Threat Hunting Framework Room for Improvement

JR
CTO at systema

The nature of the system means it has to be implemented throughout the organizations. You need to implement it on the network layer, the email layer, the web proxy layer, and also the endpoints. Nevertheless, endpoint monitoring is very challenging due to the lack of automated method to install the endpoint agents. In one of our customer case, we have about 40,000 endpoints and we need to have a simplified method of deployment if we're going to implement the endpoint monitoring effectively. Product features also need some improvement in creating custom signatures for detection because that is not open to customers. 

View full review »
Buyer's Guide
Threat Intelligence Platforms
April 2024
Find out what your peers are saying about Group-IB, Cognyte, DomainTools and others in Threat Intelligence Platforms. Updated: April 2024.
768,740 professionals have used our research since 2012.