Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • Guardz Reviews & Ratings
    56 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    154 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    74 Ratings
    Company Website
  • Onspring Reviews & Ratings
    169 Ratings
    Company Website
  • Resolver Reviews & Ratings
    246 Ratings
    Company Website
  • Hoxhunt Reviews & Ratings
    4,064 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Blumira Reviews & Ratings
    131 Ratings
    Company Website
  • Site24x7 Reviews & Ratings
    717 Ratings
    Company Website

What is PT Industrial Security Incident Manager?

The PT ISIM hardware appliance ensures ongoing surveillance of ICS network security, aids in the swift detection of cyber threats, identifies both negligent and harmful actions by staff, and assists in compliance with cybersecurity regulations and industry benchmarks. Designed with a user-friendly ICS connection and versatile technology, PT ISIM is particularly beneficial for small businesses that may lack extensive security resources. Moreover, it can effectively bolster a security operations center (SOC), providing thorough monitoring of ICS vulnerabilities and simplifying security management across different sites. The appliance’s customizable component setup allows for quick and easy installation with minimal configuration required, making it suitable for organizations in various industries. Whether a company chooses to expand rapidly or gradually, the scaling process is smooth, even in complex network settings. Additionally, it is crucial to highlight that the monitoring system of PT ISIM functions exclusively in a passive mode, ensuring that it does not interfere with regular operations. This feature enhances its appeal for organizations aiming to maintain a secure environment without disrupting their daily activities.

What is D3 Smart SOAR?

D3 Security stands at the forefront of Security Orchestration, Automation, and Response (SOAR), assisting prominent global organizations in refining their security operations through intelligent automation. With the rise of cyber threats, security teams frequently face the challenges of excessive alerts and fragmented tools. D3's Smart SOAR addresses these issues by providing streamlined automation, user-friendly playbooks without coding requirements, and limitless, vendor-supported integrations, all aimed at enhancing security effectiveness. One of the standout features of Smart SOAR is its Event Pipeline, which serves as a vital resource for both enterprises and Managed Security Service Providers (MSSPs) by simplifying the alert-handling process through automated data normalization, threat assessment, and the automatic dismissal of false alarms—ensuring that only authentic threats are escalated to security analysts. Upon the detection of a legitimate threat, Smart SOAR consolidates alerts alongside comprehensive contextual information to generate high-fidelity incidents, equipping analysts with a thorough understanding of the attack scenario. Clients utilizing this system have experienced reductions of up to 90% in both mean time to detect (MTTD) and mean time to respond (MTTR), enabling them to concentrate on preemptive strategies to thwart potential attacks. Furthermore, in 2023, more than 70% of our clientele transitioned from their previous SOAR solutions to D3, highlighting our effectiveness in the field. If you're discontented with your current SOAR, we offer a reliable program designed to realign your automation strategies effectively. This commitment to innovation ensures that organizations can stay ahead of emerging threats while optimizing their security operations.

Media

Media

Integrations Supported

ANY.RUN
Check Point Quantum Next Generation Firewalls (NGFW)
Cofense Intelligence
CrowdStrike Falcon
Datadog
DomainTools
FortiGate NGFW
FortiSandbox
IBM QRadar SIEM
Joe Sandbox
LogRhythm SIEM
MaxMind
Nessus
NetWitness
Okta
Palo Alto Networks NGFW
Recorded Future
ServiceNow
ThreatQ
TruSTAR

Integrations Supported

ANY.RUN
Check Point Quantum Next Generation Firewalls (NGFW)
Cofense Intelligence
CrowdStrike Falcon
Datadog
DomainTools
FortiGate NGFW
FortiSandbox
IBM QRadar SIEM
Joe Sandbox
LogRhythm SIEM
MaxMind
Nessus
NetWitness
Okta
Palo Alto Networks NGFW
Recorded Future
ServiceNow
ThreatQ
TruSTAR

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Positive Technologies

Date Founded

2002

Company Location

Russia

Company Website

www.ptsecurity.com/ww-en/products/isim/

Company Facts

Organization Name

D3 Security

Date Founded

2002

Company Location

Canada

Company Website

www.d3security.com

Categories and Features

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Management

Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Popular Alternatives

Popular Alternatives