Cybereason Endpoint Detection and Response Platform

4.5
(3)

Cybereason automatically detects malicious activity and presents it in an intuitive way. It deploys easily with minimal organizational impact and provides end-to-end context of an attack campaign. Most organizations deploy Cybereason and start detecting attacks within 24 to 48 hours.

Work for Cybereason Endpoint Detection and Response Platform?

Learning about Cybereason Endpoint Detection and Response Platform?

We can help you find the solution that fits you best.

Cybereason Endpoint Detection and Response Platform Reviews

Ask Cybereason Endpoint Detection and Response Platform a Question
Write a Review
Javier Enrique Q.
Validated Reviewer
Verified Current User
Review Source
content

"Using Cybereason"

What do you like best?

Cybereason RansomFree is a great tool for preventing ransomware attacks and we installed this software in all our workstations and servers since WannaCry appeared. Cybereason RansomFree is and extra security layer we have now implemented.

What do you dislike?

I do not why in one of our servers Cybereason RansomFree is presenting issues. The issues appear when turning the server on. Sometimes the issue gets solved when repairing the installation but some others do not. I wonder if there is a solution for this inconvenience.

Recommendations to others considering the product:

Cybereason RansomFree is a great tool for preventing ransomware attacks and we installed this software in all our workstations and servers since WannaCry appeared. Cybereason RansomFree is and extra security layer we have now implemented. We hope in the near future to implement more Cybereason software in our company.

What problems are you solving with the product? What benefits have you realized?

Fortunately, we have not had any problems, but Cybereason RansomFree is a security step implemented in our policies. One of the benefits is keeping our company more secure.

Sign in to G2 to see what your connections have to say about Cybereason Endpoint Detection and Response Platform
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • For Category
  • Industry
Ratings
Company Size
User Role
For Category
Industry
Showing 3 Cybereason Endpoint Detection and Response Platform reviews
LinkedIn Connections
Javier Enrique Q.
Validated Reviewer
Verified Current User
Review Source
content

"Using Cybereason"

What do you like best?

Cybereason RansomFree is a great tool for preventing ransomware attacks and we installed this software in all our workstations and servers since WannaCry appeared. Cybereason RansomFree is and extra security layer we have now implemented.

What do you dislike?

I do not why in one of our servers Cybereason RansomFree is presenting issues. The issues appear when turning the server on. Sometimes the issue gets solved when repairing the installation but some others do not. I wonder if there is a solution for this inconvenience.

Recommendations to others considering the product:

Cybereason RansomFree is a great tool for preventing ransomware attacks and we installed this software in all our workstations and servers since WannaCry appeared. Cybereason RansomFree is and extra security layer we have now implemented. We hope in the near future to implement more Cybereason software in our company.

What problems are you solving with the product? What benefits have you realized?

Fortunately, we have not had any problems, but Cybereason RansomFree is a security step implemented in our policies. One of the benefits is keeping our company more secure.

Sign in to G2 to see what your connections have to say about Cybereason Endpoint Detection and Response Platform
Haresh S.
Validated Reviewer
Review Source
content

"Endpoint server sensors & Hunting engine "

What do you like best?

The best thing is i like the pre-built in library modes that detects malicious activities and also saves a lot of time configuring the rules and also i could collect the data from sensors and works parallely without impacting productivity and the hunting engine searches and filters the crucial information which is specific for an user and uses great artificial intelligence,machine learning algorithms and techniques to detect and diagnose cyber attacks

What do you dislike?

The live intelligence does not extensively cover all the lines and area of attacks and active monitoring service does not work the right way and lags all the time and more over integration framework for protection,integration,detection and investigation is not error proof either to filter protection technology dataset

Recommendations to others considering the product:

Endpoint detection is unique and has a lot of inbuilt features which helps a lot

What problems are you solving with the product? What benefits have you realized?

It provides end to end context of an attack campaign and they detect within 48 hours and quickest response ever and gives a conclusive way to sort out the attacks and gives precautionary warning all the time and gives valuable insights all the time

What Endpoint Detection & Response (EDR) solution do you use?

Thanks for letting us know!
Victoria B.
Validated Reviewer
Review Source
content

"Office Manager"

What do you like best?

It thinks for you and stays ahead of the game

What do you dislike?

I didn't have a bad experience with this

What problems are you solving with the product? What benefits have you realized?

Keeps out network safe

There are not enough reviews of Cybereason Endpoint Detection and Response Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Symantec Endpoint Protection Logo
Symantec Endpoint Protection
4.2
(226)
Proactively detect and block today's most advanced threats with an endpoint protection solution that goes beyond antivirus.
2
Malwarebytes Logo
Malwarebytes
4.5
(194)
Actively protect against all forms of Malware, Improve your protection without changing your AV, Renowned protection and cleanup technologies, Tool most recommended by techs and super users
3
Webroot Endpoint Protection Logo
Webroot Endpoint Protection
4.7
(174)
Webroot SecureAnywhere Business Endpoint Protection offers a revolutionary approach to malware protection.
4
McAfee Endpoint Security Logo
McAfee Endpoint Security
4.2
(123)
McAfee Endpoint Security delivers industry-leading protection and operational simplicity for your diverse endpoint environment.
5
Kaspersky Endpoint Security Logo
Kaspersky Endpoint Security
4.2
(106)
Kaspersky Endpoint Security for Business offers a tightly integrated combination of superior security technologies and far-reaching systems management capabilities, which can all be controlled via a single management console.
6
Sophos Intercept X: Next-Gen Endpoint Logo
Sophos Intercept X: Next-Gen Endpoint
3.9
(105)
Complete security that includes encryption, web filtering and patch assessment
7
Panda Security Logo
Panda Security
4.4
(89)
Panda Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
8
FortiClient Logo
FortiClient
4.4
(72)
Fortinet is a leader in network security appliance solutions and provides real-time network protection to more than 125,000 customers worldwide.
9
Trend Micro Endpoint Security Logo
Trend Micro Endpoint Security
4.1
(51)
Trend Micro Endpoint Security provides immediate protection for enterprise endpoints lowering infections by instantly securing end-points from sophisticated cybercriminal attacks
10
GravityZone Logo
GravityZone
4.1
(32)
Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.
Show more
Kate from G2

Learning about Cybereason Endpoint Detection and Response Platform?

I can help.
* We monitor all Cybereason Endpoint Detection and Response Platform reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.