Skip to Navigation
Skip to Navigation
Introducing G2.ai, the future of software buying.
Try now
G2 - Business Software Reviews
Search for software, category
Software
Expand/Collapse Software
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
For Developers
Use our Developer Portal to test API data
Deals
Language Selector
EN
More Language Options
Choose a language
Deutsch
Français
Português
Español
Leave a Review
Join or Log In
Search
Search Software and Services
Language Selector
Choose a language
Deutsch
Français
Português
Español
Expand/Collapse
Home
...
All Categories
Incident Response Software Discussions
Incident Response Software Discussions
Share
All Incident Response Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
CYREBRO
0
1
What is CYREBRO used for?
What is CYREBRO used for?
Digital Forensics Software
Managed Detection and Response (MDR) Software
Log Analysis Software
Incident Response Software
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Show More
1
person commented
CYREBRO
Pinned by G2 as a
common question.
Posted within
SpinOne
0
1
What is SpinOne used for?
What is SpinOne used for?
Cloud File Security Software
Cloud Data Security Software
Data Loss Prevention (DLP) Software
SaaS Backup Software
Incident Response Software
SaaS Security Posture Management (SSPM) Software
Show More
1
person commented
SpinOne
Pinned by G2 as a
common question.
Posted within
Palo Alto Cortex XSIAM
0
1
What does QRadar stand for?
What does QRadar stand for?
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Digital Forensics Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Security Orchestration, Automation, and Response (SOAR) Software
Data Breach Notification Software
Endpoint Detection & Response (EDR) Software
Risk-based Vulnerability Management Software
Show More
1
person commented
VG
Vishal G.
Pinned by G2 as a
common question.
Posted within
LevelBlue USM Anywhere
0
0
How has AlienVault USM supported your cybersecurity efforts, and what features do you rely on most?
How has AlienVault USM supported your cybersecurity efforts, and what features do you rely on most?
Cloud Compliance Software
Intrusion Detection and Prevention Systems (IDPS)
Vulnerability Scanner Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Resolver
0
0
What do you like most about Resolver for risk management, and what could be improved?
What do you like most about Resolver for risk management, and what could be improved?
Security Compliance Software
Protective Intelligence Platforms
Risk-based Vulnerability Management Software
Investigation Management Software
Enterprise Risk Management (ERM) Software
Operational Risk Management Software
Third Party & Supplier Risk Management Software
IT Risk Management Software
Audit Management Software
Physical Security Software
Incident Response Software
Threat Intelligence Software
Content Moderation Tools Software
Social Media Listening Tools
Show More
1
person commented
NM
Nick M.
Pinned by G2 as a
common question.
Posted within
Blumira Automated Detection & Response
0
0
What are the benefits and drawbacks of using Blumira for threat detection?
What are the benefits and drawbacks of using Blumira for threat detection?
Network Detection and Response (NDR) Software
Cloud Security Monitoring and Analytics Software
Security Orchestration, Automation, and Response (SOAR) Software
Log Monitoring Software
Managed Detection and Response (MDR) Software
Intrusion Detection and Prevention Systems (IDPS)
Cloud Infrastructure Monitoring Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Show More
Pinned by G2 as a
common question.
Posted within
OneTrust Tech Risk & Compliance
0
0
What improvements would you suggest for OneTrust GRC to better meet your compliance needs?
What improvements would you suggest for OneTrust GRC to better meet your compliance needs?
Security Compliance Software
Vendor Security and Privacy Assessment Software
Enterprise Risk Management (ERM) Software
Policy Management Software
IT Risk Management Software
Incident Response Software
Third Party & Supplier Risk Management Software
Show More
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
What is your experience with Logpoint for SIEM, and what do you recommend for new users?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
Dynatrace
0
0
What is Dynatrace used for?
What is Dynatrace used for?
Observability Solution Suites Software
SAP Store Software
Enterprise Monitoring Software
Log Monitoring Software
AIOps Tools
Database Monitoring Tools
Digital Experience Monitoring (DEM) Software
Website Monitoring Software
Cloud Infrastructure Monitoring Software
Runtime Application Self-Protection (RASP) Tools
ServiceNow Marketplace Apps
Session Replay Software
IT Alerting Software
Container Monitoring Software
Log Analysis Software
Incident Response Software
Application Performance Monitoring (APM) Tools
network monitoring software
Show More
3
people commented
SK
Shravan Kumar K.
