Prices can vary greatly based on features needed, support and customization requests. Knowing what you're after helps vendors give you the most fair price.
Network Security
Firewall
Encryption
Filtering
Attack Surface Monitoring
Threat Hunting
Threat Intelligence
Incident Response & Remediation
Log Management
Network Discovery
Network Control
Network Tunnels
Single Sign-On (SSO)
Activity Logs
Network Performance Monitoring (NPM)
Breach Assessments
Threat Analytics
Threat Modeling
Cyber Attack Visualization
Antivirus
Anti-Malware
Anti-Ransomware
Exfiltration Prevention
Centralized Console
Deployment
Data Classification
Data Discovery
Have you used Zeek in the past?
Help other people find the right software by sharing your Zeek experience.