potential risks, misconfigurations, and vulnerabilities before malicious actors can exploit them. In an era of expanding enterprise attack surfaces due to digital transformation, hybrid cloud adoption, and remote workforces, Randori Recon provides continuous asset discovery and risk prioritization from the perspective of potential attackers. By offering a unique viewpoint into your security landscape and seamless integrations with existing security tools, it helps fortify your cybersecurity defenses, ensuring your organization is well-prepared to tackle emerging threats.
Get comprehensive visibility into all of your internet-connected assets, services and applications to better understand your organization’s full digital footprint and better assess and manage risk.
Unmatched real-time visibility into the devices, users and applications in your network.
EclecticIQ Platform is a Threat Intelligence Platform (TIP) that empowers threat analysts to perform faster, better, and deeper investigations while disseminating intelligence at machine-speed.
Proofpoint ET Intelligence is the industry’s most timely and accurate source of threat intelligence. Combining actionable up-to-the-minute IP and Domain reputation feeds with a database of globally observed threats and malware analysis, ET Intelligence gives the security professional the intelligence to proactively stop malicious attacks and provide the context needed to investigate them.
SnapAttack was built with a broader perspective: one that encompasses the end-to-end process of threat detection. SnapAttack removes barriers to creating high confidence behavioral analytics for your existing security tools, transforming the once lengthy and manual research process to the simplified task of searching and deploying a quality analytic.
Cyware Threat Intelligence eXchange
A smart, client-server threat intelligence platform (TIP) for ingestion, enrichment, analysis, and bi-directional sharing of threat data within your trusted network.
Global threat intelligence
“Secureworks doesn’t just alert us to incidents; they always
prioritize them and suggest a solution based on their global
scope and experience,” says Cone. “We simply can’t hire
someone with the threat intelligence Secureworks managed
services gives us.”