Awake Security Platform Reviews

Filter by:
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
Kristofer-Laxdal
Real User
Director of Information Security at a computer software company with 201-500 employees
Feb 03 2020

What is most valuable?

What is impressive about the tool is the time to value. Plugging it onto our network, we have found things that other tools have just never seen. We found those issues… more »

How has it helped my organization?

It is all about visibility. From an information security standpoint, the capability for the team to be able to single out devices to respond quickly and intelligently, to… more »

What needs improvement?

The only issue is that Awake affords you so much information behind its fingerprinting capability. When it does trigger, you need to have a hard look at what is going on… more »

What's my experience with pricing, setup cost, and licensing?

I signed a three-year deal as it was most cost effective for my firm - with no doubt in my mind we will see ROI in year one. I am hoping to involve them in a managed… more »

Which solution did I use previously and why did I switch?

Before having Awake, we didn't have the visibility. I could get a lot of the north-south traffic and understand what was emanating, ingressing, and egressing in the… more »

What other advice do I have?

Understand where your network points are and where you are best served to position sensors. The tool won't work unless it's positioned effectively in your network. Rely… more »

Which other solutions did I evaluate?

I am impressed with the data science capabilities of Awake, in regards to AI and ML capabilities built into the tool. We stacked up Awake against a competitor. I put both… more »
John Chesson
Real User
Chief Security Officer
May 14 2019

What is most valuable?

The most valuable feature is the ability to see suspicious activity for devices inside my network. It helps me to quickly identify that activity and do analysis to see if it's expected or I need to… more »

How has it helped my organization?

The way their algorithm works, they have a threat model that brings up the most concerning activities, pretty much like an analyst who is very knowledgeable. On a tier level, a Tier 4 analyst would… more »

What needs improvement?

There's room for improvement with some of the definitions, because I don't have time and I'm not a Tier 4 analyst. I believe that is something they're working towards. They're working with me to add… more »

Which solution did I use previously and why did I switch?

At this company, we did not have a previous solution, but I've used other systems, SIEMs for looking outward-in, like QRadar. That was our system at my previous company. The challenge I saw with… more »

What other advice do I have?

My advice would certainly be to do a PoC to make sure it works in your environment. The way your network is configured is going to have a big impact on whether this tool works for you. If you can't… more »

Which other solutions did I evaluate?

The other options were very expensive. Most of them were deploying endpoint agents, which was something I didn't really want to do, just yet. Endpoint agents usually help you off-prem, but I was more… more »
Learn what your peers think about Awake Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
437,208 professionals have used our research since 2012.
Eric Etherington
Real User
Chief Information Security Officer at Dolby Laboratories
Jul 26 2020

What is most valuable?

We definitely have machines that might not lend themselves to having endpoint security agents on them, either because they can't support an agent or they're testing devices that have very critical configurations that an agent might have a… more »

How has it helped my organization?

The most valuable aspect for us is that we have a small team, so when we bring in new security solutions, it's really important that they're tuned well because there are only so many alerts that we're going to be able to deal with. If we… more »

What needs improvement?

It's important that Awake continues to develop its APIs to be able to help intertwine their product into the overall security architecture of a company, just because it is a single tool. Likely a company will have a number of tools in place… more »

Which solution did I use previously and why did I switch?

We had done a proof of concept with Darktrace for a number of months before Awake. There were a lot of issues with false positives, meaning, there were a lot of alerts coming from the system that when we looked at them, we could tell that… more »

What other advice do I have?

The piece that people should be considering should be how much storage they want for data in the platform and how long they need to retain data for. It's not sitting in the middle of network traffic but for incidents that come up or alerts… more »
Vendor
Head of Cyber Threat Operations at a energy/utilities company with 1,001-5,000 employees
Oct 31 2019

What is most valuable?

There are quite a few valuable features. The most valuable aspect of the tech is the fact that it's like a "force-multiplier." It will reduce the amount of time and effort it takes to triage a… more »

How has it helped my organization?

We had an event where an attacker tried to steal login credentials. We were able to find the targets on the network using Awake and we were able to turn on multifactor authentication, not only for… more »

What needs improvement?

I would like to see a bit more in terms of encrypted traffic. With the advent of programs that live off the land, a smart attacker is going to leverage encryption to execute their operation. So I… more »

Which solution did I use previously and why did I switch?

We used a SIEM, through IBM. But we're actually using Awake more than we're using QRadar, our SIEM.

What other advice do I have?

My advice would be to put it up against any of its competitors. Look at the salient data points. So your machine-learning is telling you that something is unusual. Great. Why? And if you don't have an… more »

Which other solutions did I evaluate?

I looked at Netwitness and Darktrace. Neither of them was as capable. The primary reason we went with Awake Security was the fact that the machine-learning was working at a different level. It was… more »
Dwayne Samson
Real User
Senior Analyst Security and Compliance at a insurance company with 5,001-10,000 employees
Jul 23 2020

What is most valuable?

Awake Labs managed network detection and response (MNDR) service is its most valuable feature. The Awake Security team find incidents that we didn't realize were happening… more »

How has it helped my organization?

Open communication with the MNDR service has driven down the number of false positives. The current average is five events a week, where four are actionable. The direction… more »

What needs improvement?

Awake Security markets themselves as a security shop, and that's what they are. However, compliance with our partnership can enhance its capabilities. Awake Security needs… more »

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing are competitive. Awake Security was the least expensive among their competitors. Everyone was within $15,000 of each other. The other solutions… more »

Which solution did I use previously and why did I switch?

We are a start-up company, established within the last two years. We had a bake-off of three AI based network visibility tools, and Awake Security was our selection.

