Chart Key
Average Rating
Average rating based on reviews
Views
Number of total page views
Comparisons
Number of times compared to another product
Reviews
Total number of reviews on IT Central Station
Followers
Number of followers on IT Central Station
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score. The score is calculated as follows: The product with the highest count in each area gets the highest available score. (20 points for Reviews; 16 points for Views, Comparisons, and Followers.) Every other product gets assigned points based on its total in proportion to the #1 product in that area. For example, if a product has 80% of the number of reviews compared to the product with the most reviews then the product's score for reviews would be 20% (weighting factor) * 80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our rating scale of 1-10. If a product has fewer than ten reviews, the point contribution for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews; two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old, as well as those written by resellers, are completely excluded from the ranking algorithm.
Most Views
From IT Central Station visitors
Most Followed
By IT Central Station users
Most Compared
From IT Central Station visitors

Endpoint Detection and Response Reviews

Read top reviews of Endpoint Detection and Response solutions from the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
SentinelOne
Reseller
System Engineer at a tech services company
Nov 16 2017

What is most valuable?

SentinelOne’s Rollback is its best feature. No solution can ever provide a 100% protection, but their rollback feature closes this gap in endpoint security giving end users a ray of hope in the event of a worst case scenario endpoint breach,... more»

How has it helped my organization?

Before it was a challenge for us to know who had an existing endpoint issue or who had the most attacks within the corporate network. Since SentinelOne was introduced, it has provided overall endpoint status visibility for us. Giving us the... more»

What needs improvement?

They need to improve their UI and the way they show that the scanning is running on the endpoint. Sometimes users wanted to see whether their AV is working via visual context. They could add “right click>scan” where most users were trained... more»
Real User
Sr. Systems Engineer (R&D) at a manufacturing company with 1,001-5,000 employees
Nov 14 2017

What do you think of Guidance Software EnCase?

Valuable Features Image creation and image analysis in one program, basically for ease of use. All-in-one solutions tend to outperform split system solutions. • Improvements to My Organization It has allowed me to teach forensics in an environment which is very much analogous to the real world. • Room for Improvement It could be more geared towards students. I would add a full-featured student version that can be integrated into labs that the students can work with. (This can be on a monthly fee plan.) • Use of Solution On and off for nine years in educational surroundings. I have only used the newer version (8.5) in classes. • Stability Issues With 6.10, there are some issues, but these have been corrected. With 8.5, which I have used a few times, I have not seen...

Have A Question About Endpoint Detection and Response?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.
SentinelOne
Reseller
Account Director
Nov 15 2017

What is most valuable?

If I am breached, they will pay the ransom on my behalf. Cybercrime is growing in the world of technology, the defense in today’s world has no accountability. If breached, all that is said is that it is zero-day, and you still pay license... more»

How has it helped my organization?

With automation, the time wasted on malware, like ransomware, is dealt with on a scale where everything is centralized. The IT Technician does not have to wait for a user to bring the machine to IT, as all they need is an active internet... more»

What needs improvement?

* Deployment strategy for large organizations that do not use active directory (AD). * Windows updates have not been done on the client side, so minimum requirements stop the installation.
Real User
System Analyst
May 07 2018

What is most valuable?

* The software uses very few resources; it is almost invisible to the end user. * Behavioral Monitoring stops known malicious events before they even begin. * The whitelist: Being a Casino, we have some odd software packages. Being able to... more»

How has it helped my organization?

During the company’s transition, we had a memory scraper infiltrate our network, and with the help of Carbon Black, we isolated the outbreak to a few point of sale machines.. We saw a step-by-step account of how the software was introduced... more»

What needs improvement?

It works the way we want and how we want. For one improvement, an easier integration with an AlienVault USM appliance would be good. The directions for Splunk are spot on, but it is difficult to find anything on integration with AlienVault,
Real User
Director-in-Charge at a non-tech company
Sep 12 2017

What is most valuable?

Most of the features of Encase are very user-friendly. Simultaneously, we can process many search operations: Multiple sorting and regular expression search are a couple of those features.

How has it helped my organization?

I had been using Encase as a digital forensicator professional for over a decade. I have used this to solve many cases. It is useful for an initial assessment as well as to crack cases. It is user-friendly. Currently, I am in the education... more»

What needs improvement?

I suggest that if the mobile phone acquisition is embedded in the Encase law enforcement version, it would be very useful. As of now, only a few mobile phones, especially the smart phones, have the acquisition embedded.
CrowdStrike
Real User
Senior Financial Analyst - Data Analytics at a energy/utilities company with 1,001-5,000 employees
May 30 2018

What do you think of CrowdStrike?

Primary Use Case Primary use is for endpoint investigations. • Improvements to My Organization It allows us to determine root cause, do the analysis, a lot quicker. • Valuable Features Visibility into the endpoint rate. Understanding what processes are running on the system, what registry keys have been enabled. Pretty much understanding the whole frantic side of the endpoint. • Room for Improvement It would be nice if we could extrapolate indicators of compromise and write them within sandboxes. • Use of Solution One to three years. • Stability Issues It's fairly stable. We haven't been having too many issues with that. • Scalability Issues It scales quite well because it's cloud-based and subscription-based. It can scale pretty quickly. • Customer...
Consultant
Digital Forensic Investigator and Data Recovery Expert at a consultancy with 1,001-5,000 employees
Mar 12 2018

What is most valuable?

