Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine ADAudit Plus Reviews & Ratings
    516 Ratings
    Company Website
  • Blumira Reviews & Ratings
    150 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    208 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Safetica Reviews & Ratings
    409 Ratings
    Company Website
  • Graylog Reviews & Ratings
    411 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    43 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • Guardz Reviews & Ratings
    117 Ratings
    Company Website

What is Rapid7 Incident Command?

Rapid7 Incident Command is an AI-powered next-gen SIEM platform built to modernize security operations. It provides unified visibility across cloud, endpoint, SaaS, network, and third-party environments in a single operational view. Incident Command continuously correlates telemetry, asset inventory, and exposure data to eliminate blind spots. AI-driven detections and alert triage surface high-risk threats while reducing alert fatigue. Each incident is automatically enriched with vulnerability intelligence, asset criticality, and threat context. Natural language AI search allows analysts to quickly explore logs and investigate suspicious behavior. Incident Command reconstructs attack timelines by correlating events across the entire environment. Integrated SOAR automation enables rapid containment and remediation actions. Built-in DFIR capabilities help preserve evidence and support post-incident analysis. The platform aligns detections and investigations to the MITRE ATT&CK framework. Rapid7 Incident Command supports SOC scalability with a lightweight architecture and fast ROI. It empowers security teams to move from signals to decisive action with confidence.

What is Qualys File Inventory Monitoring (FIM)?

Gain thorough, real-time visibility of risks at the file level for accurate compliance and oversight through a centralized dashboard and a unified agent. This robust system maintains continuous monitoring of vital assets for any changes across both cloud and on-premises environments, catering to businesses of all sizes, including large global enterprises. By integrating trustworthy threat intelligence and incorporating File Reputation context, it enhances alert prioritization while reducing the frequency of unnecessary notifications. The system features File Access Management (FAM), which triggers alerts when essential host files, designated for restricted access, are accessed. Moreover, it offers agentless capabilities for network devices, enabling notifications for any changes in network configurations. With established monitoring profiles, it adheres to compliance requirements for regulations such as PCI DSS 4.0, NERC CIP, FISMA, SOX, NIST, HIPAA 2023, CIS18, GDPR, and many others, providing extensive compliance coverage across multiple industries. This all-encompassing strategy not only fulfills compliance obligations but also significantly bolsters the overall security posture of organizations, ultimately fostering a safer digital environment. Additionally, this system empowers organizations to proactively address potential vulnerabilities, ensuring they stay ahead of emerging threats.

Media

Media

Integrations Supported

AQtive Guard
Armis Centrix
AuthPoint
Carbon Black EDR
CnSight
Cynerio
Delinea Cloud Access Controller
Google Digital Risk Protection
Imperva WAF
Intellicta
Joe Sandbox
NXLog
NorthStar Navigator
Nucleus
Panaseer
PassiveTotal
SOCRadar Extended Threat Intelligence
Sacumen Connector as a Service (CaaS)
Scuba Database Vulnerability Scanner
Squadcast

Integrations Supported

AQtive Guard
Armis Centrix
AuthPoint
Carbon Black EDR
CnSight
Cynerio
Delinea Cloud Access Controller
Google Digital Risk Protection
Imperva WAF
Intellicta
Joe Sandbox
NXLog
NorthStar Navigator
Nucleus
Panaseer
PassiveTotal
SOCRadar Extended Threat Intelligence
Sacumen Connector as a Service (CaaS)
Scuba Database Vulnerability Scanner
Squadcast

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Rapid7

Date Founded

2000

Company Location

United States

Company Website

www.rapid7.com/products/siem/

Company Facts

Organization Name

Qualys

Date Founded

1999

Company Location

United States

Company Website

www.qualys.com/apps/file-integrity-monitoring

Categories and Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Categories and Features

Popular Alternatives

Popular Alternatives

Alert Logic Reviews & Ratings

Alert Logic

Fortra
FileVantage Reviews & Ratings

FileVantage

CrowdStrike
AdRem NetCrunch Reviews & Ratings

AdRem NetCrunch

AdRem Software