IBM Security QRadar (recently acquired by Palo Alto Networks) is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Binary Defense provides a Managed Detection and Response service using an Open XDR strategy that detects and isolates threats early in the attack lifecycle. Expert security analysts in the Binary Defense Security Operations Center leverage an attacker’s mindset, monitoring your environments for security events 24x7x365 and acting as an extension of your security teams. When a security event occurs, Binary Defense analysts triage, disposition, and prioritize the event. Analysts conduct full kill chain analysis and supply tactical and strategic mitigation recommendations to your security team with the goal of increasing your organization’s security posture against the latest adversary threats.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle.
Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike.
Hackers are constantly evolving, exploiting new vulnerabilities and dwelling in small business environments—until they meet Huntress. Discover the power of managed detection and response backed by ThreatOps.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
The tool’s price is very good. You just need to pay for the standard license. However, you need to pay the additional cost for Microsoft Defender.
I rate the product's price a five or six on a scale of one to ten, where one is cheap, and ten is expensive since it is a fairly priced product.
Built on the industry’s only cloud-native platform to deliver security operations as a concierge service, the Arctic Wolf® Managed Detection and Response (MDR) solution eliminates alert fatigue and false positives to promote a faster response with detection and response capabilities tailored to the specific needs of your organization. Your Arctic Wolf Concierge Security® Team (CST) works directly with you to perform threat hunting, incident response, and guided remediation, while also providing strategic recommendations uniquely customized for your environment.
I find their pricing to be reasonable and competitive.
The pricing is fair.
I find their pricing to be reasonable and competitive.
The pricing is fair.
Secureworks Taegis Managed XDR is a managed detection and response (MDR) tool that combines security analytics software, 24x7 support, threat hunting, and incident response into a standalone product. In a single dashboard, users can see the whole story of their endpoint, network, and cloud activity, making event correlation simple. XDR operationalizes threat intelligence by automatically connecting our threat landscape knowledge with your security telemetry and regularly updated threat intelligence.
The Red Cloak agent is free.
The pricing of Dell Secureworks is very reasonable.
The Red Cloak agent is free.
The pricing of Dell Secureworks is very reasonable.
Reduce time to protection and minimize risk exposure with continuous threat monitoring and response from SentinelOne.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
The licensing cost depends on the number of connected devices and whether you purchase additional services.
I give the cost a three out of ten.
Red Canary Managed Detection and Response (MDR) is designed to enhance security operations through robust threat detection and response capabilities. Organizations leverage this product to swiftly identify and mitigate potential threats, ensuring continuous system security. It is highly effective for continuous monitoring and analysis of security data, which improves situational awareness and proactively addresses vulnerabilities. Red Canary MDR integrates seamlessly with existing security tools, streamlining and optimizing security operations. Its ability to conduct detailed investigations following security incidents facilitates thorough understanding and remediation of breaches.
Key features include exceptional threat detection, proactive threat intelligence with timely updates and alerts, and detailed, actionable reporting for prompt risk mitigation. Users report that Red Canary MDR has streamlined processes, improved efficiency, and enhanced communication within teams, resulting in quicker decision-making and increased productivity. Consequently, it has positively impacted organizational growth and operational effectiveness, making it a vital component of their cybersecurity arsenal.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
The price of Red Canary MDR is inlined with competitors. The price is reasonable.
The solution could vary in price depending on how many endpoints a company has.
As cyber attackers become more advanced, an increasing amount of organizations are looking to their Managed Service Providers to provide state-of-the-art network security; however, many MSPs lack the personnel or expertise to offer such a service.
The pricing is reasonable.
The pricing is in line with other products.
The pricing is reasonable.
The pricing is in line with other products.
Field Effect MDR (Managed Detection and Response) is a comprehensive cybersecurity solution designed to protect your organization's IT infrastructure. It provides multi-layered threat protection for endpoints, networks, and cloud services, ensuring no gaps in defense. The product features 24/7 threat detection and monitoring, combining advanced technology with human expertise from a Security Operations Center (SOC) to identify potential threats early. It includes automated threat response capabilities to block malware, isolate compromised devices, and prevent further damage. Additionally, it offers vulnerability management to identify and remediate system weaknesses, and risk management to analyze and mitigate risks, providing robust security for your organization.
