Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
Vulnerability Management, Detection, and Response (VMDR) is a cornerstone product of the Qualys TruRisk Platform and a global leader in the enterprise-grade vulnerability management (VM) vendor space. With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure their actual risk exposure over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
IBM Security QRadar (recently acquired by Palo Alto Networks) is a security and analytics platform designed to defend against threats and scale security operations. This is done through integrated visibility, investigation, detection, and response. QRadar empowers security groups with actionable insights into high-priority threats by providing visibility into enterprise security data. Through centralized visibility, security teams and analysts can determine their security stance, which areas pose a potential threat, and which areas are critical. This will help streamline workflows by eliminating the need to pivot between tools.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Go through a vulnerability assessment review for price breaks. A virtualized solution will also cut down on cost.
found other solutions, with more features at the same cost or less. You don’t have to leave the Gartner Magic Quadrant to beat their price.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
It is worth the cost.
Pricing is much higher compared to other solutions.
It is worth the cost.
Pricing is much higher compared to other solutions.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
It gives you a high level of protection at a very good price.
Everything is included in this one solution and the pricing is pretty competitive.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Collibra Governance is a software solution for data governance, which refers to the set of policies, standards, and processes that govern how an organization manages, uses, and protects its data. Collibra Governance provides a centralized platform for managing data governance, enabling organizations to ensure data accuracy, completeness, and security.
I would say it's probably in line with what other vendors charge for licensing.
It is substantial, and we do pay yearly.
I would say it's probably in line with what other vendors charge for licensing.
It is substantial, and we do pay yearly.
Microsoft Defender for Identity is a comprehensive security solution that helps organizations protect their identities and detect potential threats. It leverages advanced analytics and machine learning to provide real-time visibility into user activities, enabling proactive identification of suspicious behavior.
Defender for Identity is a little more expensive than other Microsoft products. Identity and Microsoft Defender for Cloud are both a bit costly.
It is very affordable considering that other SIEM solutions are much more expensive and have many more licensing restrictions and fees.
Defender for Identity is a little more expensive than other Microsoft products. Identity and Microsoft Defender for Cloud are both a bit costly.
It is very affordable considering that other SIEM solutions are much more expensive and have many more licensing restrictions and fees.
Kerio Control is a popular security product for small and medium-sized businesses. It is a next-generation firewall that provides unified threat management without complexity. Kerio Control provides advanced anti-virus protection and industry-leading web and content application filtering, and has a secure VPN.
Search and compare.
Pricing is good, but the licensing took a lot of time.
Search and compare.
Pricing is good, but the licensing took a lot of time.
Securonix Next-Gen SIEM excels in advanced threat detection and response with its powerful analytics and machine learning capabilities. Users value its comprehensive security monitoring, user-friendly interface, and scalability. It enhances operational efficiency, compliance, collaboration, and decision-making, boosting organizational security posture.
We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000.
We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service.
We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000.
We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service.
The product has received a positive reception from users. They have expressed satisfaction with various aspects, highlighting its quality, functionality, and value for money. They appreciate its user-friendly interface and the convenience it offers.
Additionally, the prompt and helpful customer support has garnered praise. Some users have also mentioned the product's durability and reliability. Overall, the user reviews indicate a positive experience with the product or service.
The pricing and license model are clear: node-based model.
ELK has been considered as an alternative to Splunk to reduce licensing costs.
The pricing and license model are clear: node-based model.
ELK has been considered as an alternative to Splunk to reduce licensing costs.
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Exabeam Fusion is a cloud-delivered solution that that enables you to:
-Leverage turnkey threat detection, investigation, and response
-Collect, search and enhance data from anywhere
-Detect threats missed by other tools, using market-leading behavior analytics
-Achieve successful SecOps outcomes with prescriptive, threat-centric use case packages
-Enhance productivity and reduce response times with automation
-Meet regulatory compliance and audit requirements with ease
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
Keep ahead of the latest threats and protect your critical data with ongoing threat prevention and analysis.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
TippingPoint is not as expensive as Palo Alto but it's not as cheap as Fortigate.
It's an expensive product.
Fortinet FortiGate IPS is a highly effective intrusion detection and prevention solution. It is designed to secure a user’s system from end to end and ensure that users are equipped to handle even the most sophisticated threats. Organizations across a wide variety of industries trust IPS to help them prevent unwanted intrusions from harming their networks.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
The pricing for FortiGate IPS is competitive with other products in the category.
