Software Alternatives & Reviews
Register   |   Login

Cisco Talos

Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.

ยท Add video ยท Edit

Cisco Talos Alternatives

The best Cisco Talos alternatives based on verified products, votes, reviews and other factors.
Latest update:

  1. Understand how work gets done. Collect logs and screenshots from Windows, Mac OS and Chrome OS computers.

  2. McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment.

  3. Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise.

  4. Amazon GuardDuty offers continuous monitoring of your AWS accounts and workloads to protect against malicious or unauthorized activities.

  5. Cylance is an endpoint security platform that detects, prevents and blocks threats.

  6. Authentic8 puts you in control of the cloud by delivering the browser as a service.

  7. Security Orchestration, Automation & Response Platform

  8. Security solution to predict and remediate potential security risks across organizations and their partners.

  9. Learn why Fortinet was commended by Frost & Sullivan for protecting the entire attack surface with its FortiSandbox line of cybersecurity solutions

  10. Intezer is replicating the concepts of the biological immune system into cyber security, offering enterprises unparalleled threat detection and

  11. Visibility into the state of your IT infrastructure, enabling you to understand your risk potential, prevent breaches, and speed up software delivery.

  12. AlienVault USM Anywhere delivers powerful threat detection, incident response, and compliance management for cloud, on-premises, and hybrid environments.

Cisco Talos Reviews

There are no reviews of Cisco Talos yet.
Be the first one to post

Was this Cisco Talos alternatives list helpful? Your feedback is important!

7 out of 7 people consider this article as helpful.
This is equivalent to 5.0 / 5 rating.


This article was published on | Author: | Publisher: SaaSHub
Categories: Monitoring Tools, Machine Data Analytics, Threat Detection And Prevention