KS
CM
Pinned by G2 as a
common question.
Posted within
Cynet - All-in-One Cybersecurity Platform
0
0
What is Cynet 360 AutoXDR™ used for?
What is Cynet 360 AutoXDR™ used for?
Endpoint Protection Platforms
Extended Detection and Response (XDR) Platforms
Deception Technology Software
User and Entity Behavior Analytics (UEBA) Software
Managed Detection and Response (MDR) Software
Endpoint Protection Suites
Endpoint Management Software
Endpoint Detection & Response (EDR) Software
Incident Response Software
SaaS Security Posture Management (SSPM) Software
Show More
Pinned by G2 as a
common question.
Posted within
LevelBlue USM Anywhere
0
0
What is AlienVault USM (from AT&T Cybersecurity) used for?
What is AlienVault USM (from AT&T Cybersecurity) used for?
Security Risk Analysis Software
Vulnerability Scanner Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Cloud Compliance Software
Intrusion Detection and Prevention Systems (IDPS)
Show More
Pinned by G2 as a
common question.
Posted within
InsightIDR
0
0
What is InsightIDR used for?
What is InsightIDR used for?
Network Detection and Response (NDR) Software
User and Entity Behavior Analytics (UEBA) Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Show More
Pinned by G2 as a
common question.
Posted within
Splunk On-Call
0
0
What is Splunk On-Call used for?
What is Splunk On-Call used for?
IT Alerting Software
Incident Management Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Defendify All-In-One Cybersecurity Solution
0
0
What is Defendify Cybersecurity Platform used for?
What is Defendify Cybersecurity Platform used for?
Dark Web Monitoring Tools
Breach and Attack Simulation (BAS) Software
Managed Detection and Response (MDR) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Security Awareness Training Software
Incident Response Software
Threat Intelligence Software
Vulnerability Management Software
Show More
Pinned by G2 as a
common question.
Posted within
Logpoint
0
0
What is LogPoint used for?
What is LogPoint used for?
Log Monitoring Software
Log Analysis Software
Security Information and Event Management (SIEM) Software
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Threat Intelligence Software
User and Entity Behavior Analytics (UEBA) Software
SAP Store Software
Show More
Pinned by G2 as a
common question.
Posted within
Swimlane
0
0
What is Swimlane used for?
What is Swimlane used for?
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Wazuh - The Open Source Security Platform
0
0
What is Wazuh - The Open Source Security Platform used for?
What is Wazuh - The Open Source Security Platform used for?
Endpoint Detection & Response (EDR) Software
Incident Response Software
1
person commented
ND
Nikhil D.
Pinned by G2 as a
common question.
Posted within
Proofpoint Threat Response Auto-Pull
0
0
What is Proofpoint Threat Response Auto-Pull used for?
What is Proofpoint Threat Response Auto-Pull used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
TheHive
0
0
What is TheHive used for?
What is TheHive used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
LogicHub
0
0
What is LogicHub used for?
What is LogicHub used for?
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Managed Detection and Response (MDR) Software
Pinned by G2 as a
common question.
Posted within
Activu vis|ability
0
0
What is Activu vis|ability used for?
What is Activu vis|ability used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Trellix Endpoint Security
0
0
What is FireEye Security Suite used for?
What is FireEye Security Suite used for?
Endpoint Protection Suites
Antivirus Software
Email Anti-spam Software
Incident Response Software
Endpoint Detection & Response (EDR) Software
Endpoint Protection Platforms Software
Endpoint Management Software
Endpoint Protection Platforms
Show More
Pinned by G2 as a
common question.
Posted within
ASGARD Mangement System
0
0
What is ASGARD Mangement System used for?
What is ASGARD Mangement System used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Datev
0
0
What is Datev used for?
What is Datev used for?
Data Privacy Management Software
Incident Response Software
Regulatory Change Management Software
Third Party & Supplier Risk Management Software
Data Subject Access Request (DSAR) Software
Privacy Impact Assessment (PIA) Software
Data Breach Notification Software
Cookie Tracking Software
Consent Management Platforms
Show More
Pinned by G2 as a
common question.
Posted within
Splunk SOAR (Security Orchestration, Automation and Response)
0
0
What is Splunk SOAR (Security Orchestration, Automation and Response) used for?
What is Splunk SOAR (Security Orchestration, Automation and Response) used for?
