Alternatives to CipherBox
Compare CipherBox alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CipherBox in 2026. Compare features, ratings, user reviews, pricing, and more from CipherBox competitors and alternatives in order to make an informed decision for your business.
-
1
Kroll Cyber Risk
Kroll
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info. -
2
Rapid7 MDR
Rapid7
Rapid7 Managed Detection and Response (MDR) is a 24/7 expert-led security service designed to detect, investigate, and respond to threats across the entire attack surface. It delivers managed extended detection and response (MXDR) by correlating signals from endpoints, cloud, network, and third-party security tools. Rapid7 MDR combines advanced technology with a global SOC to provide continuous monitoring and rapid threat containment. The service offers high-fidelity endpoint detection, proactive threat hunting, and managed next-generation antivirus and ransomware prevention. Rapid7 MDR provides full visibility into security activity through integrated SIEM and XDR capabilities, avoiding black-box operations. Unlimited digital forensics and incident response ensure threats are fully eradicated without caps or additional costs. By unifying detection, response, and vulnerability management, Rapid7 MDR helps organizations reduce risk and improve security outcomes.Starting Price: $17 per asset per month -
3
Huntress
Huntress
Huntress delivers a powerful suite of endpoint protection, detection and response capabilities—backed by a team of 24/7 threat hunters—to protect your business from today’s determined cybercriminals. Huntress protects your business throughout the modern attack lifecycle—defending against threats like ransomware, malicious footholds, and more. Our security experts take care of the heavy lifting with 24/7 threat hunting, world-class support and step-by-step instructions to stop advanced attacks. We review all suspicious activity and only send an alert when a threat is verified or action is required—eliminating the clutter and false positives found in other platforms. With one-click remediation, handwritten incident reports and powerful integrations, even non-security staff can use Huntress to swiftly respond to cyber events. -
4
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database. -
5
Ciphermail Appliance
in-put
Email encryption with CipherMail Most emails are sent in plain text. This means that anyone who has access to the data stream can read the content of the emails. This is unacceptable for most companies, institutions and organizations and may also violate applicable law. E-mail encryption ensures security and trust in communication. CipherMail is a central mail transfer agent (MTA) that works on the “store and forward” principle. Incoming e-mails, regardless of whether they are from internal or external sources, are only saved until they have been encrypted / decrypted and can be forwarded to the recipient. This happens without changing the email client and is possible in combination with any SMTP server! E-mail encryption can be done using S / MIME, PGP or in a PDF file - in principle or triggered by a trigger in the subject line. CipherMail also includes a Data Leak Prevention (DLP) module.Starting Price: $670 one-time payment -
6
CipherTrust Data Security Platform
Thales Cloud Security
Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business. The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform. -
7
CipherTrust Tokenization
Thales Cloud Security
CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer. -
8
CipherBC
CipherBC
CipherBC is a secure digital asset operating system built to provide robust, institutional-grade multi-party computation (MPC) wallet and crypto custody solutions that protect and manage digital assets with advanced layered security and automated workflows. It offers a unified command center that combines hot, warm, and cold wallet custody options, a workflow orchestration engine with policy-based approval flows, and MPC-based execution security so private keys are never fully reconstructed during transactions. It supports seamless integration with a broad ecosystem of protocols and tokens and delivers flexible custody models with customizable team management, role-based approvals, and third-party dApp connections. CipherBC products include MPC Wallet Suite, Wallet as a Service (WaaS) infrastructure, and secure custody components designed for high-frequency automated transactions, enhanced approval control, and cross-platform accessibility on desktop and mobile. -
9
CipherTrace
CipherTrace
CipherTrace delivers cryptocurrency AML compliance solutions for some of the largest banks, exchanges, and other financial institutions in the world because of its best-in-class data attribution, analytics, proprietary clustering algorithms, and coverage of 2,000+ cryptocurrency entities, more than any other blockchain analytics company. Protection from money laundering risks, illicit money service businesses and virtual currency payment risks. Know your transaction automates Crypto AML compliance for virtual asset service providers. Powerful blockchain forensic tools enable investigations of criminal activity, fraud, and sanctions evasion. Visually trace the movement of funds. Monitor crypto businesses for AML compliance, evaluates KYC effectiveness and audits performance. CipherTrace’s certified examiner training provides hands-on instruction in blockchain and cryptocurrency tracing. -
