Cybereason Defense Platform Reviews & Product Details

Cybereason Defense Platform Overview

What is Cybereason Defense Platform?

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.

Cybereason Defense Platform Details
Product Description

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.


Seller Details
Seller
Cybereason
Company Website
HQ Location
Boston, MA
Show More
Answer a few questions to help the Cybereason Defense Platform community
Have you used Cybereason Defense Platform before?
Yes

Cybereason Defense Platform Reviews

Write a Review
Filter reviews
LinkedIn®
Connections
Showing 3 Cybereason Defense Platform reviews
Showing 3 reviews
Filter Reviews
Filter Reviews
Sort by
Ratings
Company Size
User Role
For Category
All Industries
Region
Already have Cybereason Defense Platform?
Write a Review
Validated Reviewer
Verified Current User
Review source: Invitation from G2
What do you like best?

easily deployment and high fidelity alerting. Review collected by and hosted on G2.com.

What do you dislike?

lack of reporting for senior management and executives. Review collected by and hosted on G2.com.

Recommendations to others considering the product:

pull the trigger, you will not be disappointed. Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Endpoint protection and USB device controls. Benefits have been greatly realized in the time of work from home where controlling the network endpoints are on is near impossible. Review collected by and hosted on G2.com.

Show More
Show Less
Software Developer
Computer Software
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

The best thing is i like the pre-built in library modes that detects malicious activities and also saves a lot of time configuring the rules and also i could collect the data from sensors and works parallely without impacting productivity and the hunting engine searches and filters the crucial information which is specific for an user and uses great artificial intelligence,machine learning algorithms and techniques to detect and diagnose cyber attacks Review collected by and hosted on G2.com.

What do you dislike?

The live intelligence does not extensively cover all the lines and area of attacks and active monitoring service does not work the right way and lags all the time and more over integration framework for protection,integration,detection and investigation is not error proof either to filter protection technology dataset Review collected by and hosted on G2.com.

Recommendations to others considering the product:

Endpoint detection is unique and has a lot of inbuilt features which helps a lot Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

It provides end to end context of an attack campaign and they detect within 48 hours and quickest response ever and gives a conclusive way to sort out the attacks and gives precautionary warning all the time and gives valuable insights all the time Review collected by and hosted on G2.com.

Show More
Show Less
Office Operations Manager
Construction
Small-Business(50 or fewer emp.)
Validated Reviewer
Review source: Invitation from G2
What do you like best?

It thinks for you and stays ahead of the game Review collected by and hosted on G2.com.

What do you dislike?

I didn't have a bad experience with this Review collected by and hosted on G2.com.

What problems are you solving with the product? What benefits have you realized?

Keeps out network safe Review collected by and hosted on G2.com.

Show More
Show Less

There are not enough reviews of Cybereason Defense Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SentinelOne Endpoint Protection Platform Logo
SentinelOne Endpoint Protection Platform
4.8
(51)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
2
Symantec Endpoint Protection Logo
Symantec Endpoint Protection
4.4
(520)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
3
ESET PROTECT Advanced Logo
ESET PROTECT Advanced
4.6
(415)
Equipped with proactive malware defense and engineered to be light on your systems, endpoint security gives you the protection you need with fewer interruptions and false positives.
4
Malwarebytes for Business Logo
Malwarebytes for Business
4.6
(625)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users
5
Dynatrace Logo
Dynatrace
4.5
(1,020)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
6
Rippling Logo
Rippling
4.9
(646)
A Single, Modern System for Your Payroll, Benefits, HR & IT.
7
Microsoft System Center Logo
Microsoft System Center
4.1
(545)
Microsoft System Center helps customers realize the benefits of the Microsoft Cloud Platform by delivering unified management. Experience fast time-to-value with out-of-the-box monitoring, provisioning, configuration, automation, protection and self-service.
8
Webroot Business Endpoint Protection Logo
Webroot Business Endpoint Protection
4.7
(278)
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
9
MVISION Endpoint Security Logo
MVISION Endpoint Security
4.3
(161)
McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment.
10
Sumo Logic Logo
Sumo Logic
4.3
(244)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
Show More