We are currently evaluating a Palo Alto solution, and the pricing could be a reason for going for Palo Alto.
Arista NDR (formerly Awake Security) is the only advanced network detection and response company that delivers answers, not alerts. By combining artificial intelligence with human expertise, Arista NDR hunts for both insider and external attacker behaviors, while providing autonomous triage and response with full forensics across traditional, IoT, and cloud networks. Arista NDR delivers continuous diagnostics for the entire enterprise threat landscape, processes countless network data points, senses abnormalities or threats, and reacts if necessary—all in a matter of seconds. The Arista NDP platform stands out from traditional security because it is designed to mimic the human brain. It recognizes malicious intent and learns over time, giving defenders greater visibility and insight into what threats exist and how to respond to them.
The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year.
The solution is very good and the pricing is also better than others...
The solution has saved thousands of dollars within the first day. Our ROI has to be in the tens of thousands of dollars since October last year.
The solution is very good and the pricing is also better than others...
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and prevent new malicious and targeted web-based threats instantly.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
It is more expensive than ASA but is far cheaper than Checkpoint. So, pricing wise, it is right in the middle.
Expensive, but that's because it provides everything.
Currently, I am using an open-source version so I don't know much about the price of this solution.
The solution is free and open-source.
Currently, I am using an open-source version so I don't know much about the price of this solution.
The solution is free and open-source.
Snort is an open-source, rule-based, intrusion detection and prevention system. It combines the benefits of signature-, protocol-, and anomaly-based inspection methods to deliver flexible protection from malware attacks. Snort gained notoriety for being able to accurately detect threats at high speeds.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
Flowmon is a professional tool for effective network troubleshooting, performance monitoring, capacity planning, encrypted traffic analysis and cloud monitoring. Instead of just the red/green infrastructure status, it helps NetOps teams to understand user experience while keeping the amount of data noise and analytical work to a minimum. Flowmon is a part of the Kemp product portfolio.
The licensing fee accrues only once, but that of support is annual.
It works with a permanent license, and then you can pay for the support. For the gold support, you need to pay yearly.
The licensing fee accrues only once, but that of support is annual.
It works with a permanent license, and then you can pay for the support. For the gold support, you need to pay yearly.
LogRhythm UEBA enables your security team to quickly and effectively detect, respond to, and neutralize both known and unknown threats. Providing evidence-based starting points for investigation, it employs a combination of scenario analytics techniques (e.g., statistical analysis, rate analysis, trend analysis, advanced correlation), and both supervised and unsupervised machine learning (ML).
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Licensing is on a yearly basis. It's not expensive compared to its competitors.
The pricing is nice when compared to other products in the industry.
Alert Logic specializes in log management, security configuration, SIEM, SaaS monitoring, network protection, and MDR services. It is suitable for sectors such as utilities, financial services, and government.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
It scales pretty well, except in matters of price.
While the pricing and licensing through the AWS Marketplace is straightforward, scaling it out for larger environments has become an issue.
Block More Intrusions
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
I rate the product’s pricing an eight out of ten.
The tool is competitively priced.
Proofpoint Insider Threat Management helps in identifying and mitigating insider threats with features like advanced risk assessment and real-time alerts. Users appreciate the detailed insights and reporting capabilities. Some note a need for better integration with other tools and enhanced customization options.
Oracle Security Monitoring and Analytics Cloud Service is a comprehensive solution designed to provide organizations with advanced threat detection and response capabilities. This cloud-based service leverages machine learning and artificial intelligence to analyze vast amounts of security data in real time, enabling proactive identification and mitigation of potential threats.
The solution is not expensive for the data security measure you receive, it is reasonable.
The solution is not expensive for the data security measure you receive, it is reasonable.
Lumu Technologies is a cyber-security company that illuminates threats, attacks, and adversaries affecting enterprises worldwide. Using actionable intelligence, Lumu provides a radical way to secure networks by enhancing and augmenting existing defense capabilities established over the past 25 years.
It is the cheapest solution we found.
The tool is available at a good price. The tool offers a good and competitive price for customers.
It is the cheapest solution we found.
The tool is available at a good price. The tool offers a good and competitive price for customers.
Threats are a moving target. Determined and persistent threat actors purposely stretch out their activity across weeks or even months, especially when most SIEM and XDR solutions are incapable of piecing together events across time. Even worse, is that these solutions primarily use rule-based Machine Learning, which is essentially pattern matching. This makes them especially ineffective in detecting new attacks and/or variants, which are highly successful in breaching organizations. Discover how Gurucul UEBA security can help your enterprise.
The price is fair. In fact, I believe it was on the cheaper side when compared to the competition.
The price of Gurucul is competitive.
The price is fair. In fact, I believe it was on the cheaper side when compared to the competition.
The price of Gurucul is competitive.
Cloud is where your business operates, where it innovates, how it enables employees, and how it connects with customers. Adversaries know this, and that's why attacks against cloud assets in IaaS, PaaS, and SaaS environments are increasing. With Reveal(x) 360, you can mitigate the blast radius of advanced threats like ransomware and supply chain attacks with unified security across multicloud and hybrid environments in a single management pane.
When compared to other solutions, it aligns with the market average, indicating a competitive pricing level.
When compared to other solutions, it aligns with the market average, indicating a competitive pricing level.
Tripwire Enterprise is a comprehensive security solution that caters to various use cases, including compliance monitoring, file integrity monitoring, security configuration management, and security policy enforcement.
Users benefit from features such as real-time threat detection and response, audit and compliance reporting tools, and configuration management capabilities. The software has proven to be effective in maintaining a secure and compliant environment, proactively identifying security threats, and enabling quick responses to incidents.
Tripwire Enterprise is scalable, suitable for small businesses and large enterprises, and has been praised by users for its ability to improve operational efficiency, streamline processes, and provide valuable insights for decision-making.
The licensing depends on the equipment, how many devices and the types of devices.
Cloud monitoring could be better. It could also be cheaper. It would be better if the company followed a pay-as-you-use model.
The licensing depends on the equipment, how many devices and the types of devices.
Cloud monitoring could be better. It could also be cheaper. It would be better if the company followed a pay-as-you-use model.
Zscaler Cloud IPS enables you to have all threat and alert data in one place. Full user, file and app context is available. Streaming to a SIEM allows further integration into the SOC ecosystem.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
Empower your threat hunting team to pre-empt elusive attacks with anomaly detection powered by security AI to find insider threats, zero-day attacks, and APTs.
Its price is average and not very high. Splunk might be a bit cheaper than this. Its licensing is on a monthly basis.
The solution is expensive and only suitable for enterprise environments.
Its price is average and not very high. Splunk might be a bit cheaper than this. Its licensing is on a monthly basis.
The solution is expensive and only suitable for enterprise environments.
Securonix User and Entity Behavior Analytics (UEBA) leverages sophisticated machine learning and behavior analytics to analyze and correlate interactions between users, systems, applications, IP addresses, and data. Light, nimble, and quick to deploy, Securonix UEBA detects advanced insider threats, cyber threats, fraud, cloud data compromise, and non-compliance. Built-in automated response playbooks and customizable case management work flows allow your security team to respond to threats quickly, accurately, and efficiently
Their pricing is pretty comfortable. They will work with you on the cost.
When compared to other solutions, it is less expensive.
Their pricing is pretty comfortable. They will work with you on the cost.
When compared to other solutions, it is less expensive.
Pendo was founded in 2013 when alumni from Rally, Google, Cisco, and Red Hat combined their heads and hearts to build something they wanted but never had as product managers — a simple way to understand and attack what truly drives product success
Dtex includes advanced user behavior intelligence. This intelligence automatically baselines normal user activity and identifies anomalies. This allows Dtex to detect and alert on the "unknown unknowns" - never-before-seen suspicious behavior.
ArcSight User Behavior Analytics offers enterprises the ability to monitor and detect from internal and external security threats and fraud.
ArcSight Analytics is a bit expensive compared with other tools in terms of licensing costs, training, hardware implementation, and support.
The monthly licensing fee is around $20,000. There aren't any costs in addition to the standard licensing fee.
ArcSight Analytics is a bit expensive compared with other tools in terms of licensing costs, training, hardware implementation, and support.
The monthly licensing fee is around $20,000. There aren't any costs in addition to the standard licensing fee.
Every organization is adopting the cloud, but there are some companies that are reaping a larger number of benefits from cloud transformation than others. Making an effort to adopt the cloud is simply not enough to realize the benefits. The organization that prepares for efficiently managing risk will be able to capture a larger percentage of the benefits than one that has not. This is because cloud applications can be adopted overnight, without IT’s knowledge and at a pace that exceeds the ability of the SecOps teams to address security concerns. As such, the security team is chasing down applications that are already in production.
Pricing largely depends on the specific customer.
Pricing largely depends on the specific customer.