10
Market Cipher
Market Cipher
Market Cipher is a comprehensive trading toolset hosted on TradingView, designed to enhance traders' ability to analyze and capitalize on market opportunities across various asset classes, including cryptocurrencies, forex, stocks, and commodities. Provides real-time, calculated signals indicating potential price movements before they occur, featuring symbols for anticipated price drops and whale manipulation warnings. An all-in-one oscillator that combines multiple algorithms to deliver quality indications, projecting green dots to signal potential market bottoms and aiding in identifying optimal entry and exit points. The indicators are designed to work synergistically, providing traders with a robust framework for technical analysis, trend identification, and strategic decision-making. Market Cipher emphasizes community engagement, education, and guidance, offering resources such as tutorial videos and a supportive trading community to assist users.Starting Price: $600 per year -
11
VdoCipher
VdoCipher Media Solutions
Videos streamed through VdoCipher player can't be downloaded using any internet plugins or software. VdoCipher is the complete video hosting solution for e-learning, media and marketing businesses. No downloader, plugin or hack can download or share the videos streamed through us. Hollywood certified DRM to stop piracy. Ip address, user id, email id, phone no, logo, text overlay. Custom size, color, speed to discourage screen capture. Amazon AWS for Servers + CDN. Transcoding, Analytics, API, Dashboard, Plugins, Custom workflows. Customizable player with subtitles, speed change, forward rewind options. Option for viewer to download secure in android app and play offline. DRM encrypted video streaming technology ensures that no downloader, plugin can grab your content. Highest security from video piracy with Widevine DRM. Viewer specific moving/static watermark with email, user id, IP, time stamp. Customize color, speed, transparency, size for watermark.Starting Price: $129 per user, per year -
12
wReplace
SharkTime Software
wReplace is a professional Windows utility built for simultaneous multi-string replacement in plain text. Unlike standard editors that require repetitive operations, wReplace handles your entire search-and-replace list in a single pass, saving significant time on complex batch tasks. This lightweight tool is perfect for: * Batch Text Processing: Run dozens of find-and-replace tasks at once. You can even paste replacement tables directly from Excel or Calc. * Character & Subtitle Repair: Easily remove diacritics or fix encoding issues in movie subtitles. * Linguistics & Education: Ideal for romanization, transliteration (e.g., Cyrillic to Latin), and phonetic transcriptions. * Encodings & Ciphers: Quickly convert text to Morse code or apply ROT13/ROT47 ciphers. wReplace supports Unicode and features a simple, Notepad-like interface. It is fast, efficient, and free. Stop doing repetitive work and handle your mass text replacements instantly. Download wReplace today!Starting Price: $0 -
13
AudioCipher
AudioCipher
Hunched over your DAW waiting for inspiration to strike? Just type in a word and turn it into music. AudioCipher helps you break through creative block and come up with new melodies and chord progressions. Choose from a variety of scales, chords and rhythms to create unlimited variations. We fell in love the with idea of text-to-music and decided to create a MIDI plugin that would deliver that experience in the DAW. This has taken us into the world of emerging AI music software, due to the popularity of existing text-to-image services.Starting Price: $29.99 -
14
Huawei WAF
Huawei Cloud
Web Application Firewall (WAF) keeps your web applications safe and secure. Powered by Huawei's deep machine learning technology, WAF intelligently identifies malicious traffic and prevents attacks, strengthening defense in depth for your network. You can configure a wide range of rules to detect and defend against threats, ensuring the safety of your web applications. You can anonymize sensitive data and configure the minimum TLS version and cipher suite to safeguard your web applications. You can count on WAF to defend against the latest zero-day vulnerabilities. Professional security teams provide you with 24/7 monitoring. WAF fully complies with the PCI DSS requirements. With WAF as an integral part of your defense strategy, you can apply for and obtain PCI DSS certification. You can configure WAF to detect malicious code injected into web servers and ensure secure visits to web pages.Starting Price: $615 per month -
15
Quantum Xchange
Quantum Xchange
