Try our new research platform with insights from 80,000+ expert users

Share your experience using Teramind

The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.

Use our online form to submit your review. It's quick and you can post anonymously.

Your review helps others learn about this solution
The PeerSpot community is built upon trust and sharing with peers.
It's good for your career
In today's digital world, your review shows you have valuable expertise.
You can influence the market
Vendors read their reviews and make improvements based on your feedback.
Examples of the 94,000+ reviews on PeerSpot:

Enterprise Security Architect V at FirstEnergy
Real User
Top 20
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
Pros and Cons
  • "We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
  • "Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."

What is our primary use case?

We use Anomali as our threat intelligence platform for a variety of threat intelligence feeds that we subscribe to, needing a more central place to store everything so we can correlate which feeds have seen this indicator before and which haven't. This was the biggest use case for us to solve, which is why we went after it. It is definitely more than just a threat intel platform where we store all these indicators; it's almost very much a threat hunting tool that allows analysts to do investigations on those indicators and make connections, looking for other related things that we didn't necessarily see. It allows us to take a more proactive kind of approach.

What is most valuable?

The API is our most important feature. We are very much into automation, so being able to handle things programmatically at scale has been immensely powerful for us. We've evolved beyond just the two use cases I mentioned. One of the things we decided to do is utilize the Anomali API to push everything into that platform after sorting and normalizing everything. We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides. It's very adaptable; you can do a lot with it, making it a very powerful tool.

What needs improvement?

There is always room for improvement, as there are always new ideas. They have been dabbling with some AI functionality built into the platform, which is still very new, so there's a lot of improvement that could happen there, especially as the technology enhances.

For how long have I used the solution?

I have been using Anomali for about 7 or 8 years.

What was my experience with deployment of the solution?

The initial setup depends on which kind of deployment you choose; they offer both an on-prem solution and a Cloud deployment. If you choose the Cloud deployment, there's nothing you have to do; you just log in and start using it. It's pretty seamless. If you're using an on-prem setup, they provide an appliance for enterprise customers, and after subscribing, they ship you a device that you can set up by following their setup guide, which provides all the details and instructions.

What do I think about the stability of the solution?

Stability has been pretty seamless so far, but we've run into some issues more recently due to changes in how some platform functions operate. It doesn't seem they're considering enough how customers use those functions as they change them, and they don't give us enough time to adapt to those changes. For example, while Microsoft allows ample time for users to adapt to deprecated features, Anomali only gave us three weeks before switching, so they need to be more cognizant of customer use cases from their engineering side.

What do I think about the scalability of the solution?

The scalability is massive, allowing us to store millions of indicators. Unless you have a threat intelligence platform, you can't scale to the level Anomali offers, especially compared to trying to do it in a SIEM tool such as Splunk or Sentinel. It seems almost unlimited; I'm sure there's a limit, but they do a good job of never allowing us to hit that limit.

How are customer service and support?

Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days. We'll receive excuses such as "I was out of the office" or "I forgot to follow up on this, I apologize." While they apologize, it doesn't seem very professional how they're handling support anymore.

How would you rate customer service and support?

Positive

What other advice do I have?

You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean.

My company is a customer of Anomali.

I would recommend it to other people.

I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform.

Overall, I would rate Anomali an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
IT infrastructure Specialist at Nok airline public company limited
Real User
Have effectively managed cybersecurity with valuable features like endpoint detection and automation while potential improvements include support refinement
Pros and Cons
  • "The EDR, as well as the XDR features, are very valuable."

    What is our primary use case?

    Currently, we are using Cynet for Endpoint Detection and Response (EDR).

    What is most valuable?

    The EDR, as well as the XDR features, are very valuable. These features manage our infrastructure's cybersecurity effectively. Cynet provides many visible aspects of our infrastructure, allowing us to see all endpoints and agentless devices. It offers automation capabilities. The vendor manages our infrastructure's cybersecurity through a Security Operations Center (SOC).

    What needs improvement?

    I have only been using it for one month, so I don't have extensive experience. However, compared to Trend Micro, the price of Trend Micro is high and support from its vendor was inefficient. Cynet offers enough visibility into our infrastructure, showing all endpoints and other agentless devices.

    For how long have I used the solution?

    I have used the solution for one month.

    What was my experience with deployment of the solution?

    We have outsourced the deployment to the vendor. The vendor makes use of its SOC to manage our cybersecurity.

    What do I think about the stability of the solution?

    Currently, Cynet is a stable solution for us.

    How are customer service and support?

    Support is provided by our vendor who manages our cybersecurity with Cynet. We have not contacted Cynet directly for support.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    Previously, we used Trend Micro. We switched to Cynet primarily because Trend Micro's price was high, and we lacked support from its vendor.

    How was the initial setup?

    The initial setup was not overly complex because Cynet provides excellent visibility into our infrastructure. It shows all endpoints, networking, and monitors traffic, which includes detecting and analyzing viruses.

    What about the implementation team?

    Our implementation was handled by an integrator, and we are using Managed Detection and Response (MDR) services.

    What's my experience with pricing, setup cost, and licensing?

    The price of Cynet is reasonable considering its features and support.

    Which other solutions did I evaluate?

    We evaluated Trend Micro before switching to Cynet.

    What other advice do I have?

    After only one month of implementation, an overall rating is premature. The solution isn't bad, and its features are beneficial. With time, perhaps functionalities, vendor support, and design can be refined to make it a ten out of ten. I'll rate the overall solution as NA.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate