Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

FireEye Managed Defense

Reveal covert threats and accelerate response with intelligence-led and expertise-driven managed detection and response.

Work for FireEye Managed Defense?

Learning about FireEye Managed Defense?

We can help you find the solution that fits you best.

Find the Right Product

FireEye Managed Defense Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Showing 0 FireEye Managed Defense reviews
LinkedIn Connections

What Managed Detection and Response (MDR) Services solution do you use?

Thanks for letting us know!

There are not enough reviews of FireEye Managed Defense for G2 to provide buying insight. Below are some alternatives with more reviews:

1
eSentire Managed Detection and Response Logo
eSentire Managed Detection and Response
4.7
(41)
eSentire Managed Detection and Response is designed to keep organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent.
2
Booz Allen Managed Threat Services Logo
Booz Allen Managed Threat Services
(0)
Booz Allen Hamiltonis a firm that provides management and technology consulting and engineering services to leading Fortune 500 corporations, governments, and not-for-profits across the globe
3
Verizon Rapid Response Retainer Logo
Verizon Rapid Response Retainer
(0)
Rapid Response Retainer is an extension of your security team, giving you incident response SLAs along with access to experienced personnel, forensic investigators, and cyber intelligence analysts that help you better prepare for and respond to threats. If a breach occurs, we are available 24x7 to help you mitigate it.
4
Arctic Wolf Networks Logo
Arctic Wolf Networks
(0)
Arctic Wolf Networks provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
5
Expel Logo
Expel
(0)
Eliminating the black box within which managed security service providers (MSSPs) operate. You can see and use the same interface our analysts use to deliver our service. There's no internal analyst console. There's no curtain to look (or hide) behind. With Expel, if you're ever wondering what we're doing for you or want to see how we're making decisions, you can easily look for yourself and see it all.
6
Rook Security Services Logo
Rook Security Services
(0)
Rook Security's Managed Detection and Response services leverage threat and log data enhanced with asset and threat intelligence to prioritize escalations. Workload is managed through a shared queue where our team can collaborate with you in real time. This results in expediting effective response so incidents can be brought to resolution before a breach.
7
IronNet CyOC Logo
IronNet CyOC
(0)
The CyOC operationalizes IronDefense using the DETECT, ALERT, ANALYZE, ACT and SHARE methodology. Provides 24/7/365 monitoring, cyber threat hunting, and response for company and client networks.
8
Rapid7 Managed Detection and Response Services Logo
Rapid7 Managed Detection and Response Services
(0)
Monitor and hunt attackers in your environmentwith a little help from an army of cyber guardians. With Rapid7 Managed Detection and Response services, finding the time, talent, and technology to expertly detect and respond to breaches isn't your problemit's ours.
9
SISA Assistant Logo
SISA Assistant
(0)
SISA Assistant is a focused tool to automate all activities that organizations implement along their PCI DSS compliance and security road map. As a security manager, you get to leave the mundane tasks to your SISA Assistant tool, i.e. tasks like assigning control implementation, managing evidences, following up action items till closure, scheduling periodic compliance activities, generation of reports, etc. With up to 80% of your time now freed up, use it for more critical activities such as deciding upon the best controls, forming strategies, dealing with critical risks, etc.
10
Red Canary Logo
Red Canary
(0)
Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.
Show more
Kate from G2

Learning about FireEye Managed Defense?

I can help.
* We monitor all FireEye Managed Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.