I like the processing feature on the product because it does everything at once, i.e, indexing, recovery, keyword searches, etc.

How has it helped my organization?

It speeds up the process, so I can meet my deadlines. At first, I was using Encase 6, thereby running recovery and processing separate.

What needs improvement?

I failed to index Microsoft Exchange Server Emails (.EDB). I think an improvement could be to support all types of email extensions and add more features on mobile data extractions (smartphones and iPhones). There are still some challenges... more»
User
Senior Systems engineer at a tech services company
Apr 18 2018

What do you think of Carbon Black Cb Defense?

Primary Use Case This product would help any organization to increase its detection and prevention with event investigations and immediate response to data infiltration.  • Improvements to My Organization Carbon Black Cb Defense improved our endpoint level security. It helped to identify endpoint and infrastructure loopholes. • Valuable Features Carbon Black Cb Defense has a nice component called Alert Triage. It has helped to detect threats across the data. It contains full details of the process execution "kill chain" and "go live" for immediate remediation. • Room for Improvement It would be a better solution if Carbon Black Cb Defense had an on-promise solution and a virus auto delete or quarantine. • Use of Solution One to three years. • Scalability Issues ...
Real User
Incident Response Analyst at a security firm with 51-200 employees
Mar 18 2018

What do you think of Carbon Black Cb Defense?

Primary Use Case The first case was in a financial institution with offices in several states which needed to increase the ability to detect and respond to threats. • Improvements to My Organization Provides visibility into the chain of attack and threats that use valid operating system processes to execute attacks. • Valuable Features The go live, because it is possible to answer incidents while they are still occurring and minimize the effects. • Room for Improvement Needs improvement in the area of infrastructure for on-premise installation. • Use of Solution One to three years. • Stability Issues No issues. • Scalability Issues No issues. • Customer Service and Technical Support Technical support is high level. • Previous Solutions No previous...
Real User
Co-Founder & CEO at a marketing services firm with 1-10 employees
Nov 01 2017

What do you think of SECDO Platform ?

Valuable Features Full endpoint visibility Records everything! Every endpoint. IOC/BIOC rules It basically automates the entire alert investigation process. • Improvements to My Organization We used to get hundreds of false positives a day. Now, we only deal with real alerts. • Room for Improvement I cannot think of any, as the front end is impressive. Maybe the notifications setting could use a simpler setting. • Use of Solution Four months. • Deployment Issues Not really, cloud-based has its advantages. Endpoint agents are easily deployed. • Stability Issues Not yet. • Scalability Issues Not really, SaaS has its advantages. • Customer Service and Technical Support Customer Service: Great, they have a really nice staff. Technical Support: ...
SentinelOne
Real User
Business Development at a tech services company
Sep 27 2017

What do you think of SentinelOne?

Valuable Features The rollback functionality. Its capacity to prevent new threats. • Improvements to My Organization We have been protecting more than 100 companies (with no infections) since the product was installed. • Room for Improvement The management console. • Use of Solution Nine months. • Stability Issues No. • Scalability Issues No. • Customer Service and Technical Support Very fast and accurate. • Previous Solutions Yes, Kaspersky Lab. They don't have a good next gen endpoint in order to protect against new threats. • Initial Setup Very easy. You can start your deploy with a single executable file or a massive deployment (GPO, etc.) with a MSI. • Pricing, Setup Cost and Licensing The price is competitive, if you compare it with...
Real User
Information Security Analyst at a tech services company with 10,001+ employees
May 31 2018

What do you think of Guidance Software EnCase?

Improvements to My Organization The tool improves the results of data recovery cases. • Valuable Features Data Recovery: Its ability to repair damaged partitions and uncover hidden partitions from within the tool, and allow further analysis. • Room for Improvement Ease of use and learning curve need improvement. • Use of Solution One to three years. • Stability Issues We encountered stability issues just as one encounters with all commercially available forensic tools. • Initial Setup The initial setup was very straightforward. • Other Solutions Considered We use many other forensics tools like AccessData FTK, Magnet Axiom, and X-Ways. • Other Advice Consider this tool if you do a lot of data recovery and plan to implement EnCase Endpoint.
Consultant
Manager Projects at a tech services company with 10,001+ employees
Jun 30 2017

What do you think of Cybereason Deep Detect & Respond?

Valuable Features Malop analysis and the detection part are the most valuable features. • Room for Improvement Technical support needs to improve. • Use of Solution I have used this solution for around six months. • Customer Service and Technical Support The technical support team is overall good and co-operative. • Initial Setup The setup is straightforward, provided you have the required infrastructure support as prerequisites. • Pricing, Setup Cost and Licensing It’s a good product, so you can go for it. • Other Advice Please go for it as this is an efficient product in the cyber security space.

Have A Question About Endpoint Detection and Response?

Our experts can help. 279,075 professionals have used our research on 6,309 solutions.

Sign Up with Email