Barkly Competitors and Alternatives

Read reviews of Barkly competitors and alternatives
Real User
Lead Systems Administrator at a energy/utilities company with 1,001-5,000 employees
Jun 19 2017

What do you think of Cylance?

Valuable Features Does malware analysis. Blocks WannaCry and other attacks that have come out. • Improvements to My Organization It lifted the burden on the helpdesk from having to keep computers updated with definitions and thus reduced the labor hours spent monitoring AV on endpoints. • Room for Improvement It needs real analysis of quarantined files. The EDR product isn't showing much right now. • Use of Solution We have been using this solution for one year. • Deployment Issues Some DLLs and in-house apps were quarantined. Alerting mode is the way to deploy this software for at least three weeks. • Stability Issues I did not encounter any issues with stability. • Scalability Issues I did not encounter any issues with scalability. • Customer...
IT Security Lead at a tech services company with 10,001+ employees
Dec 03 2017

What is most valuable?

* Support * Scalability * Flexibility

How has it helped my organization?

It keeps our machines up-to-date with the definitions of the current zero day attacks, which happens in real-time scenarios. It protects our data and the clients' data, which can be secured by using this product.

What needs improvement?

I am happy to say that the Symantec comes into the picture where the issues are reported from the product, it might be a product bug or it might be a product defect. The product engineer works on this and the latest upgrade has it built into... more»
Real User
Senior Financial Analyst - Data Analytics at a energy/utilities company with 1,001-5,000 employees
May 30 2018

What do you think of CrowdStrike?

Primary Use Case Primary use is for endpoint investigations. • Improvements to My Organization It allows us to determine root cause, do the analysis, a lot quicker. • Valuable Features Visibility into the endpoint rate. Understanding what processes are running on the system, what registry keys have been enabled. Pretty much understanding the whole frantic side of the endpoint. • Room for Improvement It would be nice if we could extrapolate indicators of compromise and write them within sandboxes. • Use of Solution One to three years. • Stability Issues It's fairly stable. We haven't been having too many issues with that. • Scalability Issues It scales quite well because it's cloud-based and subscription-based. It can scale pretty quickly. • Customer...

Sign Up with Email