This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

Learn why GetApp is free

Dark Web ID vs Alert Logic MDR Comparison

Good recommendations?

Overview

Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats....

Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from
$300/mo.month
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
/
No info available
/
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.3

(8)

5

4

3

2

1

6

0

1

0

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
75%
would recommend this app

4.5

(12)

5

4

3

2

1

6

6

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

Not enoughreviews yet

Pros

Great platform for monitoring a wealth of cloud-based resources. Very in depth alerts and a reasonably intuitive and easy to navigate dashboard.
It is very user friendly and the technical support is very good.
The ease of onboarding, customer service, and the ability to leverage their resources for reviewing a large amount of data and logs.

Cons

Not enoughreviews yet

Cons

There is no option for Multi-Factor Authentication (to my knowledge, for all I know it may be hidden deep in the UI somewhere). This is an odd exclusion for a security tool.
The UI is not very well made and at times makes things very difficult to use and assess potential issues.
Log review is hard to understand unless you know much about the software or have a lot of time to dedicate to it.
  • Vendor responds to reviews
  • Last reviewN/A
  • Vendor responds to reviews
  • Last review2 years ago

Key features

  • Total features30
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Asset Discovery
  • Asset Management
  • Behavior Tracking
  • Behavioral Analytics
  • Benchmarking
  • Compliance Management
  • Compliance Tracking
  • Data Capture and Transfer
  • Data Visualization
  • Email Tracking
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Issue Tracking
  • Log Collection
  • Log Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • Risk Management
  • Sarbanes-Oxley Compliance
  • Self Service Data Preparation
  • Sensitive Data Identification
  • Server Logs
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Visual Analytics
  • Visual Discovery
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features46
  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Asset Discovery
  • Asset Management
  • Behavior Tracking
  • Behavioral Analytics
  • Benchmarking
  • Compliance Management
  • Compliance Tracking
  • Data Capture and Transfer
  • Data Visualization
  • Email Tracking
  • Event Logs
  • Firewalls
  • HIPAA Compliant
  • IOC Verification
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Issue Tracking
  • Log Collection
  • Log Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Prioritization
  • Real Time Data
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • Risk Management
  • Sarbanes-Oxley Compliance
  • Self Service Data Preparation
  • Sensitive Data Identification
  • Server Logs
  • Status Tracking
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Visual Analytics
  • Visual Discovery
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Scanning
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations1
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • OneLogin
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations36
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • OneLogin
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

Dark Web ID vs. Alert Logic MDR

See how Dark Web ID and Alert Logic MDR stack up against each other by comparing features, pricing, ratings, integrations, security & more.

Select your country

10+ YEARS RECOMMENDING SOFTWARE

Ā© 2010-2021 GetApp. All Rights Reserved.
GetAppĀ® is a registered trademark of Nubera eBusiness S.L. Nubera eBusiness uses its own and third-party cookies. By using the website you are accepting the use of these cookies. To get more information about our cookies click here.