Cofense Reporter

4.5
(1)

To date, organizations have lacked an efficient process for gathering, organizing, and analyzing user reports of suspicious emails that may indicate early stages of a cyber attack. Cofense Reporter provides organizations with a simple, cost-effective way to fill this information gap.

Work for Cofense Reporter?

Learning about Cofense Reporter?

We can help you find the solution that fits you best.

Cofense Reporter Reviews

Ask Cofense Reporter a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 Cofense Reporter review
LinkedIn Connections
UC
User in Capital Markets
Validated Reviewer
Verified Current User
Review Source
content

"Great Phishing Reporting Tool"

What do you like best?

Cofense Reporter makes it super simple to report any suspicious emails that are clearly fake/malware or ones that you may be unsure about. Our organization quite frequently sends out phishing emails to test employees, and this tool makes it simple for employees to report these emails. Previously, it wasn't entirely clear how to report a phishing email in Outlook, we would simply delete them.

What do you dislike?

No negatives thus far, the program is super simple to use and integrates well with Outlook.

What problems are you solving with the product? What benefits have you realized?

Cofense provides very helpful metrics in terms of tracking the number of phishing emails that employees receive and lets our security team capture them before there's a broader security breach. It also makes it easy to report suspicious emails to stop more employees from being impacted. We've had individuals fall into the trap of phishing emails, and when working in finance it's especially dangerous to have that happen.

Sign in to G2 to see what your connections have to say about Cofense Reporter

What Incident Response solution do you use?

Thanks for letting us know!

There are not enough reviews of Cofense Reporter for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sumo Logic Logo
Sumo Logic
4.3
(215)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
2
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(98)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
3
D3 Security Logo
D3 Security
4.1
(56)
D3 Security provides a proven incident management platform that empowers security operations with a full-lifecycle remediation solution and a single tool to determine the root cause of and corrective action for any threat- be it cyber, physical, financial, IP or reputational.
4
InsightIDR Logo
InsightIDR
4.4
(30)
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
5
Cb Response Logo
Cb Response
4.2
(27)
Cb Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
6
Swimlane Logo
Swimlane
4.4
(23)
Swimlane is a security platform designed to prioritize alerts, remediate threats and improve operational performances.
7
LogRhythm Logo
LogRhythm
3.7
(25)
LogRhythm empowers organizations on six continents to successfully reduce risk by rapidly detecting, responding to, and neutralizing damaging cyberthreats
8
Trend Micro Smart Protection Logo
Trend Micro Smart Protection
4.0
(28)
Trend Micro develops server security, cloud security, and small business content security solutions.
9
DERDACK Enterprise Alert Logo
DERDACK Enterprise Alert
4.8
(22)
DERDACK Enterprise Alert® combines automated alert notification workflows, 24/7 duty scheduling, ad-hoc collaboration and anywhere IT troubleshooting – reducing unexpected IT downtimes at large enterprises and organizations by 60%.
10
Vectra AI Logo
Vectra AI
4.0
(15)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
Show more
Kate from G2

Learning about Cofense Reporter?

I can help.
* We monitor all Cofense Reporter reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.