1. leader badge
    The EDR and reports were helpful in improving our organization.It is stable and easy to set up.
  2. The detection response and quarantining are very good features.The most valuable feature is its ability to seek out abnormal activity and to create alerts.
  3. Find out what your peers are saying about Carbon Black, FireEye, Proofpoint and others in Security Incident Response. Updated: January 2021.
    454,950 professionals have used our research since 2012.
  4. The product offers very strong automation. Our cyber security analysts don't have to correlate the information to detect problems. They only need to analyze problems that have been identified by the platform.
  5. It has reduced our manual efforts to remove emails from each user's inbox, and in this case we do not have to ask our IT department or users to do so.
  6. It's really simple and has a flexible interface.Its flexibility is the most valuable.
  7. The ease of deployment is a valuable feature. It basically automates the entire alert investigation process.
  8. report
    Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
    454,950 professionals have used our research since 2012.

Advice From The Community

Read answers to top Security Incident Response questions. 454,950 professionals have gotten help from our community of experts.
Rony_Sklar
How does a business prepare effectively for responding to data breaches? What protocols should they have in place?
author avatarITSecuri7cfd (IT Security Coordinator at a healthcare company with 10,001+ employees)
Real User

There could be multiple answers to your question based on how your environment is set up. You have edge defense (firewalls, IDS, IPS like ngfw palos and fidelis), you have endpoint like av or edr (sentinel 1 or symantec or carbon black etc). There are also various other tools out there that are apt or malware finders and ones that look at log sources..then on tracking incidents you have the servicenow /remedy side..

author avatarDr Trust Tshepo Mapoka
Reseller

Incident Response Plan or Workflow
Incident Classification and Prioritisation book
The right People Process and Technology
The Playbook
Efficient SOC strategy

author avatarSteve Pender
Reseller

As the appropriate policy may vary depending on the country, business size and sector, please contact me directly at cybersec@global.co.za to provide me with your country, time zone and Skype and/or WhatsApp contact details and I’ll be happy to discuss the subject.

See more Security Incident Response questions »
Find out what your peers are saying about Carbon Black, FireEye, Proofpoint and others in Security Incident Response. Updated: January 2021.
454,950 professionals have used our research since 2012.