Incident ResponseCrowdStrike Falcon Endpoint Protection1https://dudodiprj2sv7.cloudfront.net/vendor-logos/QJ/nR/NGAP2XUTKHMV-180x180.JPEGCounterTack Sentinel2https://dudodiprj2sv7.cloudfront.net/product-logos/8k/qx/HM9DNBE1U325.pngCybereason Deep Detection & Response Platform3https://dudodiprj2sv7.cloudfront.net/vendor-logos/cV/hK/TPQPBH4GE957-180x180.PNGCb Response4https://dudodiprj2sv7.cloudfront.net/product-logos/s4/U6/76DTIOBSOFIM.PNGDFLabs IncMan5https://dudodiprj2sv7.cloudfront.net/vendor-logos/xN/FG/ELPWFLFG5N8O-180x180.JPEGIBM Resilient Incident Response Platform6https://dudodiprj2sv7.cloudfront.net/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGEnCase Endpoint Security7https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jo/Dc/J5BO5E4D2RK8-180x180.JPEGDERDACK Enterprise Alert8https://dudodiprj2sv7.cloudfront.net/product-logos/XY/c1/NRRULDF1IZUE.PNGCyber Triage9https://dudodiprj2sv7.cloudfront.net/vendor-logos/Kt/S0/7LFJVSRXESE9-180x180.JPEGEverbridge IT Alerting10https://dudodiprj2sv7.cloudfront.net/vendor-logos/J6/wK/QA6OI29WN9OJ-180x180.PNGD3 Security11https://dudodiprj2sv7.cloudfront.net/vendor-logos/YS/Xo/N7M1TAC11PQF-180x180.JPEGResolve Systems12https://dudodiprj2sv7.cloudfront.net/vendor-logos/FE/UN/L05DO48JOV11-180x180.PNGDemisto13https://dudodiprj2sv7.cloudfront.net/vendor-logos/kZ/HQ/MKM3SEJM6QSH-180x180.JPEGHexadite AIRS14https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGCylanceOptics15https://dudodiprj2sv7.cloudfront.net/vendor-logos/YM/ti/6V4RD3ZDVDEE-180x180.JPEGInsightIDR16https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGFireEye Security Orchestrator17https://dudodiprj2sv7.cloudfront.net/vendor-logos/NG/Ce/Z0M72RNSMBG5-180x180.JPEGAyehu eyeShare18https://dudodiprj2sv7.cloudfront.net/vendor-logos/is/Qi/392705B8DSTW-180x180.PNGCyberSponse19https://dudodiprj2sv7.cloudfront.net/vendor-logos/sp/O1/OK4IHXODHB2J-180x180.PNGSiemplify20https://dudodiprj2sv7.cloudfront.net/product-logos/K2/dY/7G7ZPENFB8XI.JPEGCynet 36021https://dudodiprj2sv7.cloudfront.net/vendor-logos/g5/d3/JCM06L4PZHAB-180x180.JPEGExabeam Security Intelligence Platform22https://dudodiprj2sv7.cloudfront.net/vendor-logos/2f/Iu/3CV52KIWX2FF-180x180.JPEGProofpoint Threat Response Auto-Pull23https://dudodiprj2sv7.cloudfront.net/product-logos/F0/xp/RZBWSU7FF2IS.JPEGProofpoint ThreatResponse24https://dudodiprj2sv7.cloudfront.net/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGCenturyLink Analytics and Threat Management25https://dudodiprj2sv7.cloudfront.net/vendor-logos/OK/UO/KTW2ZSTJRMM2-180x180.JPEG

Incident Response Platforms

Incident Response Platforms Overview

What are Incident Response Platforms?

Incident response platforms automate post-incident response processes including collecting security alert data, analyzing it and triggering automated remediation processes.

The only way to respond effectively to security incidents is by having good information. That information can be provided by incident response platforms that can automate the response and help to address incidents at scale.

Automation can perform such tasks as collecting real time incident information, sending notifications, and assigning tasks and escalations to the right people. Incident response software can also automate the creation of incident reports.

How does this platform work?

By providing automation and orchestration, incident response platforms help response teams to minimize the time and resources required to manage incidents.

Essentially, they enable remediation teams to work on a much broader scale instead of working on individual incidents one at a time. These tools can help identify and remediate network events that are often missed due to a lack of resources.

Incident response platforms gather insight by analyzing system logs, identity information, and endpoint alerts to assess all security-related anomalies across the network environment. Some tools provide visualizations to help in understanding the scope of specific threats and incidents such as phishing, malware infections, internal abuse of privileges, data leakage and other incidents.

Incident Response Products

Listings (1-25 of 25)

CrowdStrike Falcon Endpoint Protection

4 Ratings

CrowdStrike's Falcon line of software includes Falcon Endpoint Protection, a complete antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating.

CounterTack Sentinel

We don't have enough ratings and reviews to provide an overall score.

Sentinel from CounterTack in Waltham, Massachusetts offers an endpoint security and incident response system.

Cybereason Deep Detection & Response Platform

We don't have enough ratings and reviews to provide an overall score.

Cybereason delivers a proprietary endpoint protection platform that automatically uncovers malicious operations and provides visual tools to observe potential threats and prevent their progress in a what they boast is a single-click remediation process.

Cb Response

We don't have enough ratings and reviews to provide an overall score.

