Sophos Intercept X Endpoint is a comprehensive cybersecurity solution that combines the power of artificial intelligence (AI) with Sophos' deep expertise in cybersecurity to provide unmatched protection against sophisticated cyber threats, including ransomware, malware, exploits, and zero-day vulnerabilities. Sophos Intercept X Endpoint stands out for its innovative approach to endpoint security, leveraging advanced technologies and expert services to provide comprehensive protection. Its focus on prevention, detection, and response, combined with ease of use and scalability, makes it a preferred choice for organizations looking to strengthen their cybersecurity defenses.
We renew the license for one year at $10,000.
The price is pretty good.
We renew the license for one year at $10,000.
The price is pretty good.
IBM Security QRadar is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Falcon Complete: Endpoint protection delivered as a service. The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.
The price is okay, although you're not going to get away cheap when it comes to security.
At approximately €60 per machine, per year, I think that it's a good price point.
The price is okay, although you're not going to get away cheap when it comes to security.
At approximately €60 per machine, per year, I think that it's a good price point.
Binary Defense provides a Managed Detection and Response service using an Open XDR strategy that detects and isolates threats early in the attack lifecycle. Expert security analysts in the Binary Defense Security Operations Center leverage an attacker’s mindset, monitoring your environments for security events 24x7x365 and acting as an extension of your security teams. When a security event occurs, Binary Defense analysts triage, disposition, and prioritize the event. Analysts conduct full kill chain analysis and supply tactical and strategic mitigation recommendations to your security team with the goal of increasing your organization’s security posture against the latest adversary threats.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Built on the industry’s only cloud-native platform to deliver security operations as a concierge service, the Arctic Wolf® Managed Detection and Response (MDR) solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security® Team (CST) works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.
I find their pricing to be reasonable and competitive.
The pricing is fair.
I find their pricing to be reasonable and competitive.
The pricing is fair.
Hackers are constantly evolving, exploiting new vulnerabilities and dwelling in small business environments—until they meet Huntress. Discover the power of managed detection and response backed by ThreatOps.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
Secureworks Taegis ManagedXDR is a managed detection and response (MDR) tool that combines security analytics software, 24x7 support, threat hunting, and incident response into a standalone product. In a single dashboard, users can see the whole story of their endpoint, network, and cloud activity, making event correlation simple. XDR operationalizes threat intelligence by automatically connecting our threat landscape knowledge with your security telemetry and regularly updated threat intelligence.
The Red Cloak agent is free.
The pricing of Dell Secureworks is very reasonable.
The Red Cloak agent is free.
The pricing of Dell Secureworks is very reasonable.
Reduce time to protection and minimize risk exposure with continuous threat monitoring and response from SentinelOne.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
Red Canary is a leader in managed detection and response (MDR). We serve companies of every size and industry, focusing on finding and stopping threats before they can have a negative impact. As the security ally for nearly 1,000 organizations, we provide MDR across our customers’ cloud workloads, identities, SaaS applications, networks, and endpoints. For more information about Red Canary, visit: https://www.redcanary.com.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
As cyber attackers become more advanced, an increasing amount of organizations are looking to their Managed Service Providers to provide state-of-the-art network security; however, many MSPs lack the personnel or expertise to offer such a service.
The pricing is reasonable.
The pricing is in line with other products.
The pricing is reasonable.
The pricing is in line with other products.
Alert Logic is a cloud-based security and compliance solution that provides threat detection and response, log management, and compliance automation. Its primary use case is to manage lag and protect the network, identify configuration issues related to security and cloud infrastructure, and serve as the primary SIEM tool before escalating tickets.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
Trend Micro XDR applies the most effective AI and expert analytics to the activity data collected from its native sensors in the environment to produce fewer, higher-fidelity alerts. Global threat intelligence from the Trend Micro Smart Protection Network™ combined with expert detection rules continually updated from our threat experts maximize the power of AI and analytical models in unparalleled ways.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
Standing up an effective detection and response program isn’t as simple as buying and implementing the latest security products. It requires a dedicated SOC, staffed with highly skilled and specialized security experts, and 24/7 vigilance using the best technology to ensure stealthy attackers have nowhere to hide. Creating such a program can be expensive, difficult to maintain, and provides limited assurance that you’ve advanced your overall security. Rapid7 MDR is built from the ground up to help security teams of all sizes and security experiences strengthen their security posture, find attackers, and stay ahead of emerging threats. Our MDR service uses a combination of security expertise and technology to detect dynamic threats quickly across your entire ecosystem, providing the hands-on, 24/7/365 monitoring, proactive threat hunting*, effective response support, and tailored security guidance needed to stop nefarious activity and help you accelerate your security maturity.
The product is not overly priced.
The product is not overly priced.
Our security operations platform, Expel Workbench, is fueled by automation and analysis to achieve clear answers and prescriptive outcomes with our managed security products.
Managed detection and response (MDR) services identify and limit the impact of security incidents within a customer’s environment.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
Adlumin provides the premier command center for security operations built specifically for the channel. Stop advanced cyber threats, eliminate vulnerabilities, and take command of sprawling IT Operations with Adlumin's MDR platform plus security services.
Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints, Microsoft Office 365, cloud applications, and identity. Our experts will investigate anything they find, then hand off the contextual alert information along with remediation instructions so you can quickly respond.
IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing preventive security measures is a must-have in today’s cybersecurity landscape. Security information and event management (SIEM) solutions offer an additional layer of security for your clients; however, most SIEM solutions are routinely difficult to manage, expensive to deploy, and require a significant amount of in-house cybersecurity expertise.
The solution is expensive.
The solution is expensive.
Our MDR security solution provides critical insight into attacks using automated machine learning algorithms to validate and prioritize alerts and uncover new threats. Our world-class team of security experts monitors threats in VMware Carbon Black Cloud, and provides rapid response along with threat containment during an incident and policy recommendations to remediate threats.
Intelligent XDR Multiplied by Deep Expertise
Taegis XDR relentlessly scours your telemetry around the clock for signs of threat activity. Our experts respond and remediate quickly, while you realize up to a 413% ROI.
Countercept’s dedicated attack Detection and Response team deals with potential cyber threats to your organization in minutes. Countercept acts as an extension to your cyber security team, sharing our threat hunting expertise, helping your team learn and grow and supporting continuous improvement of your security posture.
CylanceGUARD is a subscription-based 24x7 managed XDR service that provides actionable intelligence for customers to prevent threats quickly while minimizing alert fatigue without requiring additional resources. This service is fully integrated with CylancePROTECT, CylanceOPTICS, CylancePERSONA, CylanceGATEWAY, and 3rd party vendors that provide holistic telemetry across all endpoints enabling our highly skilled BlackBerry analysts to threat-hunt through customer environments to find and contain threats, prevent major breaches, and allow organizations to mature their security posture. BlackBerry has the strategy, expertise, and technology to analyze and guard an organization by preventing and containing threats as well as large-scale breaches.
Its price is reasonable, but there are other products that are cheaper than this.
Its price is reasonable, but there are other products that are cheaper than this.
SpearTip’s ShadowSpear Platform is an unparalleled resource that prevents cyber threats and attacks from impacting your organization. The SaaS architecture Platform optimizes visibility without intensive and overbearing resource requirements. ShadowSpear is lightweight, stable, and able to immediately enhance the cyber posture of any organization. By collecting forensic artifacts, executing response scripts, and isolating hosts, your team has the power to counter any adversary.