Cybereason Endpoint Detection & Response Overview

Cybereason Endpoint Detection & Response is the #12 ranked solution in our list of EDR tools. It is most often compared to CrowdStrike Falcon: Cybereason Endpoint Detection & Response vs CrowdStrike Falcon

What is Cybereason Endpoint Detection & Response?

Cybereason's Endpoint Detection and Response platform detects in real-time both signature and non-signature-based attacks and accelerates incident investigation and response. Cybereason connects together individual pieces of evidence to form a complete picture of a malicious operation.

Cybereason Endpoint Detection & Response is also known as Cybereason EDR, Cybereason Deep Detect & Respond.

Cybereason Endpoint Detection & Response Buyer's Guide

Download the Cybereason Endpoint Detection & Response Buyer's Guide including reviews and more. Updated: April 2021

Cybereason Endpoint Detection & Response Customers

Lockheed Martin, Spark Capital, DocuSign, Softbank Capital

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Manohar Baratam
Security Analyst at a manufacturing company with 1,001-5,000 employees
Real User
Oct 16, 2018
There is an instant isolation of the infected PC with this antivirus solution.

What is our primary use case?

We are a big organization and it is very critical to manage security. So, we mostly we are identifying the suspicious problems we saw running in the system.

Pros and Cons

  • "Immediately we can pick up the computers in the network if any malicious operation that is triggered."
  • "It initially took some time to deploy."

What other advice do I have?

The Cybereason learning tools are fun to use. The tutorials are helpful. There is an open onboarding and training with Cybereason.
Security Specialist at a tech services company with 201-500 employees
Real User
Top 20
Oct 9, 2018
The initial setup was easy and straightforward. It is also cost-friendly with good scalability.

What is our primary use case?

The primary use case is endpoint protection and production.

Pros and Cons

  • "It gives all the information in a clear response."
  • "The initial setup was easy and straightforward."
  • "There can be problems with the EDI."
  • "The reporting feature needs improvement."

What other advice do I have?

An organization seeking a product like this needs to evaluate its standpoint. It must decide whether it is looking for flexibility or ease of administration.
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2021.
475,705 professionals have used our research since 2012.
Manager Projects at a tech services company with 10,001+ employees
Jun 30, 2017
Malop analysis and the detection part are the most valuable features.

What is most valuable?

Malop analysis and the detection part are the most valuable features.

What needs improvement?

Technical support needs to improve.

For how long have I used the solution?

I have used this solution for around six months.

How is customer service and technical support?

The technical support team is overall good and co-operative.

How was the initial setup?

The setup is straightforward, provided you have the required infrastructure support as prerequisites.

What's my experience with pricing, setup cost, and licensing?

It’s a good product, so you can go for it.

What other advice do I have?

Please go for it as this is an efficient product in the cyber security space.
Director of Operations at a comms service provider with 10,001+ employees
Feb 16, 2015
Cybereason vs. Interset vs. SQRRL

What other advice do I have?

This is a compare and contrast relative to best of breed DLP/SIEM solutions in Garner MQ and widely deployed Differentiators Interset - further to above key differentiator of this product is focus on insider threat - by tracking file activity and correlating against user end points and risky activities (read file exfiltrations) the resulting dashboards present an organizational risk profile with actionable events prioritized by risk = probability X impact. If one supports the notion that layered security needs to focus on inside out risk instead of trying to securing the perimeter - a very…
Buyer's Guide
Download our free Cybereason Endpoint Detection & Response Report and get advice and tips from experienced pros sharing their opinions.