This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

Netsurion Managed Threat Protection vs Blumira Comparison

search
Add to Compare
Recommended for you
Netwrix Auditor
Splunk Enterprise
CloudJacketX
ManageEngine Firewall Analyzer
LogPoint
Alert Logic MDR

Good recommendations?

Overview

Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Blumira is a cloud-based threat detection and response platform that helps businesses manage operations related to threat...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from

No info

  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from

No info

  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

3.6

5

4

3

2

1

7

8

2

2

3

  • Value for money
  • Ease of use
  • Features
  • Customer support
73%
would recommend this app

5.0

5

4

3

2

1

4

0

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

The ease of set up and the ability to pick and chose what devices you could monitor vs all in was a highlight.
It provides good functionality and information as needed, along with good reporting and adhoc event reporting.
Asset management seems well done. The support team is friendly and capable of solving any issues we have had.

Pros

Not enoughreviews yet

Cons

Product designed to run internally, badly adapted for the cloud.
They show vulnerabilities, but it is hard to get information on the machines affected.
It is difficult to search and generate reports. Adding extra alerts is difficult or not possible.

Cons

Not enoughreviews yet

  • Vendor responds to reviews
  • Last review5 months ago
  • Vendor responds to reviews
  • Last review3 months ago

Key features

  • Total features79
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard Creation
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • Forensic Analysis
  • Fraud Detection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analytics
  • Role-Based Permissions
  • Root Cause Analysis
  • Rules-Based Workflow
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Spam Blocker
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • User Activity Monitoring
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management
  • Total features49
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Archiving & Retention
  • Audit Management
  • Audit Trail
  • Batch Processing
  • Behavior Tracking
  • Behavioral Analytics
  • Capacity Management
  • Charting
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Continuous Monitoring
  • Customizable Reports
  • Dashboard Creation
  • Data Visualization
  • Device Management
  • Diagnostic Tools
  • Email Alerts
  • Encryption
  • Endpoint Management
  • Event Analysis
  • Event Logs
  • Event Tracking
  • File Integrity Monitoring
  • Filtering
  • Firewalls
  • Forensic Analysis
  • Fraud Detection
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Log Collection
  • Log Management
  • Log Parsing
  • Monitoring
  • Network Monitoring
  • PCI Compliance
  • Patch Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Prioritization
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analytics
  • Role-Based Permissions
  • Root Cause Analysis
  • Rules-Based Workflow
  • Search/Filter
  • Secure Data Storage
  • Security Auditing
  • Server Logs
  • Server Monitoring
  • Signature Matching
  • Spam Blocker
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • User Activity Monitoring
  • VPN
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Workflow Management

Integrations

  • Total integrationsN/A
  • Alert Logic MDR
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations10
  • Alert Logic MDR
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

Netsurion Managed Threat Protection vs. Blumira

See how Netsurion Managed Threat Protection and Blumira stack up against each other by comparing features, pricing, ratings, integrations, security & more.