Advanced Threat Analysis

3.3
(2)

Advanced Threat Analysis is a security solution that combines sandboxing technology, dynamic code analysis, machine learning, and actionable threat reporting.

Work for Advanced Threat Analysis?

Learning about Advanced Threat Analysis?

We can help you find the solution that fits you best.

Advanced Threat Analysis Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 2 Advanced Threat Analysis reviews
LinkedIn Connections
Advanced Threat Analysis review by User
User
Validated Reviewer
Review Source
content

"Effective technology to protect organization"

What do you like best?

McAfee provided a very easy set-up for this technology - once the programming is set up, it is generally ready to go (which is very helpful for those that do not like to constantly have to update their security technology). With the increasing concerns of the security of databases, it's important to have a service like McAfee that's prepared to help provide that protection for our organization (particularly because our organization handles a lot of incredibly confidential data that is imperative to keep away from any ill-intentioned sources). In addition, the support services provided by McAfee were incredible, and we have been very impressed with how responsive their team was throughout our time with them.

What do you dislike?

McAfee could perhaps implement a little more guidance when it comes to utilizing the full features of their product so that our organization could better implement it. Perhaps this is more indicative of the sophistication of the software.

Recommendations to others considering the product:

Certainly consider using it! It's a very effective product, and I know that my organization valued it when it was a part of our system. I was absolutely a fan of the software.

What problems are you solving with the product? What benefits have you realized?

As an organization with a plethora of confidential information, it's imperative that we have a software like McAfee available to help protect that information from external threats. Again, we very much valued how thorough the software was and the extent to which we received support with any issues that have arisen in the process.

Sign in to G2 to see what your connections have to say about Advanced Threat Analysis
Advanced Threat Analysis review by Beatrice H.
Beatrice H.
Validated Reviewer
Verified Current User
Review Source
content

"SECURE BUT NEEDS BETTER ONLINE PROTECTION FEATURES"

What do you like best?

THE AUTOMATIC DETECTION OF VIRUSES

DATA PROTECTION AND BACKUP

AND THE ANTI-SPAM FEATURE

What do you dislike?

IT ONLINE SECURITY FEATURES WORKS HORRENDOUSLY. THE SHOULD CONSIDER IMPROVING ONLINE PROTECTION FOR SUBSCRIBERS.

Recommendations to others considering the product:

I WOULD SAY IT WORKS WELL IF YOU ARE JUST SEEKING A MINIMAL ONLINE PROTECTION FOR YOUR PERSONAL PC.

What problems are you solving with the product? What benefits have you realized?

WE USE MACAFEE TO PROTECT OUR DATA AND FOR BACK UP SERVICES.

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Advanced Threat Analysis for G2 to provide buying insight. Below are some alternatives with more reviews:

1
F-Secure Logo
F-Secure
4.3
(53)
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
2
McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
4.0
(48)
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
3
Amazon GuardDuty Logo
Amazon GuardDuty
4.1
(38)
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
4
Cisco Talos Logo
Cisco Talos
4.3
(33)
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
5
Alert Logic Cybersecurity Logo
Alert Logic Cybersecurity
4.2
(17)
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
6
Vectra AI Logo
Vectra AI
4.1
(14)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
7
Flowmon Logo
Flowmon
4.3
(14)
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
8
FortiSandbox Logo
FortiSandbox
4.7
(13)
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
9
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
4.2
(10)
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
10
CapStar Forensics Logo
CapStar Forensics
4.6
(5)
CapStar Forensics is an analytic platform that complements Wireshark by enabling the syntax and vocabulary in a fully-programmable, stateful way, with a blazingly fast search engine that allows persistent searching.
Show more
Kate from G2

Learning about Advanced Threat Analysis?

I can help.
* We monitor all Advanced Threat Analysis reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.