Threat Hunting Framework Room for Improvement

CTO at Systema Global Solusindo

The nature of the system means it has to be implemented throughout the organizations. You need to implement it on the network layer, the email layer, the web proxy layer, and also the endpoints. Nevertheless, endpoint monitoring is very challenging due to the lack of automated method to install the endpoint agents. In one of our customer case, we have about 40,000 endpoints and we need to have a simplified method of deployment if we're going to implement the endpoint monitoring effectively. Product features also need some improvement in creating custom signatures for detection because that is not open to customers. 

View full review »
Find out what your peers are saying about Group-IB, Cognyte, Intel 471 and others in Threat Intelligence Platforms. Updated: July 2021.
523,742 professionals have used our research since 2012.