2018-07-04T06:10:00Z

What is your primary use case for NetWitness XDR?

Julia Miller - PeerSpot reviewer
  • 0
  • 19
PeerSpot user
13

13 Answers

AO
Real User
Top 20
2022-09-23T08:47:44Z
Sep 23, 2022

We primarily use the solution for NDR.

Search for a product comparison
Amr Abdelaziz - PeerSpot reviewer
Real User
Top 20
2022-08-17T12:16:45Z
Aug 17, 2022

We use this solution for network security.

HS
Real User
Top 20
2022-08-11T09:05:54Z
Aug 11, 2022

I primarily use NetWitness Endpoint to detect anomalies like the presence of web shields that are not detected by traditional antivirus solutions. I also use it for digital forensics and containment.

HT
Real User
Top 20
2022-05-21T05:03:16Z
May 21, 2022

We are customers of RSA.

PS
Real User
2021-11-23T19:14:24Z
Nov 23, 2021

The product is mainly used for security, log reviews, and monitoring. In India, mostly on the requirement segment, we don't deploy the solution on the cloud. We use the solution on-premises.

TM
Real User
Top 10
2021-09-16T15:38:37Z
Sep 16, 2021

RSA NetWitness Endpoint is used to get an instant detection response from network threats. Additionally, it has the capability to do malware analysis and investigations.

Find out what your peers are saying about NetWitness, VMware, CrowdStrike and others in EPP (Endpoint Protection for Business). Updated: March 2024.
765,386 professionals have used our research since 2012.
MM
Real User
2021-03-05T17:21:52Z
Mar 5, 2021

It is our all-in-one platform for logs and packets for our network and for EDR.

TM
Real User
Top 10
2020-06-08T06:12:00Z
Jun 8, 2020

We use this solution to detect indicators of compromise, where incidents that occur are analyzed and given risk scores. For example, if the endpoint is of high risk then it will be indicated in red. By contrast, if it's of low risk then it will be indicated in green. The scoring criteria are what we call the Indicators of Compromise. The overall goal is to detect malware that is affecting the endpoints and then provide a response. It is often used by banks and telecom companies.

DJ
Real User
2020-02-02T10:42:05Z
Feb 2, 2020

We are using this solution as a network forensic tool with other security devices such as IPS and SIEM.

HS
Real User
Top 20
2020-01-16T08:44:00Z
Jan 16, 2020

We use the solution for the contamination. We detect the incidents and then proceed for the contamination and error notification. For example, there's some intrusion history to the endpoint and there's a partial command that detects the code imbalance. We're able to find it and deal with it.

TM
Real User
Top 10
2019-07-16T05:41:00Z
Jul 16, 2019

We've been using this solution for three years now for endpoint detection and response.

it_user629541 - PeerSpot reviewer
Consultant
2018-11-06T13:09:00Z
Nov 6, 2018

We are using it as a SIEM tool.

AA
Real User
2018-07-04T06:10:00Z
Jul 4, 2018

It is mainly for market analysis. It has been performing exceedingly well.

EPP (Endpoint Protection for Business)
A business endpoint is any device (such as mobile phone, desktop, laptop, tablet, server, or any virtual environment) that is physically an endpoint on a business’s enterprise computer network.
Download EPP (Endpoint Protection for Business) ReportRead more