Cybereason Endpoint Detection & Response Primary Use Case

JB
Director of Learning and Development at ACA - Ateliers de conversation anglaise

It detects and flags malware and other attacks. We also have MDR services completely managed by Cybereason. They look into any threats, give recommendations, and analyze what's happening in our system.

View full review »
AtulChaurasia - PeerSpot reviewer
Operational Technical Security at Metro Bank

We use Cybereason Endpoint Detection & Response to scan and detect unusual processes and malicious files on the endpoint.

View full review »
Chad Kliewer - PeerSpot reviewer
Information Security Officer at PTCI

My use case for this solution is multipronged. First of all, I use this solution to provide the traditional signature-based antivirus to all my endpoints on different operating systems. The second part is to get the additional protection from the behavioral learning and behavioral predictions.

Threat hunting is not something that we have done much of in the past. Therefore, Cybereason has enabled us to do threat hunting efficiently.

View full review »
Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
MT
Senior Security Engineer at a financial services firm with 1,001-5,000 employees

It's an endpoint in EDR, so our primary use case is for threat detection and remediation for Linux, Windows, and Mac.

View full review »
Abhinav Srivastava - PeerSpot reviewer
Senior Project Executive at Hitachi

We faced a few imminent threats, so we used Cybereason Endpoint Detection & Response. Last year, we had Apache due to SB vulnerability, then we also had a few ransomware attacks, so it was quite helpful for us to have a tool such as Cybereason Endpoint Detection & Response in place because the attacks weren't able to get through. We also have another tool which sends out the logs from our firewall on the antivirus on our server, and those logs are stored on a particular Splunk server, so that's an additional security that we have.

View full review »
DH
Information Security Analyst at a comms service provider with 51-200 employees

Some of our users are in threat hunting. We use it to protect a really diverse environment, including Macs, Windows, Linux, Android, and iOS. So, our primary use for it is endpoint protection. We are protecting around 1,200 endpoints.

View full review »
FP
Senior Project Manager at a transportation company with 10,001+ employees

We primarily use the solution for security purposes.

View full review »
it_user821649 - PeerSpot reviewer
Global IT Project Manager at a manufacturing company with 10,001+ employees

The primary use case of this solution is for Windows 10 platforms, any kind of Windows 10 platform, desktop edition, and some Windows servers for monitoring and protection.

View full review »
NL
Information Security Administrator at a insurance company with 1,001-5,000 employees

We use Cybereason for endpoint detection, response, and protection.

View full review »
Ibrahim Karam - PeerSpot reviewer
Pre-Sales Consultant | Palo Alto Networks. at StarLink - Trusted Security Advisor

The use cases vary. A lot of it depends on customer requirements and the customer environment. It’s tricky to pin down universal use cases.

View full review »
MB
Security Analyst at a manufacturing company with 1,001-5,000 employees

We are a big organization and it is very critical to manage security. So, we mostly we are identifying the suspicious problems we saw running in the system.

View full review »
TA
Systems Engineer at a tech services company with 11-50 employees

We are a solution provider and we deal with three different vendors to supply security products for our customers. One of the products that we implement for them is Cybereason Endpoint Detection & Response.

It is used for endpoint protection, in general, and monitoring the endpoint. Those asking for EDR usually have a security operations center (SOC). They just want to see the dashboard, the incidents, and whether something has happened on the endpoint.

View full review »
DS
Security Specialist at a tech services company with 201-500 employees

The primary use case is endpoint protection and production.

View full review »
it_user1098648 - PeerSpot reviewer
Technical Consultant at Revel Tech Security Sdn Bhd

Our company, as a distributor of the solution, looks into a few criteria that highlight the value of the solution. An important example is the deep hunting threat mechanisms that Cybereason has to offer.

One of the distinctions between Cybereason and many other vendors is that you are able to search easily through various parameters, such as machine ID, user ID, and malicious files.

View full review »
Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.