Software Alternatives, Accelerators & Startups

Zeek VS Cisco Talos

Compare Zeek VS Cisco Talos and see what are their differences

Zeek logo Zeek

Buy and sell gift vouchers

Cisco Talos logo Cisco Talos

Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
  • Zeek Landing page
    Landing page //
    2023-05-21
  • Cisco Talos Landing page
    Landing page //
    2023-09-27

Zeek videos

Zeek in Action, Video 1, Suspected Malware Compromise

More videos:

  • Review - Zeek Bar Review
  • Tutorial - 12 Days of Defense - Day 2: How to use Zeek for PCAP Analysis

Cisco Talos videos

Cisco Talos Incident Response "Stories from the Field:" Matt Aubert on ransomware

Category Popularity

0-100% (relative to Zeek and Cisco Talos)
Security & Privacy
44 44%
56% 56
Cyber Security
31 31%
69% 69
Monitoring Tools
0 0%
100% 100
Tool
100 100%
0% 0

User comments

Share your experience with using Zeek and Cisco Talos. For example, how are they different and which one is better?
Log in or Post with

What are some alternatives?

When comparing Zeek and Cisco Talos, you can also consider the following products

Suricata - Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine.

Amazon GuardDuty - Amazon GuardDuty offers continuous monitoring of your AWS accounts and workloads to protect against malicious or unauthorized activities.

SonicWall Capture Advanced Threat Protection - SonicWall Capture Advanced Threat Protection is a new cloud-based sandbox service that helps to provide continuous security against complex threats by leveraging intelligence and automation to proactively protect organizations from advanced attacks,…

ActivTrak - Understand how work gets done. Collect logs and screenshots from Windows, Mac OS and Chrome OS computers.

Maltrail - Malicious traffic detection system. Contribute to stamparm/maltrail development by creating an account on GitHub.

Lookout - Lookout is a cybersecurity company that predicts and stops mobile attacks before harm is done to an individual or an enterprise.