Recommendations to others considering ThreatSpike:
The maximum benefit comes from ensuring you have it running on every endpoint in your organisation. Make sure you have the capability to get it on to every machine. This is the key. Also, to help with any ROI calculations look at what you may be able to replace by implementing Threatspike. Review collected by and hosted on G2.com.
What problems is ThreatSpike solving and how is that benefiting you?
As we are constrained by budgets like most organisations, we are able to solve a number of problems with one product instead of several - able to control data leakage, meet CIS compliance targets, use it for secure network tunnelling (thus keeping our applications at arms length from the Internet), have instant threat alerts, sandboxing of devices, and MFA for domain admins - this is non exhaustive - we solve a lot more problems than this with the tool. Review collected by and hosted on G2.com.