Introducing G2.ai, the future of software buying.Try now
Qooper
Sponsored
Qooper
Visit Website
Product Avatar Image
Dragos Platform

By Dragos

3.8 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Dragos Platform?

Qooper
Sponsored
Qooper
Visit Website
It's been two months since this profile received a new review
Leave a Review

Dragos Platform Reviews & Product Details

Profile Status

This profile is currently managed by Dragos Platform but has limited features.

Are you part of the Dragos Platform team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Dragos Platform before?

Answer a few questions to help the Dragos Platform community

Dragos Platform Reviews (2)

Reviews

Dragos Platform Reviews (2)

3.8
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Guercy Miguel  D.
GD
Security Intern
Small-Business (50 or fewer emp.)
"Dragos is a very powerful platform for a security analyst however it requires expertise."
What do you like best about Dragos Platform?

The platform provide providing advanced threat detection and comprehensive asset visibility, specifically tailored for industrial control systems. The friendly-user interface making it accessible even for those who may not be deeply technical and that is what I like the best about it. Review collected by and hosted on G2.com.

What do you dislike about Dragos Platform?

It has a complex setup and configuration. The initial deployment can be challenging, requiring some speciale knowledge and time to fully optimize, which may be a barrier for organizations without in-house expertise in industrial cybersecurity. Review collected by and hosted on G2.com.

Sandeep Khanna .
S
Research Scholar
Mid-Market (51-1000 emp.)
"A Platform for visualizing cyber security threats"
What do you like best about Dragos Platform?

Threat detection with vulnerability monitoring Review collected by and hosted on G2.com.

What do you dislike about Dragos Platform?

The pricing is a bit high. Rest needs to be observed Review collected by and hosted on G2.com.

There are not enough reviews of Dragos Platform for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Portainer Logo
Portainer
4.8
(282)
Portainer is a universal container management platform to deploy, configure, troubleshoot, and secure containerized applications across cloud, data center, edge, and Industrial IoT use cases. Portainer is trusted by customers across various industries, including financial services, information technology, manufacturing, energy, automotive, and healthcare, to simplify container adoption securely and with exceptional speed. Portainer offers the perfect blend of infrastructure versatility, self-service freedom, and compliance guardrails to deliver containerized applications in a way that suits every part of the organization. Portainer provides extensive support for container orchestrators across every deployment scenario and helps bridge the knowledge gap within every organization.
2
Particle Logo
Particle
4.5
(195)
Particle offers a suite of hardware and software tools to help you prototype, scale, and manage your Internet of Things products.
3
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
4
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(155)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
5
Blumira Automated Detection & Response Logo
Blumira Automated Detection & Response
4.6
(119)
Blumira's Automated SIEM enables organizations to detect and respond effectively to cybersecurity threats without having a dedicated in-house security operations center or security expertise.
6
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.4
(117)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
7
LevelBlue USM Anywhere Logo
LevelBlue USM Anywhere
4.4
(114)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
8
Cloud-Delivered Security Services Logo
Cloud-Delivered Security Services
4.4
(106)
Our Cloud-Delivered Security Services are natively integrated, offering consistent best-in-class protection everywhere. Backed by our world-renowned Unit 42® Threat Research team, this one-of-a-kind protection uses the network effect of 65,000 global customers to share intelligence from all threat vectors to stop known, unknown and zero-day threats 180X faster than any other platform or point solution.
9
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(100)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
10
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Logo
Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
4.2
(92)
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow. From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them. Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.