Cybereason Endpoint Detection & Response Valuable Features

Anonymous
Technical Consultant
The sensors run within the endpoints, where it is lightweight and runs seamlessly in the background. It does not disrupt the work or activities of the end users, yet is able to detect almost any malicious activity running on the spot. Adding to that, features like the canary files work like bait to any lateral movement case, where the threat actor is lured to "touch" those files. This, in turn, triggers the Malop engine, and immediately sends the alert to the SOC team to take action. View full review »
Manohar Baratam
Security Analyst at a manufacturing company with 1,001-5,000 employees
The most valuable feature is the antivirus and instant isolation of the PC to gather the malicious. We are updating the hash file and unknown hash file to block it. With Cybereason, we can never fail any business type because of the antivirus detection. That's one thing we can commend the product for. Also, it's subduing menial processes. Like when we are doing any manual job the first process was launched on the last year so it's still wanting to process any linked or not. It's got a really clear intel lifecycle. It will detect anything that can be malicious, from build ups and videos to anything that can be viruses and some malware. Like communicating to the malicious websites. So such logs shows such clear cut review and what it shows like what are the hosting packets. Immediately we can pick up the computers in the network if any malicious operation that is triggered. View full review »
Security01c2
Security Specialist at a tech services company with 201-500 employees
I found the features of this console to be good. In the chain of actions, if I click on something, it will provide more options for other things. In addition, it gives all the information in a clear response. These functionalities are quite good and impressive. View full review »
Find out what your peers are saying about Cybereason, CrowdStrike, Carbon Black and others in Endpoint Detection and Response. Updated: November 2019.
382,399 professionals have used our research since 2012.
Sign Up with Email