Cybereason Endpoint Detection & Response Primary Use Case
JB
Johnson Bresnick
Director of Learning and Development at ACA - Ateliers de conversation anglaise
It detects and flags malware and other attacks. We also have MDR services completely managed by Cybereason. They look into any threats, give recommendations, and analyze what's happening in our system.
View full review »We use Cybereason Endpoint Detection & Response to scan and detect unusual processes and malicious files on the endpoint.
View full review »My use case for this solution is multipronged. First of all, I use this solution to provide the traditional signature-based antivirus to all my endpoints on different operating systems. The second part is to get the additional protection from the behavioral learning and behavioral predictions.
Threat hunting is not something that we have done much of in the past. Therefore, Cybereason has enabled us to do threat hunting efficiently.
View full review »Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.
MT
reviewer1678386
Senior Security Engineer at a financial services firm with 1,001-5,000 employees
It's an endpoint in EDR, so our primary use case is for threat detection and remediation for Linux, Windows, and Mac.
We faced a few imminent threats, so we used Cybereason Endpoint Detection & Response. Last year, we had Apache due to SB vulnerability, then we also had a few ransomware attacks, so it was quite helpful for us to have a tool such as Cybereason Endpoint Detection & Response in place because the attacks weren't able to get through. We also have another tool which sends out the logs from our firewall on the antivirus on our server, and those logs are stored on a particular Splunk server, so that's an additional security that we have.
View full review »DH
DanielHernandez
Information Security Analyst at a comms service provider with 51-200 employees
Some of our users are in threat hunting. We use it to protect a really diverse environment, including Macs, Windows, Linux, Android, and iOS. So, our primary use for it is endpoint protection. We are protecting around 1,200 endpoints.
View full review »FP
Anonymous__
Senior Project Manager at a transportation company with 10,001+ employees
We primarily use the solution for security purposes.
View full review »The primary use case of this solution is for Windows 10 platforms, any kind of Windows 10 platform, desktop edition, and some Windows servers for monitoring and protection.
NL
Nick LaPointe
Information Security Administrator at a insurance company with 1,001-5,000 employees
We use Cybereason for endpoint detection, response, and protection.
View full review »The use cases vary. A lot of it depends on customer requirements and the customer environment. It’s tricky to pin down universal use cases.
View full review »MB
Manohar Baratam
Security Analyst at a manufacturing company with 1,001-5,000 employees
We are a big organization and it is very critical to manage security. So, we mostly we are identifying the suspicious problems we saw running in the system.
View full review »TA
reviewer1319712
Systems Engineer at a tech services company with 11-50 employees
We are a solution provider and we deal with three different vendors to supply security products for our customers. One of the products that we implement for them is Cybereason Endpoint Detection & Response.
It is used for endpoint protection, in general, and monitoring the endpoint. Those asking for EDR usually have a security operations center (SOC). They just want to see the dashboard, the incidents, and whether something has happened on the endpoint.
View full review »DS
Security01c2
Security Specialist at a tech services company with 201-500 employees
The primary use case is endpoint protection and production.
View full review »Our company, as a distributor of the solution, looks into a few criteria that highlight the value of the solution. An important example is the deep hunting threat mechanisms that Cybereason has to offer.
One of the distinctions between Cybereason and many other vendors is that you are able to search easily through various parameters, such as machine ID, user ID, and malicious files.
View full review »Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,415 professionals have used our research since 2012.