Carbon Black offers Cb Response, an IR and threat hunting solution. Cb Response gives users visibility through continuous recording of all activity on their endpoints. Capturing all threat activity, users can visualize the attack kill chain to hunt threats in real time allowing them to respond and...

DFLabs IncMan

We don't have enough ratings and reviews to provide an overall score.

Italian company DFLabs offers IncMan, their flagship security automation and orchestration platform emphasizing rapid incident detection, a higher proportion of incidents receiving response, and faster incident response time.

IBM Resilient Incident Response Platform

We don't have enough ratings and reviews to provide an overall score.

IBM offers the Resilient Incident Response Platform, a security orchestration platform emphasizing automation of response to security alerts, incident visualization via software and training simulation.

EnCase Endpoint Security

We don't have enough ratings and reviews to provide an overall score.

EnCase Endpoint Security is an endpoint threat detection and incident response cyber security application developed by Guardian Software and now owned and supported by OpenText since the acquisition in summer 2017.

DERDACK Enterprise Alert

We don't have enough ratings and reviews to provide an overall score.

German company Derdack offers Enterprise Alert, an incident response system alerting operations teams working in IT, transportations, facilities, and other areas.

Cyber Triage

We don't have enough ratings and reviews to provide an overall score.

Basis Technology in Cambridge, MA offers Cyber Triage, an incident response software emphasizing the rapid and accurate collection of endpoint data, touted as better and more comprehensive than antivirus and ideal for non-forensics experts.

Everbridge IT Alerting

We don't have enough ratings and reviews to provide an overall score.

Everbridge's IT Alerting system is an incident response system allowing deployment of a predefined business process to alert personnel and create the necessary bridging and orchestration to address the threat.

D3 Security

We don't have enough ratings and reviews to provide an overall score.

Vancouver company D3 Security offers their incident response suite, featuring an incident knowledgebase and response templates, built-in and configurable workflow with task assignment and assignable threat alerting threshold, among other features.

Resolve Systems

We don't have enough ratings and reviews to provide an overall score.

The flagship product from Resolve Systems in Irvine is their incident response platform, which features automated security and threat diagnosis, an incident tracking dashboard, and automated remediation workflow.

Demisto

We don't have enough ratings and reviews to provide an overall score.

Demisto in Cupertino offers a comprehensive incident response and cyber defense orchestration platform, featuring a virtual "playbook," a workflow designer, and a reporting dashboard for incident review.

Hexadite AIRS

We don't have enough ratings and reviews to provide an overall score.

Microsoft now offers an incident response platform via its acquisition of Israeli cyber security company Hexadite, which developed their own platform, the Hexadite Automated Incident Response Solution, or Hexadite AIRS, which uses AI designed to model optimal cyberthreat response behavior and...

CylanceOptics

We don't have enough ratings and reviews to provide an overall score.

Cylance in Irvine offers a range of cyber security solutions, including CylanceOptics, an incident response solution emphasizing fast endpoint detection and automated smart threat response, root cause and context analysis, and other features.

InsightIDR

We don't have enough ratings and reviews to provide an overall score.

In addition to their incident response service, Rapid7 offers InsightIDR, a relatively broad offering covering SEIM and incident response automation.

FireEye Security Orchestrator

We don't have enough ratings and reviews to provide an overall score.

FireEye Security Orchestrator is an incident response platform, emphasizing its centrality creating console that pulls data from disparate systems and provides real-time threat-response guidance.

Ayehu eyeShare

We don't have enough ratings and reviews to provide an overall score.

Ayehu offers eyeShare, their IT automation platform powered by machine learning to support rapid incident response and process automation.

CyberSponse

We don't have enough ratings and reviews to provide an overall score.

CyberSponse in Arlington offers their flagship cybersecurity orchestration and incident response platform that supplies automation and intelligence to threat containment and elimination.

Siemplify

We don't have enough ratings and reviews to provide an overall score.

Siemplify provides a holistic security operations platform that empowers security analysts to work smarter and respond faster. Siemplify uniquely combines security orchestration and automation with patented contextual investigation and case management to deliver intuitive, consistent and measurable...

Cynet 360

We don't have enough ratings and reviews to provide an overall score.

New York based Cynet offers their intrusion detection and threat response platform Cynet 360, which monitors endpoints and networks, correlates and analyzes suspicious behavior, and provides automated remedial protection and manual remediation guidance to contain and eliminate cyber attackers.

Exabeam Security Intelligence Platform

We don't have enough ratings and reviews to provide an overall score.

Exabeam headquartered in San Mateo, offers their security intelligence and SIEM platform, the Exabeam Security Intelligence Platform, featuring unlimited security data collection (Exabeam Data Lake), threat detection via Exabeam Advanced Analytics, security response and orchestration via Exabeam...

Proofpoint Threat Response Auto-Pull

We don't have enough ratings and reviews to provide an overall score.

Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators the ability to automatically retract threats delivered to employee inboxes and emails that turn malicious after delivery to quarantine. It is also a powerful solution to retract messages sent in error as well...

Proofpoint ThreatResponse

We don't have enough ratings and reviews to provide an overall score.

Proofpoint Threat Response collects and analyzes threat forensic data to support orchestration of incident response.

CenturyLink Analytics and Threat Management

We don't have enough ratings and reviews to provide an overall score.

With CenturyLink® Analytics and Threat Management services, you get the visibility needed to proactively identify potential security issues and respond to them before they cause harm. And with our event and incident management and response services, you can ease the burden of having to develop and...