We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Earn 20 points
To address advanced malware, the Hillstone Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.
The Hillstone Cloud Sandbox is comprised of three modules: Static Analysis, Behavioral Analysis and Cloud Intelligence. The three modules work together to ensure the efficiency and efficacy of malicious files detection.
Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. With Microsoft Defender for Identity, you can:
- Monitor users, entity behavior, and activities with learning-based analytics
- Protect user identities and credentials stored in Active Directory
- Identify and investigate suspicious user activities and advanced attacks throughout the kill chain
- Provide clear incident information on a simple timeline for fast triage
To learn more about our solution, ask questions, and share feedback, join our Microsoft Defender for Identity Community.
Hillstone Cloud Sandbox is ranked 20th in Advanced Threat Protection while Microsoft Defender for Identity is ranked 13th in Advanced Threat Protection with 1 review. Hillstone Cloud Sandbox is rated 0.0, while Microsoft Defender for Identity is rated 9.0. On the other hand, the top reviewer of Microsoft Defender for Identity writes "Identifies, detects, and investigates advanced threats". Hillstone Cloud Sandbox is most compared with Palo Alto Networks WildFire and Cisco Stealthwatch, whereas Microsoft Defender for Identity is most compared with Microsoft Defender for Office 365 and Palo Alto Networks WildFire.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.