Security Orchestration, Automation, and Response (SOAR) Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
LMNTRIX
0
0
What is LMNTRIX used for?
What is LMNTRIX used for?
Deception Technology Software
Network Detection and Response (NDR) Software
Endpoint Detection & Response (EDR) Software
Incident Response Software
Threat Intelligence Software
Managed Detection and Response (MDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
Barracuda Incident Response
0
0
What is Barracuda Incident Response used for?
What is Barracuda Incident Response used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
DomainTools
0
0
What is DomainTools used for?
What is DomainTools used for?
DNS Security Solutions
Threat Intelligence Software
Incident Response Software
Digital Forensics Software
Security Risk Analysis Software
Show More
Pinned by G2 as a
common question.
Posted within
Mozilla Enterprise Defense Platform
0
0
What is Mozilla Enterprise Defense Platform used for?
What is Mozilla Enterprise Defense Platform used for?
Incident Response Software
1
person commented
HC
Hremant C.
Pinned by G2 as a
common question.
Posted within
DatAlert
0
0
What is DatAlert used for?
What is DatAlert used for?
User and Entity Behavior Analytics (UEBA) Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Palo Alto Cortex XSIAM
0
0
What is IBM Security ReaQta used for?
What is IBM Security ReaQta used for?
Endpoint Detection & Response (EDR) Software
Risk-based Vulnerability Management Software
Security Information and Event Management (SIEM) Software
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Digital Forensics Software
Network Traffic Analysis (NTA) Software
Incident Response Software
Extended Detection and Response (XDR) Platforms
Security Orchestration, Automation, and Response (SOAR) Software
Data Breach Notification Software
Show More
Pinned by G2 as a
common question.
Posted within
GreatHorn
0
0
What is GreatHorn used for?
What is GreatHorn used for?
Incident Response Software
Cloud Email Security Solutions
Pinned by G2 as a
common question.
Posted within
CA Compliance Event Manager
0
0
What is CA Compliance Event Manager used for?
What is CA Compliance Event Manager used for?
Intrusion Detection and Prevention Systems (IDPS)
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Resolver IT Risk Management
0
0
What is Resolver IT Risk Management used for?
What is Resolver IT Risk Management used for?
IT Risk Management Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
CimSweep
0
0
What is CimSweep used for?
What is CimSweep used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Anomali Security Analytics
0
0
What is Anomali used for?
What is Anomali used for?
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Anomali Security Analytics
0
0
What is Anomali used for?
What is Anomali used for?
Threat Intelligence Software
Extended Detection and Response (XDR) Platforms
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Instance Security Dashboard
0
0
What is Instance Security Dashboard used for?
What is Instance Security Dashboard used for?
Incident Response Software
Pinned by G2 as a
common question.
Posted within
Sumo Logic
0
0
What is Cloud SOAR used for?
What is Cloud SOAR used for?
Security Orchestration, Automation, and Response (SOAR) Software
Cloud Security Monitoring and Analytics Software
Log Monitoring Software
Cloud Infrastructure Monitoring Software
Container Monitoring Tools
Log Analysis Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Application Performance Monitoring (APM) Tools
Observability Solution Suites Software
Show More
Pinned by G2 as a
common question.
Posted within
The Respond Analyst
0
0
What is The Respond Analyst used for?
What is The Respond Analyst used for?
Security Risk Analysis Software
Incident Response Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
KnowBe4 PhishER/PhishER Plus
0
0
What is phishing explain with example?
What is phishing explain with example?
Incident Response Software
Security Orchestration, Automation, and Response (SOAR) Software
Pinned by G2 as a
common question.
Posted within
Cynet - All-in-One Cybersecurity Platform
0
0
What is cynet XDR?
What is cynet XDR?
Deception Technology Software
Endpoint Protection Platforms Software
User and Entity Behavior Analytics (UEBA) Software
Endpoint Protection Suites
Endpoint Management Software
Endpoint Detection & Response (EDR) Software
Extended Detection and Response (XDR) Platforms
Incident Response Software
Managed Detection and Response (MDR) Software
Show More
1
person commented
RJ
Roshan J.
Pinned by G2 as a
common question.
Posted within
Resolver
0
0
How much does resolver cost?
How much does resolver cost?