Quantum Xchange is an industry leader in providing advanced cryptographic management solutions designed to safeguard data in motion against current and emerging cybersecurity threats, including those posed by quantum computing advancements. Their comprehensive platform addresses single points of failure in encryption, ensuring robust data security today and quantum-safe protection for the future. A key offering from Quantum Xchange is CipherInsights, a tool that enables organizations to discover, catalog, and prioritize cryptographic risks within their networks. This continuous monitoring facilitates proactive identification and remediation of vulnerabilities, thereby enhancing the organization's security posture. To further strengthen data protection, Phio TX provides an affordable, crypto-agile, and quantum-safe solution. It seamlessly integrates with existing IT infrastructures, enabling the deployment of post-quantum cryptographic algorithms without significant performance costs. -
16
Buru SFTP Server
Rebex
A reliable and secure SFTP and SSH server for Windows. Free for non-commercial use. Unlimited users. Unlimited connections. Virtual path mappings. Password and public key authentication. Web-based administration. Command line interface. Easily set up the SFTP on Desktop or Server Windows. Using standard SFTP protocol makes it easy to exchange files with machines running different operating systems such as Windows, Linux or macOS. Buru SFTP server supports all major moderm ciphers to make data transfer secure and reliable. Legacy algorithms supported as well. Use the web admin application to manage the Buru Server. Or connect via SSH and run Windows command line applications remotely. The server is completely free for personal, academy and other non-commercial use.Starting Price: $299 per server -
17
cryptography
cryptography
cryptography includes both high-level recipes and low-level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests, and key derivation functions. Encrypt with cryptography’s high-level symmetric encryption recipe. cryptography is broadly divided into two levels. One with safe cryptographic recipes that require little to no configuration choices. These are safe and easy to use and don’t require developers to make many decisions. The other level is low-level cryptographic primitives. These are often dangerous and can be used incorrectly. They require making decisions and having an in-depth knowledge of the cryptographic concepts at work. Because of the potential danger in working at this level, this is referred to as the “hazardous materials” or “hazmat” layer. These live in the cryptography.hazmat package, and their documentation will always contain an admonition at the top.Starting Price: Free -
18
Webroster.net
Webroster
Access Webroster care rostering allows over 300 care businesses (including Local-Authority Reablement services) to deliver an efficient, compliant, and quality service. Including worker and client management, powerful rostering, payroll, billing, monitoring and self-service. It is an easy-to-use, scalable, and powerful solution in the Access Care Suite. An easy-to-use smartphone app that gives field-based staff on-the-go access to information about bookings, visits, and clients. Provide staff with access to their daily and weekly roster, with changes and updates communicated in real time. Ensure data is always secure with SQL Cipher encryption technology and if a staff member leaves or a phone is lost, all data can be wiped from the phone remotely. Using artificial intelligence, Optimiser simulates the decision-making process of a care coordinator to create schedules optimised to your company’s values.Starting Price: $93 per month -
19
AlgoAlpha
AlgoAlpha
Experience advanced trading with automated price action, signals, and spot reversal strategies using money flow analysis. AlgoAlpha's institutional grade indicators seamlessly integrate into your TradingView charts to enhance decision-making. Access our professional-grade scalping signals and find the best entry points for multiple tickers. Use echo to automate entering and exiting signals so that you don't have to worry about missing out on any signals. The Trend Cipher in the Smart Signals Assistant detects trends using visual signals like arrows for bullish and bearish trends, with '+' indicating strong trends. Candlesticks are color-coded—green for bullish, red for bearish, and gray for ranging markets. This helps users assess signal strength and probability. Designed with efficiency and compactness in mind, the script shows price action and liquidity through four methods, market structure, liquidity heatmap, trend lines, and FOMO bubbles.Starting Price: $42.60 per month -
20
NordLocker
Nord Security
Leading-edge encryption at your fingertips. We use the most advanced ciphers and principles, featuring Argon2, AES256, ECC (with XChaCha20, EdDSA and Poly1305), and other creations of modern cryptography to guarantee ultimate security of your files. Think of all the personal files you’d rather keep private. Prevent them from ending up in the wrong hands and being exploited in malicious ways. Finances, IDs, passwords. Getting this info compromised may lead to identity theft or loss of money. NordLocker ensures top-notch security for your sensitive data. Whether it’s your diary or a secret music collection, NordLocker protects it from prying eyes so you don’t have to worry about someone trying to snoop on you. Use NordLocker to ensure secure file access and make your professionalism shine when sharing your work with clients.Starting Price: $1.49 per month -
