How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use the solution for the contamination. We detect the incidents and then proceed for the contamination and error notification. For example, there's some intrusion history to the endpoint and there's a partial command that detects the code imbalance. We're able to find it and deal with it.
We've been using this solution for three years now for endpoint detection and response.
We are using it as a SIEM tool.
It is mainly for market analysis. It has been performing exceedingly well.