Awards & Testimonials


Best Continuous Monitoring & Mitigation

. . . . . . . .

Best Cyber Operational
Risk Intelligence Solution

. . . . . . . .

Security Orchestration,
Automation and Response

. . . . . . . .

Security Automation
and Orchestration



Best Threat Intelligence

Hear What Our Customers Have to Say

Helping our customers to automate, orchestrate and measure security operations and incident response tasks, reducing the time from breach discovery to resolution.

DFLabs’ IncMan platform reflects technical and process depth across incident response automation, forensics and case management,
including collaboration.

Dan Cummins, Senior Analyst, Information Security

451 Research

IncMan is a well-rounded, customizable Incident Management system. Their ports, dashboards and workflows are perfectly suited for the university and its students.

Abe Alirez, Network Operations

University of Advancing Technology, United States

DFLabs is one of the top breach detection and incident response firms globally.

Steve Morgan, Founder and CEO

Cybersecurity Ventures

IncMan NG is second to none! It is a centralized incident management platform that is fully customizable for your automation needs. Has the ability to maintain your run books, forensic artifacts and IOCs all in one platform. This product is a must for all SOCs and CIRTs.

John McLeod, Information Security Manager

IncMan NG provides an outstanding customizable centralized incident management platform to keep track and provide customized reporting on forensic artifacts, incident tracking and IOCs. Due to our complex SOC and CIRT environment IncMan NG was the only product that met all of our needs.

Todd Strunce, Information Security Operations, Specialist III

Bridgestone Americas

We found a great need for a ‘guided’ approach to full automation and orchestration and DFLabs is the only vendor today to do both.

Jon Oltsik, Senior Principal Analyst


Want to See IncMan in Action?

DFLabs is the pioneer in Security Orchestration, Automation & Response technology, leveraging your existing security products to dramatically reduce the response and remediation gap caused by limited resources and the increasing volume of threats and incidents.