21
SpotSearch
OneOrigin
Advanced AI-infused Contextual Search Engine is a revolution in search, delivering instant contextual results On-the-Spot. SpotSearch is an Advanced AI-infused Contextual Search Engine that has created an outbreak in the search industry. SpotSearch powered by Sia drives instant results on-the-spot without leaving the context. Explore Key Features. User Engagement. Get content based insights and analytics on most searched word, search trends, and more. Intelligent Suggestion With features like select & search, on-the-spot search, and more... Users stay longer. Business Conversion. Increase your click-rates and get more conversions with AI-powered search results. SpotSearch out-of-the-box enables all the powerful features, so you don't need to spend anytime in building but just spend minutes to configure and SpotSearch will be up and running. Our API servers support HTTPS and all current versions of TLS (1.0, 1.1, and 1.2) with the most up to date cipher suites. -
22
Proficio
Proficio
Proficio’s Managed, Detection and Response (MDR) solution surpasses the capabilities of traditional Managed Security Services Providers (MSSPs). Our MDR service is powered by next-generation cybersecurity technology and our security experts partner with you to become an extension of your team, continuously monitoring and investigating threats from our global networks of security operations centers. Proficio’s advanced approach to threat detection leverages an extensive library of security use cases, MITRE ATT&CK® framework, AI-based threat hunting models, business context modeling, and a threat intelligence platform. Through our global network of Security Operations Centers (SOCs), Proficio experts monitor, investigate and triage suspicious events. We significantly reduce the number of false positives and provide actionable alerts with remediation recommendations. Proficio is a leader in Security Orchestration Automation and Response (SOAR). -
23
ThreatDefence
ThreatDefence
Our XDR (Extended Detection and Response) cyber security platform provides deep visibility and threat detection across your endpoints, servers, cloud and your digital supply chain. We deliver the platform to you as fully managed service supported by our 24×7 Security Operations, with low cost and fastest enrollment time in the industry. Our platform is the foundation of effective cyber threat detection and response services. Providing deep visibility, great threat detection, sophisticated behavior analytics and automated threat hunting, the platform adds efficiency and value to your security operations capability. Leveraging our proprietary detection methodologies, including AI-empowered machine learning, our platform uncovers suspicious and anomalous behavior revealing even the most hidden threats. The platform creates high fidelity detections, flagging real threats and assisting SOC analysts and investigators to focus on what really matters.Starting Price: $5 per user per month -
24
Blackpoint Cyber
Blackpoint Cyber
Blackpoint Cyber's 24/7 Managed Detection and Response service provides real-time threat hunting and true response; not just alerts. Blackpoint Cyber is a technology-focused cyber security company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence cyber security and technology experts. Leveraging its real-world cyber experience and knowledge of malicious cyber behavior and tradecraft, Blackpoint provides cyber security products and services to help organizations protect their infrastructure and operations. The company’s proprietary security operations and incident response platform, SNAP-Defense, is available as a product or as a 24x7 Managed Detection and Response (MDR) service. Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world. -
25
Sequretek Percept XDR
Sequretek
Cloud-based enterprise security platform offering automated threat detection and response using AI and big data across cloud and on-premise enterprise environments. Percept XDR ensures end-to-end security, threat detection and response while allowing enterprises to focus on their core business growth without the fear of compromise. Percept XDR helps to protect against phishing, ransomware, malware, vulnerability exploits, insider threats, web attacks and many more advanced attacks. Percept XDR has an ability to ingest data from various sources, uses AI and Big Data to detect threats. Its ability to ingest sensor telemetry, logs, and global threat intelligence feeds allows the AI detection engine to identify new use cases and anomalies, thereby detecting new and unknown threats. Percept XDR features SOAR-based automated response in line with the MITRE ATT&CK® framework. -
26
CYREBRO
CYREBRO