The cost of the solution is high.
Covalence is cost-effective.
The cost of the solution is high.
Covalence is cost-effective.
Alert Logic specializes in log management, security configuration, SIEM, SaaS monitoring, network protection, and MDR services. It is suitable for sectors such as utilities, financial services, and government.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
Trend Micro XDR applies the most effective AI and expert analytics to the activity data collected from its native sensors in the environment to produce fewer, higher-fidelity alerts. Global threat intelligence from the Trend Micro Smart Protection Network™ combined with expert detection rules continually updated from our threat experts maximize the power of AI and analytical models in unparalleled ways.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
There is a subscription needed to use Trend Micro Managed XDR. We are on an annual license.
The solution is cost-effective.
Standing up an effective detection and response program isn’t as simple as buying and implementing the latest security products. It requires a dedicated SOC, staffed with highly skilled and specialized security experts, and 24/7 vigilance using the best technology to ensure stealthy attackers have nowhere to hide. Creating such a program can be expensive, difficult to maintain, and provides limited assurance that you’ve advanced your overall security. Rapid7 MDR is built from the ground up to help security teams of all sizes and security experiences strengthen their security posture, find attackers, and stay ahead of emerging threats. Our MDR service uses a combination of security expertise and technology to detect dynamic threats quickly across your entire ecosystem, providing the hands-on, 24/7/365 monitoring, proactive threat hunting*, effective response support, and tailored security guidance needed to stop nefarious activity and help you accelerate your security maturity.
The product is not overly priced.
The product is not overly priced.
Managed detection and response (MDR) services identify and limit the impact of security incidents within a customer’s environment.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
It varies based on the number of licenses.
I would rate the tool's pricing a four out of ten.
eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
It was cost-effective and not very expensive. Licensing was on a yearly basis. There were no additional costs to the standard licensing fee.
Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints, Microsoft Office 365, cloud applications, and identity. Our experts will investigate anything they find, then hand off the contextual alert information along with remediation instructions so you can quickly respond.
IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing preventive security measures is a must-have in today’s cybersecurity landscape. Security information and event management (SIEM) solutions offer an additional layer of security for your clients; however, most SIEM solutions are routinely difficult to manage, expensive to deploy, and require a significant amount of in-house cybersecurity expertise.
The solution is expensive.
The solution is expensive.
BlueVoyant provides a comprehensive suite of cybersecurity services designed to identify, detect, and respond to potential security incidents in real-time. Their MDR service offers 24/7 monitoring and threat hunting by a team of experts, utilizing advanced analytics and machine learning to enhance detection capabilities. The digital risk protection service extends the perimeter of security by monitoring external threats such as phishing attacks, data leaks, and brand impersonation. Additionally, BlueVoyant's supply chain defense focuses on safeguarding the extended enterprise by assessing and monitoring the cybersecurity posture of third-party vendors.
Our MDR security solution provides critical insight into attacks using automated machine learning algorithms to validate and prioritize alerts and uncover new threats. Our world-class team of security experts monitors threats in VMware Carbon Black Cloud, and provides rapid response along with threat containment during an incident and policy recommendations to remediate threats.
Countercept’s dedicated attack Detection and Response team deals with potential cyber threats to your organization in minutes. Countercept acts as an extension to your cyber security team, sharing our threat hunting expertise, helping your team learn and grow and supporting continuous improvement of your security posture.
CylanceGUARD is a subscription-based 24x7 managed XDR service that provides actionable intelligence for customers to prevent threats quickly while minimizing alert fatigue without requiring additional resources. This service is fully integrated with CylancePROTECT, CylanceOPTICS, CylancePERSONA, CylanceGATEWAY, and 3rd party vendors that provide holistic telemetry across all endpoints enabling our highly skilled BlackBerry analysts to threat-hunt through customer environments to find and contain threats, prevent major breaches, and allow organizations to mature their security posture. BlackBerry has the strategy, expertise, and technology to analyze and guard an organization by preventing and containing threats as well as large-scale breaches.
Its price is reasonable, but there are other products that are cheaper than this.
Its price is reasonable, but there are other products that are cheaper than this.
The Group-IB Managed XDR solution identifies threats in real time to enable immediate response actions by centralizing, correlation, and analyzing the mountains of data generated from the various tools deployed in your environment.