Software Alternatives & Reviews

CB Response VS Demisto

Compare CB Response VS Demisto and see what are their differences

CB Response logo CB Response

Partner Portal.

Demisto logo Demisto

First and only automated incident response platform to combine security orchestration, incident management and interactive investigation.
  • CB Response Landing page
    Landing page //
    2022-09-23
  • Demisto Landing page
    Landing page //
    2023-08-21

CB Response videos

Cb Response vs WannaCry - Archive

More videos:

  • Review - Threat Hunting at Scale Using Cb Response + Surveyor
  • Review - Carbon Black | Cb Response bemutató

Demisto videos

Palo Alto Networks Demisto Demonstration

More videos:

  • Review - Alert Ingestion and Mapping Video | Demisto
  • Review - Demisto and the Palo Alto Networks Application Framework

Category Popularity

0-100% (relative to CB Response and Demisto)
Cyber Security
56 56%
44% 44
Monitoring Tools
56 56%
44% 44
Log Management
54 54%
46% 46
Ethical Hacking
46 46%
54% 54

User comments

Share your experience with using CB Response and Demisto. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing CB Response and Demisto, you can also consider the following products

D3 Security - D3 Security offers a full-lifecycle incident response and case management solution.

insightIDR - insightIDR is an incident detection and response tool.

Siemplify - Siemplify's security orchestration, automation and response platform offers security operations teams everything they need to be efficient & effective.

Now Platform - Get native platform intelligence, so you can predict, prioritize, and proactively manage the work that matters most with the NOW Platform from ServiceNow.

Swimlane - Swimlane’s SOAR platform helps organizations manage the growing volume of alerts more efficiently by automating time-consuming incident response processes.

Symantec Endpoint Encryption - Symantec Endpoint Encryption protects the sensitive information and ensure regulatory compliance with strong full-disk and removable media encryption with centralized management.