What other advice do I have?

The Awake Security team does a good job with communication. With the encrypted traffic, you can't see inside the packet. Encrypted traffic was not a hindrance, since most… more »

Which other solutions did I evaluate?

The original project driver was network visibility, as we didn't have any. We brought in Darktrace, Stealthwatch, and Awake Security for a bake-off. Awake Security filled… more »
Real User
Associate Director, Cyber & Information Security at a insurance company with 1,001-5,000 employees
May 06 2020

What is most valuable?

The portion that I use the most is the Adversarial Modeling trend. This threat graphing is probably the most useful feature that we have right now. It displays the data that Awake collects, displaying… more »

How has it helped my organization?

From a compliance standpoint, we were able to easily identify some security weaknesses built into our systems from an architectural standpoint. We were able to quickly remediate these, e.g., some… more »

What needs improvement?

Some of the searching capability is a bit hard to use without in-depth knowledge. In one of the earlier versions, there was a tool that helped you build some of your searches and help you correlate… more »

Which solution did I use previously and why did I switch?

We previously had NetMon, which was a product from LogRhythm. First off, there were a lot of hardware issues along with a lot of sizing and scoping constraints provided to us by LogRhythm that just… more »

What other advice do I have?

We have not used the functionality for cloud TAPs. I would rate this solution as a nine (out of 10).

Which other solutions did I evaluate?

We evaluated Darktrace. We got more valuable data from Awake than we actually got from Darktrace. As far as I'm concerned, Darktrace was a 100 percent false positives after doing Awake. After doing a… more »
Rick Pennington
Real User
Senior Security Engineer at a pharma/biotech company with 1,001-5,000 employees
Sep 11 2019

What is most valuable?

* I really enjoy the query language on it. It makes it very easy. * The dashboards and displays are very intuitive. The query language makes it easy to query the records… more »

How has it helped my organization?

We had an incident that involved a phishing email that came in. We were able to use Awake Security to detect everybody on the network who actually went to the website… more »

What needs improvement?

I enjoy the query language, but it could be a bit more user-friendly, especially for new users who come across it. I'm conversant with the query language, but if I put it… more »

What's my experience with pricing, setup cost, and licensing?

The pricing model is an annual subscription. There are no costs in addition to the standard licensing fees.

Which solution did I use previously and why did I switch?

We did not have a previous solution.

What other advice do I have?

Make sure that you have a strong networking team in place before you buy the product, because otherwise you may have issues with the TAP aggregation. The product itself… more »

Which other solutions did I evaluate?

We evaluated ExtraHop. There were two reasons we went with Awake Security. First, we really liked the artificial intelligence aspect of Awake with its behavioral modeling… more »

Articles

User Assessments By Topic About Awake Security Platform

Learn what your peers think about Awake Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
437,208 professionals have used our research since 2012.

Awake Security Platform Questions

What is Awake Security Platform?

Awake Security is the only advanced network traffic analysis company that delivers a privacy-aware solution capable of detecting and visualizing behavioral, mal-intent and compliance incidents with full forensics context. Powered by Ava, Awake’s security expert system, the Awake Security Platform combines federated machine learning, threat intelligence and human expertise. The platform analyzes billions of communications to autonomously discover, profile and classify every device, user and application on any network. Through automated hunting and investigation, Awake uncovers malicious intent from insiders and external attackers alike. The company is ranked #1 for time to value because of its frictionless approach that delivers answers rather than alerts.

Also known as
Awake
Awake Security Platform customers

Coming Soon...

Highlights
The most valuable feature is the ability to see suspicious activity for devices inside my network. It helps me to quickly identify that activity and do analysis to see if it's expected or I need to mitigate that activity quickly.
The query language makes it easy to query the records on the network, to do searches for the various threat activities that we're looking for. The dashboard, the Security Knowledge Graph, displays information meaningfully and easily. I am able to find the information that I want to find pretty quickly.
Other solutions will say, "Hey, this device is doing something weird." But they don't aggregate that data point with other data points. With Awake you have what's called a "fact pattern." For example, if there's a smart toaster on the third floor that is beaconing out to an IP address in North Korea, sure that's bizarre. But if that toaster was made in North Korea it's not bizarre. Taking those two data points together, and automating something using machine-learning is something that no other solution is doing right now.
This solution’s encrypted traffic analysis helps us stay in compliance with government regulations. It is all about understanding data exfiltration, what is ingressing and egressing in our network. One common attack vector is exfiltrating data using encryption. My capabilities to see potential data exfiltration over encrypted traffic is second to none now.
This solution help us monitor devices used on our network by insiders, contractors, partners, or suppliers. Its correlation and identification of specific endpoints is very good, especially since we have a large, virtualized environment. It discerns this fairly well. Some of the issues that we have had with other tools is we sometimes are not able to tell the difference between users on some of those virtualized instances.
The security knowledge graph has been very helpful in the sense that whenever you try a new security solution, especially one that's in the detection and response market, you're always worried about getting a lot of false positives or getting too many alerts and not being able to pick out the good from the bad or things that are actual security incidents versus normal day to day operations. We've been pleasantly surprised that Awake does a really good job of only alerting about things that we actually want to look into and understand. They do a good job of understanding normal operations out-of-the-box.
We appreciate the value of the AML (structured query language). We receive security intel feeds for a specific type of malware or ransomware. AML queries looking for the activity is applied in almost real-time. Ultimately, this determines if the activity was not observed on the network.
See more »
BUYER'S GUIDE
Download our free Awake Security Platform Report and get advice and tips from experienced pros sharing their opinions.