Security Compliance Software
Protective Intelligence Platforms
Risk-based Vulnerability Management Software
Investigation Management Software
Enterprise Risk Management (ERM)
Operational Risk Management Software
Third Party & Supplier Risk Management Software
IT Risk Management Software
Audit Management Software
Physical Security Software
Incident Response Software
Threat Intelligence Software
Show More
Pinned by G2 as a
common question.
Posted within
Datadog
0
0
How good is Datadog?
How good is Datadog?
Enterprise Monitoring Software
Log Monitoring Software
AIOps Platforms
Network Traffic Analysis (NTA) Software
Database Monitoring Tools
IoT Device Management Software
IoT Analytics Software
Website Monitoring Software
Cloud Infrastructure Monitoring Software
IT Alerting Software
Container Monitoring Software
Log Analysis Software
Incident Response Software
Security Information and Event Management (SIEM) Software
API Marketplaces
Application Performance Monitoring (APM) Tools
network monitoring software
Server Monitoring Software
Observability Solution Suites Software
Show More
Pinned by G2 as a
common question.
Posted within
Dynatrace
0
0
How do you use Rookout?
How do you use Rookout?
Bug Tracking Software
Application Performance Monitoring (APM) Tools
Cloud Infrastructure Monitoring Software
Observability Solution Suites Software
SAP Store Software
Enterprise Monitoring Software
Log Monitoring Software
AIOps Tools
Database Monitoring Tools
Digital Experience Monitoring (DEM) Software
Website Monitoring Software
Runtime Application Self-Protection (RASP) Tools
ServiceNow Marketplace Apps
Session Replay Software
IT Alerting Software
Container Monitoring Software
Log Analysis Software
Incident Response Software
network monitoring software
Show More
Pinned by G2 as a
common question.
Posted within
Maltego
0
0
How good is Maltego?
How good is Maltego?
Threat Intelligence Software
Brand Protection Software
Investigation Management Software
Anti Money Laundering Software
Fraud Detection Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Digital Forensics Software
Data Mapping Software
Security Orchestration, Automation, and Response (SOAR) Software
Mind Mapping Software
Disinformation Detection Tools
Insider Threat Management (ITM) Software
Network Detection and Response (NDR) Software
Attack Surface Management Software
Analytics Platforms
Show More
1
person commented
NZ
Norakmal Z.
Pinned by G2 as a
common question.
Posted within
LogRhythm SIEM
0
0
What are some SIEM tools?
What are some SIEM tools?
Incident Response Software
Security Information and Event Management (SIEM) Software
Extended Detection and Response (XDR) Platforms
Pinned by G2 as a
common question.
Posted within
Blumira Automated Detection & Response
0
0
What is cloud SIEM?
What is cloud SIEM?
Network Detection and Response (NDR) Software
Cloud Security Monitoring and Analytics Software
Security Orchestration, Automation, and Response (SOAR) Software
Log Monitoring Software
Intrusion Detection and Prevention Systems (IDPS)
Cloud Infrastructure Monitoring Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Managed Detection and Response (MDR) Software
Show More
Pinned by G2 as a
common question.
Posted within
SmartEvent Event Management
0
0
What does an event management website do?
What does an event management website do?
Digital Forensics Software
Security Information and Event Management (SIEM) Software
Incident Response Software
Pinned by G2 as a
common question.
Posted within
FortiEDR
0
0
What is FortiEDR collector service?
What is FortiEDR collector service?
Incident Response Software
Endpoint Detection & Response (EDR) Software
Pinned by G2 as a
common question.
1
2
3
4
5
Next ›
Last »
Top Contributors in Incident Response Software
1
DM
Loading...
Dur-e-Nayab M.
Marketing Manager
11 pts
2
MD
Loading...
Matthes D.
Group CEO
6 pts
3
JD
Loading...
Jack D.
4 pts
4
JG
Loading...
Jeremy G.
Product Marketing Manager
3 pts
5
JP
Loading...
Jose P.
Cyber Security Analyst II
3 pts
Popular Discussions without Comments
0
1
How can i decrypt ssl traffic with the most strongest cipher?
0
1
Can we sent logs to cloud by creating ipsec tunnel on firewalls ?
0
1
How to import ldap in uba ? and specifically what facility i get after importing
0
1
How do i correlate different logs in case of an incident response and make use of it for deep dive forensics?
0
1
How to dawnload customize vulnaribility reports in cynet console ?
Hunting for software
insights
?
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy