Microsoft Defender for Endpoint is a comprehensive security solution that provides advanced threat protection for organizations. It offers real-time protection against various types of cyber threats, including malware, viruses, ransomware, and phishing attacks.
The product is free of charge and comes integrated into Windows.
The solution is free.
The product is free of charge and comes integrated into Windows.
The solution is free.
Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.
Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune.
Microsoft Intune is a cost effective choice. It is less expensive than other products on the market.
Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune.
Microsoft Intune is a cost effective choice. It is less expensive than other products on the market.
Microsoft Entra ID, previously known as Azure AD (Active Directory), is Microsoft's cloud-based identity and access management (IAM) solution. Designed to help organizations of all sizes manage user identities and create an intelligent security perimeter around their cloud and on-premise resources. Microsoft Entra ID or Azure AD is integral to the Microsoft 365 and Azure ecosystems. It provides a robust set of capabilities to manage users and groups and secure access to applications in a centralized, streamlined manner.
Microsoft Entra ID (Azure AD) is a login system, morphing into a sophisticated identity and access management (IAM) solution for the modern, hybrid workplace. Imagine a single vault for all your digital keys – that's the essence of Entra ID's identity management. It acts as a central repository for user identities, encompassing usernames, passwords, and even additional attributes like department or employee role.
These capabilities enabled simplified administration using a unified platform for adding, modifying, and deleting user accounts. Users no longer need to remember login credentials for a plethora of applications. Entra ID streamlines access by using the same identity across various cloud services and on-premises resources (if integrated). Centralized identity management allows for stricter enforcement of security policies and password complexity requirements across the organization.
Authentication sits at the heart of the solution, ensuring only authorized users gain access to sensitive resources. It employs a multi-pronged approach:
For organizations with on-premises infrastructure, Microsoft Entra ID (Azure AD) offers hybrid identity options. This allows for a smooth integration between on-premises Active Directory and Entra ID, providing a consistent identity for users across both environments. It enables organizations to leverage their existing investments in on-premises infrastructure while taking advantage of cloud scalability and flexibility.
In conclusion, Microsoft Entra ID (Azure AD) is a comprehensive IAM solution that addresses the complex challenges of managing and securing identities in a cloud-centric world. Its blend of ease of use, security, and integration capabilities makes it an essential component of modern IT infrastructure, supporting both operational efficiency and strategic business objectives.
The licensing cost is a bit prohibitive.
Licensing is easy.
The licensing cost is a bit prohibitive.
Licensing is easy.
Microsoft Sentinel is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR) solution that lets you see and stop threats before they cause harm. Microsoft Sentinel delivers intelligent security analytics and threat intelligence across the enterprise, providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. With Microsoft Sentinel, you can:
It comes with a Microsoft subscription which the customer has, so they don't have to invest somewhere else.
The licensing requirements are not very clear from the outset.
It comes with a Microsoft subscription which the customer has, so they don't have to invest somewhere else.
The licensing requirements are not very clear from the outset.
Microsoft Azure Key Vault is a cloud-based data security and storage service that allows users to keep their secrets safe from bad actors.
The cost of the Azure Key Vault is very high and the pricing model is based on the number of keys that you store and retrieve.
Pricing is quite reasonable and support is included, although premium support is available for an additional fee.
The cost of the Azure Key Vault is very high and the pricing model is based on the number of keys that you store and retrieve.
Pricing is quite reasonable and support is included, although premium support is available for an additional fee.
Azure Firewall is a user-friendly, intuitive, cloud-native firewall security solution that provides top-of-the-industry threat protection for all your Azure Virtual Network resources. Azure Firewall is constantly and thoroughly analyzing all traffic and data packets, making it a very valuable and secure fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. Azure Firewall allows users to create virtual IP addresses and provides for secure DDoS protection for the virtual machines on your network. It also provides fast and efficient east-west and north-south traffic security.
Azure Firewall is a managed, cloud-based network security service built to protect your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
Azure Firewall is quite an expensive product.
The licensing module is good.
Azure Firewall is quite an expensive product.
The licensing module is good.
Microsoft Defender XDR is a comprehensive security solution that helps organizations manage devices and vendor security compliance.
Its primary use case includes email filtering, vulnerability management, and detecting threats launched via emails. The solution offers advanced threat-hunting capabilities, integration with other Microsoft products, centralized management, automation features, and comprehensive threat protection.
It improves visibility, automates routine tasks, and provides threat intelligence and compliance management. Microsoft Defender XDR is praised for its advanced capabilities, ease of use, and integration with other Microsoft products.
It has proven to be a comprehensive and effective security solution for organizations.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
The solutions price is fair for what they offer.
The price of the solution is high compared to others and we have lost some customers because of it.
Microsoft Defender for Cloud Apps is a comprehensive security solution that provides protection for cloud-based applications and services. It offers real-time threat detection and response, as well as advanced analytics and reporting capabilities. With Defender for Cloud Apps, organizations can ensure the security of their cloud environments and safeguard against cyber threats. Whether you're running SaaS applications, IaaS workloads, or PaaS services, Microsoft Defender for Cloud Apps can help you secure your cloud environment and protect your business from cyber threats.
We have an educational licensing agreement. It's a customer agreement for multiple years.
This product is not expensive.
We have an educational licensing agreement. It's a customer agreement for multiple years.
This product is not expensive.
Forcepoint Data Loss Prevention (DLP) is a data loss prevention tool that protects users from advanced threats and data breaches. Forcepoint DLP’s technologies can quickly identify and protect sensitive data and provide insight and awareness into attacks on endpoint devices both on and off the network.
It's not the cheapest solution but it's not the most expensive. It's a good price for a good product.
The pricing and licensing are okay.
It's not the cheapest solution but it's not the most expensive. It's a good price for a good product.
The pricing and licensing are okay.
Digital Guardian is proud to be part of Fortra’s comprehensive cybersecurity portfolio, and one of the Data Protection family of products. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Digital Guardian and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.
The cost was around $300,000.
The price of Digital Guardian is expensive.
The cost was around $300,000.
The price of Digital Guardian is expensive.
Microsoft Purview Data Loss Prevention (DLP) and Symantec DLP are data security solutions helping prevent sensitive data leaks. Both offer tiered licensing based on features and deployment options, and ROI depends on implementation complexity and prevented data leaks. Purview's tighter Microsoft integration can lead to faster value realization, while Symantec might offer better ROI for complex environments.
Content Aware Protection
Scanning data in motion
Monitor, control and block file transfers. Detailed control through both content and context inspection.
This is a budget-friendly solution that covers all the aspects of host-level DLP.
The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.
This is a budget-friendly solution that covers all the aspects of host-level DLP.
The price of Endpoint Protector by CoSoSys is more or less the same as other competing solutions.
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
They were the best solution and surprisingly enough, the cheapest.
It is 100% worth the cost to get and keep the support, especially when setting it up.
They were the best solution and surprisingly enough, the cheapest.
It is 100% worth the cost to get and keep the support, especially when setting it up.
Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud-first world. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100% cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances or hybrid solutions are unable to match. Used in more than 185 countries, Zscaler operates the world’s largest cloud security platform, protecting thousands of enterprises and government agencies from cyberattacks and data loss.
It is an auto-renewal subscription service.
The licensing model for Zscaler Cloud DLP allows you to only buy what you need. You don't need to buy it as a whole, so it's good.
It is an auto-renewal subscription service.
The licensing model for Zscaler Cloud DLP allows you to only buy what you need. You don't need to buy it as a whole, so it's good.
GitGuardian helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code configurations.
It's a little bit expensive.
The pricing and licensing are fair. It isn't very expensive and it's good value.
It's a little bit expensive.
The pricing and licensing are fair. It isn't very expensive and it's good value.
Implement Microsoft Information Protection (MIP) to help you discover, classify, and protect sensitive information wherever it lives or travels.
The solution's price varies since Microsoft comes with bundled resources.
The price is determined by the enterprise licensing, either the E3 or E5 licensing or the EMS plus security and other feature licensing.
The solution's price varies since Microsoft comes with bundled resources.
The price is determined by the enterprise licensing, either the E3 or E5 licensing or the EMS plus security and other feature licensing.
Discover, classify, analyze, and protect data intuitively with a seamless user experience. Stop threats and stay compliant with regulations and industry standards.
Customers need to pay for a yearly license per device.
The pricing for ESET Safetica is less as compared to other solutions. The customers have to pay only for the license.
Customers need to pay for a yearly license per device.
The pricing for ESET Safetica is less as compared to other solutions. The customers have to pay only for the license.
The pricing seems expensive both for the license and the support.
The price is high for this type of product.
The pricing seems expensive both for the license and the support.
The price is high for this type of product.
Cloud-Delivered Data Protection: The industry’s first cloud-delivered Enterprise DLP that consistently protects sensitive data across all networks, clouds and users.
It's expensive.
Palo Alto Networks Enterprise Data Loss Prevention is expensive, and licensing costs are monthly.
It's expensive.
Palo Alto Networks Enterprise Data Loss Prevention is expensive, and licensing costs are monthly.
Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS. Amazon Macie recognizes sensitive data such as personally identifiable information (PII) or intellectual property, and provides you with dashboards and alerts that give visibility into how this data is being accessed or moved. The fully managed service continuously monitors data access activity for anomalies, and generates detailed alerts when it detects risk of unauthorized access or inadvertent data leaks. Amazon Macie is available to protect data stored in Amazon S3.
You need to pay per usage.
You need to pay per usage.
Its price is very reasonable and competitive.
When comparing GTB Technologies Inspector to other solutions you receive a good value for your money when considering all the features and benefits.
Its price is very reasonable and competitive.
When comparing GTB Technologies Inspector to other solutions you receive a good value for your money when considering all the features and benefits.
Microsoft Purview Insider Risk Management utilizes more than 100 ready-to-use indicators and machine learning models to effectively detect critical security risks originating from insiders, including IP theft, data leakage, and security violations. The solution enables organizations to expedite risk mitigation through enriched investigation tools and Adaptive Protection, which automatically enforces protection controls. Built with privacy by design, users are pseudonymized by default, and role-based access controls and audit logs are in place to help ensure user-level privacy.
Communication Compliance is an insider risk solution in Microsoft 365 that helps minimize communication risks by helping you detect, capture, and act on inappropriate messages in your organization. Pre-defined and custom policies allow you to scan internal and external communications for policy matches so they can be examined by designated reviewers. Reviewers can investigate scanned email, Microsoft Teams, Yammer, or third-party communications in your organization and take appropriate actions to make sure they're compliant with your organization's message standards.
Trellix DLP is the ultimate data loss prevention (DLP) solution, safeguarding organizations' sensitive data from unauthorized access, disclosure, or alteration. This robust system monitors and regulates data flows across networks, emails, and the web, identifying and shielding various data types such as financial, personal, intellectual property, and regulated data. Employing encryption, access control, DLP policies, and monitoring, it secures data both at rest and in transit, ensuring compliance with data security regulations and industry standards. With customizable deployment options, including on-premises, cloud-based, and hybrid, Trellix DLP offers comprehensive protection and rapid response to data loss incidents.
The pricing depends on the number of users in a company.
The pricing depends on the number of users in a company.
Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before.
Data lineage is a technology that’s only available from Cyberhaven. It tracks data from its origin and everywhere it goes, providing the context we use to identify what data is important.
Data Detection and Response combines the functionality of traditional data security tools in a way that doesn't just simplify management, but is more effective than the sum of its parts.
Prevent accidental data loss caused by human error on email with Tessian Guardian.
Proofpoint Enterprise Data Loss Prevention brings together our market-leading DLP solutions for email, cloud and endpoint. It combines content, behavior and threat telemetry from these channels. This allows you to address the full spectrum of people-centric data-loss scenarios comprehensively.
Cloud DLP gives you the power to scan, discover, classify, and report on data from virtually anywhere. Cloud DLP has built-in support for scanning and classifying sensitive data in Cloud Storage, BigQuery, and Datastore, and a streaming content API to enable support for additional data sources, custom workloads, and applications.