My main use case for Arctic Wolf Managed Detection and Response is as an EDR solution. I use Arctic Wolf Managed Detection and Response on my EC2 instances.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
My main use case for Arctic Wolf Managed Detection and Response is as an EDR solution. I use Arctic Wolf Managed Detection and Response on my EC2 instances.
The best features Arctic Wolf Managed Detection and Response offers include a really good console that makes it easy to spot many issues.
The console helps my team day-to-day by speeding up investigations. It is very easy to navigate through and find out why certain traces are happening.
Arctic Wolf Managed Detection and Response has positively impacted my organization by making us feel much safer in terms of security. When any issues arise, I know that I have something as an EDR tool to rely on. It also helps us with security questionnaires by making it easier for my team to answer common questions about what I use for EDR solutions and what I use for my CSPM module.
I do not see any point of criticism so far regarding Arctic Wolf Managed Detection and Response. The three points off are due to the menu being hard to use when trying to get to specific locations.
I have been using Arctic Wolf Managed Detection and Response for eight months.
Arctic Wolf Managed Detection and Response is very stable.
I have not come across scalability issues yet, but so far it seems to be good even with 190 servers.
The customer support for Arctic Wolf Managed Detection and Response is very good. They have been very quick and respond within six to eight hours.
Positive
This is the first time I have onboarded an EDR solution.
I had no issues with pricing, setup cost, or licensing. Everything was smooth, and the salesmen were really easy to work with.
I have seen a return on investment, definitely saving about 20% of time in triaging security incidents, which has led to much less panic. I have also saved money in terms of the cost of security incident payouts.
I had no issues with pricing, setup cost, or licensing. Everything was smooth, and the salesmen were really easy to work with.
Before choosing Arctic Wolf Managed Detection and Response, I evaluated one other option: CrowdStrike.
My advice to others looking into using Arctic Wolf Managed Detection and Response is to definitely go for it, as it is a good solution, especially if you do not have an EDR solution in place yet. I would rate this product a 7 out of 10.
My main use case for Palo Alto Networks Cortex XSOAR is automation and running playbooks. It is providing connectors to automate and stop security incidents on our network.
I can share a specific situation where I used Palo Alto Networks Cortex XSOAR to automate and stop a security incident. We already have XCM from Palo Alto on the cloud and we have implemented Palo Alto Networks Cortex XSOAR to automate our SOC operations. Whenever we have a security incident, the playbooks we have already set on Palo Alto Networks Cortex XSOAR run and provide powerful automation to stop any security incident. For example, with phishing attempts, after integrating with Palo Alto Networks Cortex XSOAR and our email gateway, we can stop phishing and delete the user and stop the user on Active Directory.
This change is very useful for my SOC team as it reduces time and provides a fast response to the incident. That is really helpful.
In my opinion, the best features Palo Alto Networks Cortex XSOAR offers are many integrations, powerful capabilities, and at the marketplace, you can have any connector or any playbook on the marketplace for Palo Alto Networks Cortex XSOAR.
Out of all the integrations or connectors I have used, that is a very good one. That is the best one I have used in our organization.
Palo Alto Networks Cortex XSOAR has positively impacted my organization by adding security automation to our environment. It is really helpful to stop incidents at an early time.
I can share that we have noticed a reduction in incident response time since using Palo Alto Networks Cortex XSOAR. We have a very short MTTR and fewer security breaches since we have been using Palo Alto Networks Cortex XSOAR.
I think Palo Alto Networks Cortex XSOAR can be improved as it has a little bit higher cost than any other SOAR. I think Palo Alto needs to reconsider the pricing for Palo Alto Networks Cortex XSOAR.
I have been using Palo Alto Networks Cortex XSOAR for six months.
Palo Alto support is very good.
Positive
I would not like to add anything else about my main use case or how I am using Palo Alto Networks Cortex XSOAR. I would not like to add anything else about the features. I would not like to add more about the needed improvements.
The advice I would give to others looking into using Palo Alto Networks Cortex XSOAR is that you should work and learn more about it and take a training course on Palo Alto Networks Cortex XSOAR. It will be helpful and very useful to you to implement and install Palo Alto Networks Cortex XSOAR. I would rate this product a 10 out of 10.