Ridgeback

4.0
(1)

Ridgeback is an enterprise security software platform designed to defeat malicious network invasion in real time.

Work for Ridgeback?

Learning about Ridgeback?

We can help you find the solution that fits you best.

Ridgeback Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 Ridgeback review
LinkedIn Connections
Ridgeback review by Derek D.
Derek D.
Validated Reviewer
Review Source
content

"My Ridgeback review!"

What do you like best?

I have been working in cyber security for many years and Ridgeback has been one of the most interesting product because It prevents you from intrusions and secure your network. It's really easy to install and it's friendly. I would say this is better than a firewall because It has a stronger security. No one can touch your datas with this.

What do you dislike?

Just one thing I don't really like about this product is the fact It looks like the most secure product but you can spend a lot on products like Ridgeback but the most important security issues are the employees and you have to be careful with them.

Recommendations to others considering the product:

What I recommend to any company is to make sure your employees have a good knowledge of security and after your employees have a good knowledge of security to prevent them from hackers and then you can buy it because this is really secure.

What problems are you solving with the product? What benefits have you realized?

Security issues. You don't have to worry about the security of the company.

Sign in to G2 to see what your connections have to say about Ridgeback

What Threat Intelligence solution do you use?

Thanks for letting us know!

There are not enough reviews of Ridgeback for G2 to provide buying insight. Below are some alternatives with more reviews:

1
F-Secure Logo
F-Secure
4.3
(51)
Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.
2
McAfee Threat Intelligence Exchange Logo
McAfee Threat Intelligence Exchange
4.0
(48)
McAfee Threat Intelligence Exchange optimizes threat detection and response by closing the gap from malware encounter to containment from days, weeks, and months down to milliseconds.
3
Amazon GuardDuty Logo
Amazon GuardDuty
4.1
(36)
Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.
4
Cisco Talos Logo
Cisco Talos
4.3
(32)
Cisco Talos is a threat intelligence organization dedicated to providing protection before, during, and after cybersecurity attacks.
5
Alert Logic Cybersecurity Logo
Alert Logic Cybersecurity
4.2
(17)
Alert Logic provides flexible security and compliance offerings to deliver optimal coverage across your environments.
6
Vectra AI Logo
Vectra AI
4.1
(14)
Vectra AI provides an automated threat management solution that monitors internal network traffic to detect in real time active cyber attacks inside networks.
7
Flowmon Logo
Flowmon
4.2
(13)
Flowmon Networks provides a solution that helps companies to enhance performance of their networks and secure them against modern cyber threats.
8
FortiSandbox Logo
FortiSandbox
4.7
(13)
FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
9
SolarWinds MSP Threat Monitor Logo
SolarWinds MSP Threat Monitor
4.2
(10)
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.
10
CapStar Forensics Logo
CapStar Forensics
4.6
(5)
CapStar Forensics is an analytic platform that complements Wireshark by enabling the syntax and vocabulary in a fully-programmable, stateful way, with a blazingly fast search engine that allows persistent searching.
Show more
Kate from G2

Learning about Ridgeback?

I can help.
* We monitor all Ridgeback reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.