We use it to search for IOCs.
I provide support to government entities that buy and use EDR solutions in general. We encounter it with different customers and clients.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
We use it to search for IOCs.
I provide support to government entities that buy and use EDR solutions in general. We encounter it with different customers and clients.
More insights would be helpful. We have multiple solutions for threat intelligence. If someone has a bigger view or full eye on all the incidents, it will be beneficial.
So, to include everything in one solution.
We deal with EDR and other endpoint solutions from Kaspersky. So, I have been using this particular solution for seven years now.
I would rate the stability a nine out of ten.
There are around 20 end users using this solution in my organization.
I would rate the scalability an eight out of ten. It is a great solution.
I personally use it weekly.
This was the first solution we used.
I would rate my experience with the initial setup an eight out of ten, with one being difficult and ten being easy.
For the business side, it's a great solution.
The solution improved our overall security posture.
I would recommend using it. It has a lot of information, monitors for Dark Web Services, data leakage, and so on.
Overall, I would rate the solution an eight out of ten.
I recommend the solutions. We use them in different sectors.
I used it to build the strategic threat forecast. The annual forecast for clients.
We did use it for threat detection, but not directly. I analyze multiple reports, including this one, and assess my client's infrastructure. I identify threats outlined in the reports that may be relevant to the client's infrastructure, and then I help them build detection use cases.
There's no automation. We don't do anything automatically at this point. It's all manual and based on analysis. I can't integrate it into automatic feeds because the report outlines threats that may not be relevant to the client's infrastructure. So, I do the analysis and integrate it manually.
I'm completely satisfied with the way the report is prepared. It's a good report.
The totality of the recordings is quite important. The networks, the new threat actors, the new methods, tactics, techniques, and procedures. The most important is the forecast. It's how the reports depict what's coming.
As the landscape evolves, they could provide a little more detail or specificity to map it to the MITRE ATT&CK framework. Even though it is done in the report, it could be done better.
I used it for four years, since 2020. But recently, I stopped using it.
I would rate the stability a nine out of ten. Ten means outstanding, so I don't give ten for anything.
There is always some room for improvement, but I have had no big issues or troubles with stability.
I would rate the scalability a nine out of ten. It is quite good. I would recommend it for medium and large-sized companies.
I wouldn't recommend it for small companies because their infrastructure is not large enough.
I never needed it.
I find it more relevant than others. Some reports are vague or irrelevant with too much information.
For example, I use CrowdStrike and some other vendors, but I think Group-IB's report is more specific. I am happy with the report.
The initial setup is straightforward. I had no issues with that.
The pricing is alright. It's right on the mark. It costs money, but it's not too high. It's reasonable.
For me, it's a reasonable price for the quality of the product.
Overall, I would rate the solution a nine out of ten.
I would recommend using it.