Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and log monitoring. It allows staff members to automatically compare data across multiple systems and generate alerts based on perceived threat priority.
Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat hunting, user security, and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Cortex XSOAR is a cloud security software that helps businesses generate threat intelligence, automate incident response, handle remediation processes and more from within a centralized platform. It allows staff members to utilize automated playbooks to parse, aggregate, manage, and de-duplicate daily indicators across multiple sources.
Cortex XSOAR is a cloud security software that helps businesses generate threat intelligence, automate incident response, handle remediation...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$0.00/one-time

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.9 /5
(12)

Ease of Use

4.8/ 5

Features

4.5/ 5

Customer Service

5/ 5

Value for Money

4.9/ 5

Overall rating

4.8 /5
(4)

Ease of Use

4.5/ 5

Features

4.8/ 5

Customer Service

4.7/ 5

Value for Money

4.5/ 5

Total features 62

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Data Import/Export
  • Data Visualization
  • Diagnostic Tools
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 16

  • Access Controls/Permissions
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Behavioral Analytics
  • Cloud Application Security
  • Compliance Management
  • Compliance Tracking
  • Customizable Reports
  • Data Import/Export
  • Data Visualization
  • Diagnostic Tools
  • Email Alerts
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Process/Workflow Automation
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Search/Filter
  • Secure Data Storage
  • Server Logs
  • Server Monitoring
  • Single Sign On
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • User Management
  • Visual Analytics
  • Vulnerability Management
  • Whitelisting/Blacklisting
  • Workflow Management
  • AWS CloudTrail
  • Amazon CloudWatch
  • Carbon Black App Control
  • Carbon Black Cloud Workload
  • Carbon Black EDR
  • Carbon Black Endpoint
  • Cisco Meraki
  • Cisco Umbrella
  • CylanceENDPOINT
  • Duo Security
  • ESET Endpoint Security
  • F5 BIG-IP DNS
  • FortiGate Next-Generation Firewall
  • Google Workspace
  • LastPass
  • Malwarebytes for Teams
  • Microsoft 365
  • Microsoft 365 Defender
  • Microsoft Azure
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Endpoint
  • Microsoft Defender for Office 365
  • Microsoft Intune
  • MimeCast Email Security
  • Okta
  • SentinelOne
  • Symantec Endpoint Detection and Response
  • Symantec Endpoint Security
  • Trend Micro
  • VMware Carbon Black Cloud
  • WatchGuard Firebox
  • Webroot Business Endpoint Protection
  • Webroot DNS Protection
  • Webroot SecureAnywhere
  • vCenter Server
  • vSphere
Not provided by vendor