CYREBRO is a Managed Detection and Response (MDR) solution providing the core foundation and capabilities of a Security Operations Center delivered through its cloud-based, interactive SOC Platform. CYREBRO rapidly detects, analyzes, investigates and responds to cyber threats. CYREBRO MDR is a true 24/7/365 ML-backed solution that includes a proprietary detection engine for log ingestion, detection and orchestration, a SOAR for correlations, automations and investigations, SOC Platform for real-time investigation data and visibility, and top tier analyst and DFIR teams. Backed with 1,500+ proprietary detection algorithms that are constantly optimized, CYREBRO monitors companies facing different types of risks and attacks, shortening mean time to detect (MTTD). CYREBRO is vendor-neutral and easily connects to hundreds of different tools and systems, delivering TTV within mere hours. -
27
Infocyte
Infocyte
The Infocyte Managed Detection and Response platform helps security teams proactively hunt, detect, and respond to cyber threats and vulnerabilities resident within their network—across physical, virtual, and serverless assets. Our MDR platform provides asset and application discovery, automated threat hunting, and on-demand incident response capabilities. Combined, these proactive cyber security practices help organizations control attacker dwell time, reduce overall cyber risk, maintain compliance, and streamline security operations. -
28
Managed Threat Response, 24/7 threat hunting, detection, and response delivered by an expert team as a fully-managed service. Threat Notification Isn’t the Solution – It’s a Starting Point. Other managed detection and response (MDR) services simply notify you of attacks or suspicious events. Then it’s up to you to manage things from there. With Sophos MTR, your organization is backed by an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralize even the most sophisticated threats. We do the work, but you own the decisions. This means you control how and when potential incidents are escalated, what response actions (if any) you want us to take, and who should be included in communications. Sophos MTR features two service tiers (Standard and Advanced) to provide a comprehensive set of capabilities for organizations of all sizes and maturity levels.
-
29
Redscan ThreatDetect
Redscan
Cyber threat hunting is the process of proactively searching across networks and endpoints to identify threats that evade security controls. Using a combination of manual and machine assisted techniques, threat hunters search for indicators of compromise (IOCs) across an organisation’s IT environments. By hunting for evidence that a breach has occurred, threat hunting enables security teams to identify unknown threats and respond quickly and effectively to them before they cause damage and disruption. ThreatDetect™, Redscan’s outcome-focused Managed Detection and Response (MDR) service integrates the latest detection technologies and intelligence plus a team of cyber offensive security professionals to provide the hunting capability needed to proactively detect threats. Our experienced team of Red and Blue Team security professionals have a deep knowledge of offensive security and apply this knowledge to help better identify unknown threats. -
30
Eviden MDR Service
Eviden
How to ensure your organization is permanently protected against cyber-threats? Cyber-attacks get more sophisticated and more aggressive every day. As a cybersecurity service provider, Eviden provides continuous protection in a rapidly changing world of threat. Eviden offers a full spectrum of advanced detection and response services around the clock and across the globe. We have developed the next generation SOC, Prescriptive Security Operation Center dedicated on preventing breaches from happening by leveraging big data and supercomputing capabilities and automating security responses. We provide CERT services, with threat intelligence, CSIRT Services and vulnerability management. Our Advanced Detection and Response services establish highly resilient security practices to counter Advanced Persistent Threats (APT), SOC Services and context-aware IAM. Get 24/7 threat monitoring, hunting, and full-service response. -
31
Mandiant Managed Defense
Google
Amplify your team and elevate your security with managed detection and response (MDR) services delivered by experts with years of frontline experience and backed by nation-grade threat intelligence. Identify, investigate and prioritize alerts in context so you can focus on threats that matter. Respond to attacks before they disrupt your business with the collective knowledge and experience of Mandiant. Gain dedicated experts to train, advise and elevate your program. Managed Defense knows more about attacker behavior and uses that knowledge to protect against advanced threats. We focus on the attacker tactics, techniques and procedures to reduce the average dwell time of a strategic ransomware actor from 72 days to 24 hours or less. Augment your defenses with a managed detection and response service backed by both Mandiant Threat Intelligence and Incident Response. Managed Defense includes standard and unique features to protect from stealthy and damaging attacks. -
32
NeoSOC
NRI SecureTechnologies
NeoSOC is a 24/7 cloud-based managed security solution that uses our SOC-as-a-Service delivery model to provide a flexible service ranging from security device monitoring and alerting to fully managed detection and response services based on the individual needs of each organization. Utilizing our unique blend of practitioner expertise, cutting-edge technology, and almost 20-years of managed security services experience, NeoSOC is an easily scalable high-value service for companies of any size. Today, the challenge for many organizations is to find critical security incidents that are often lost in a sea of events. NeoSOC supports 400+ devices and applications as log sources to provide clear visibility into any security threats facing your organization. The NeoSOC VM log collector deploys in minutes and gets clients up and running quickly. -
33
Defendify
Defendify
Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security ScanningStarting Price: $0 -
34
Sangfor Athena MDR
Sangfor Technologies
Sangfor Athena MDR is a fully managed detection and response service designed to protect your organization from advanced cyber threats. Powered by 400+ global experts and cutting-edge AI, it provides 24/7 monitoring, real-time threat detection, and rapid incident response. With Athena MDR, organizations reduce alert fatigue and eliminate the need for expensive, in-house SOC operations. The service filters out false positives, enabling your team to focus on real risks. It also supports regulatory compliance and reduces the cost of breach response. Athena MDR ensures enterprise-grade protection without the complexity or cost of building a security team from scratch. -
35
Deepwatch
Deepwatch
Advanced managed detection and response to secure the distributed enterprise. Expert guided security operations for early detection and automated response to mitigate risk across the enterprise. Preemptively detect malicious activity and respond to active threats before the endpoint is compromised. Efficiently discover and remediate critical threats and vulnerabilities across the enterprise. Extensive experience across our team has led us to an important realization too often overlooked: each organization has unique aspects and requirements for its cyber solutions. No team is exactly the same and your threats aren’t either. We developed the Squad Delivery Model to foster collaborative, high touch, tailored services that meet your specific needs and requirements. -
36
Booz Allen MDR
Booz Allen Hamilton
Protect your network with complete visibility and layered detection. Our customized managed detection and response (MDR) service gives you advanced threat detection, investigation, and response delivered via out-of-band network sensors which provide full visibility to network communications. We focus on malicious activity happening inside and around your environment to protect you from known and unknown threats. Receive instant detection using full packet capture, blended detection tools, SSL decryption, and the advantages of Booz Allen’s Cyber Threat Intelligence service. Industry-leading threat analysts will investigate and contain your network’s security events, giving you more accurate and applicable intelligence. The Booz Allen team provides threat investigation services, contextual intelligence, reverse engineering, and the ability to write rules and custom signatures to stop attacks in real time. -
37
OpenText Core EDR
OpenText
OpenText Core EDR is an all-in-one endpoint detection and response solution that unifies endpoint protection, SIEM (security information and event management), SOAR (security orchestration, automation, and response), alert triage, and vulnerability assessment into a single platform, eliminating the need to manage disparate security tools. It uses a lightweight agent with pre-configured policies, enabling deployment in minutes and simplifying management across devices without complex scripting. By correlating endpoint, network, and identity events in real time, built-in SIEM and SOAR playbooks surface suspicious behavior and automatically guide containment, remediation, and investigation actions. Continuous, global threat intelligence powers real-time monitoring, helping detect malware, ransomware, zero-day attacks, and other advanced threats before they spread, and enabling rapid isolation or remediation of compromised endpoints. -
38
Cybraics
Cybraics
Stop chasing alerts and prevent incidents before they happen with the world's leading XDR platform that revolutionizes threat detection, log management, and response. Close the gaps and free your team with our silo-breaking, enterprise-class industry-leading XDR platform that covers compliance and simplifies security operations. Cybraics nLighten™ isn't just another security tool. Born out of AI and machine learning research with the U.S. Department of Defense, it's the catalyst to unlock actionable intelligence from the scattered and siloed data, logs, and alerts across multiple security tools in your network. And with Cybraics, powerful threat detection doesn't need to come at a premium. Powered by Adaptive Analytic Detection (AAD) and Persistent Behavior Tracing (PBT). Maximize security team efficacy with 96% automated actionable case creation and a 95% reduction in false positives. Reduce detection and response time from months to minutes. -
39
Armor XDR+SOC
Armor
Continuously detect malicious behavior and let Armor's team of experts guide remediation. Manage threats and reverse the damage of exploited weaknesses. Collect logs and telemetry across your enterprise and cloud environments and leverage Armor's robust threat-hunting and alerting library to detect threats. Using open-source, commercial, and proprietary threat intelligence, the Armor platform enriches incoming data to enable smarter, faster determinations of threat levels. When threats are detected, alerts and incidents are created – you can rely on Armor's team of security experts around-the-clock to respond to threats. Armor's platform was built to take advantage of advanced AI and machine learning, as well as cloud-native automation engines to make all aspects of the security lifecycle simpler. Cloud-native detection and response with the support of a 24/7 team of cybersecurity experts. Armor Anywhere is integrated within our XDR+SOC offering with dashboard visibility.Starting Price: $4,317 per month -
40
AT&T Managed Threat Detection and Response protect your organization with 24x7 security monitoring from AT&T Cybersecurity powered by our award-winning USM platform and AT&T Alien Labs™ threat intelligence. 24x7 proactive security monitoring and investigation from the AT&T SOC. Our expert SOC analysts leverage our decades of managed security expertise to help you to protect your business by monitoring and disrupting advanced threats around the clock. Built on Unified Security Management (USM) with multiple security capabilities in one unified platform, we go beyond other MDR services to provide centralized security visibility across your cloud, networks, and endpoints, enabling early, effective detection and a rapid time to deployment. Powered by AT&T Alien Labs threat intelligence with unrivaled visibility of the AT&T IP backbone, global USM sensor network, and the Open Threat Exchange (OTX), AT&T Alien Labs delivers continuous, tactical threat intelligence to the USM platform.Starting Price: $6,695 per month
-
41
Abacode Cyber Lorica
Abacode
Abacode’s 24/7/365 managed threat detection and response solution, Cyber Lorica™, is a product-agnostic monthly subscription service that utilizes industry-leading Security Information & Event Management (SIEM) and AI Threat Detection software with our in-house Security Operations Center (SOC) to determine real-time visibility of your entire threat landscape. Cyber Lorica™ is an advanced level of protection that detects and responds to potential security incidents around the clock from our Security Operations Center (SOC). Our platform offers custom-built security, monitored 24/7/365, by industry leading experts. SIEM and AI Threat Detection software that monitors your on-premises and cloud network devices. Managed network surveillance provided by trained IT Security Operations Center (SOC) Analysts who manage various threat detection platforms and enact incident escalation protocols. Threat exchange communities that enable sharing web reputation information. -
42
SecurityHQ
SecurityHQ
SecurityHQ is a world leading independent Managed Security Service Provider (MSSP), that detects, and responds to threats, instantly. As your security partner, we alert and act on threats for you. Gain access to an army of analysts that work with you, as an extension of your team, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs. Most Popular Services: Managed Detection and Response (MDR) Endpoint Detection and Response (EDR) Managed Extended Detection and Response (XDR) Vulnerability Management Services Managed Firewall Digital Forensics & Incident Response Managed Network Detection and Response (NDR) Penetration Testing CISO as a Service -
43
RocketCyber
Kaseya
RocketCyber delivers around-the-clock Managed SOC (Security operations Center) services that allow you to instantly enhance threat detection and response initiatives for your managed IT environments. Improve your security posture and alleviate threat concerns with expert-powered services. RocketCyber provides a 24/7/365 MDR service that enables robust threat detection and response across the IT environments you manage. Stop advanced threats, remove stress and enhance your security posture with expert-backed cybersecurity. -
44
Elasticito
Elasticito Limited
We alert organisations to Risks & Threats. Our approach integrates state-of-the-art automation with the seasoned expertise of our Cyber Specialists, offering you exceptional visibility & control over the evolving cyber threats your business faces. We deliver the intelligence needed to proactively defend against attacks & understand third-party exposures. Through ongoing analysis of your security infrastructure, we identify areas of strength, uncover weaknesses & prioritise critical fixes based on potential business damage. Achieve a clear understanding of your security posture, benchmark against competitors & ensure regulatory compliance. Our Crown Jewel Protection, Detection & Response Solutions, aligned with the MITRE ATT&CK Framework, secure your critical assets at every stage. -
45
LMNTRIX
LMNTRIX
LMNTRIX is an Active Defense company specializing in detecting and responding to advanced threats that bypass perimeter controls. Be the hunter not the prey. We think like the attacker and prize detection and response. Continuous everything is the key. Hackers never stop and neither do we. When you make this fundamental shift in thinking, you start to think differently about how to detect and respond to threats. So at LMNTRIX we shift your security mindset from “incident response” to “continuous response,” wherein systems are assumed to be compromised and require continuous monitoring and remediation. By thinking like the attacker and hunting on your network and your systems, we allow you to move from being the prey to being the hunter. We then turn the tables on the attackers and change the economics of cyber defense by shifting the cost to the attacker by weaving a deceptive layer over your entire network – every endpoint, server and network component is coated with deceptions. -
46
Kaspersky Managed Detection and Response
Kaspersky
As corporate processes undergo extensive, across-the-board automation, businesses are becoming increasingly dependent on information technologies. On the flipside, the more a company’s business depends on IT, the more attractive the idea of hacking its information systems becomes. Companies often struggle to find the expertise and staff needed to track down threats and respond appropriately and security teams can become overwhelmed by managing systems and tools, leaving little time for thorough investigation and analysis. Leading security technologies based on unique ongoing threat intelligence and advanced machine learning prevent, detect and respond to complex attacks. Proprietary Indicators of Attack enable the detection of stealthy non-malware threats that automated prevention and detection tools may have missed. A completely managed or guided disruption and containment of threats delivers a swift reaction while keeping all response actions within your control. -
47
eSentire
eSentire
Human expertise at machine scale. Arming you with full threat visibility and immediate action. eSentire Managed Detection and Response. Safeguard your business operations with full threat visibility, rapid response, 24/7 SOC coverage, and expert security advisors. Detect and disrupt known and unknown threats by understanding how attackers think. We've simplified security by delivering an award-winning advanced service tailored to your risk profile. Our human expertise and machine learning approach protects high-risk assets from advanced cyber threats that technology alone can miss. Since launching our managed security service in 2008, we have experienced rapid operational and geographic growth. Our talented and diverse employees work together across our offices worldwide. -
48
OpenText Core MDR
OpenText
OpenText Core MDR provides organizations with a proactive, expert-driven approach to threat detection and response. The service fills the security skills gap by supplying continuous monitoring, advanced detection capabilities, and rapid incident handling from a dedicated SOC team. Working seamlessly with existing endpoint protection tools and over 500 integrations, it delivers unified visibility across alerts and environments. Organizations benefit from expert investigation and threat hunting, ensuring emerging risks are addressed before they escalate. Its co-managed model keeps IT teams fully informed while outsourcing the heavy lifting to seasoned cybersecurity professionals. With OpenText Core MDR, businesses strengthen their security posture and maintain peace of mind even outside business hours. -
49
Securonix Unified Defense SIEM
Securonix
Built on big data, Securonix Unified Defense SIEM combines log management, user and entity behavior analytics (UEBA), and security incident response into a complete, end-to-end security operations platform. It collects massive volumes of data in real-time, uses patented machine learning algorithms to detect advanced threats, and provides artificial intelligence-based security incident response capabilities for fast remediation. The Securonix platform automates security operations while our analytics capabilities reduces noise, fine tunes alerts, and identifies threats both inside and out of the enterprise. The Securonix platform delivers analytics driven SIEM, SOAR, and NTA, with UEBA at its core, as a pure cloud solution without compromise. Collect, detect, and respond to threats using a single, scalable platform based on machine learning and behavioral analytics. With a focus on outputs, Securonix manages the SIEM so you can focus on responding to threats. -
50
WithSecure Elements Infinite
WithSecure
WithSecure Elements Infinite provides a comprehensive suite of security tools and capabilities as a continuous Managed Detection and Response (MDR) service that includes responding 24/7 to cyber security incidents and improving customers security posture through Continuous Threat Exposure Management (CTEM). Elements Infinite’s proprietary Endpoint Detection & Response (EDR) agent and log collectors feed data into our XDR detection platform, offering exceptional visibility into user, endpoint, cloud, and network activities. The primary service components cover the environments external attack surface(s), identity management systems (Entra ID), physical endpoints, corporate networks and cloud environments (AWS, Azure). WithSecure is a premier European cyber security company dedicated to helping our customers achieve compliance and effectiveness the European way.