"The basic features are okay and I'm satisfied with the Defender."
"The most valuable feature of Microsoft Defender for Office 365 is the ease of use."
"Safe attachments, safe links, policies, and the ability to protect from zero-day threats are the most valuable features."
"The solution is very easy to use. All you have to do is to assign the license to the end-user and it's done. The customer will only have the feature activated, and the solution will monitor the emails to determine if they are a threat or not."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"The good part is that you don't have to configure it, which is very convenient."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"We have full control over what our employees can do with the devices we provide them, to provide a secure and reliable network infrastructure."
"The Check Point Infinity security architecture enables organizations to fully implement all of the Zero Trust Principles."
"It is very easy to integrate new features."
"Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box."
"Great network monitoring, looking at anomaly detection and evaluation."
"We find that Stealthwatch can detect the unseen."
"It has definitely helped us improve our mean time to resolution on network issues."
"It provides good visibility to the customers. People are still evaluating it, but it provides visibility and helps them to take action to remediate and mitigate the issues that are highlighted on the dashboard. It has good integration with the Cisco switching platform."
"StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk."
"Overall, the implementation is very good."
"If you are using Darktrace or NAC solutions you can integrate Stealthwatch."
"There needs to be an improvement in integrating the product to work across multiple operating systems, and to have better support for non-Microsoft file types."
"Microsoft Defender for Office 365 could improve by giving customers information on techniques to prevent threats. For example, information about best practices on how to protect their own devices against hackers and scammers, such as educational information or training. This would help others have a better understanding of cyber security. Additionally, there can be more security features added."
"We are always looking for others tools to increase automation on tasks. There can be better integration with other solutions, such as PowerPoint and email."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"We need a separate license and we don't know how to get the license that is required."
"I'd like some additional features any product can give me to protect our environment in a better way."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"Configuration requires going to a lot of places rather than just accessing one tab."
"The licensing model for Check Point Infinity is not clear."
"They can improve the latency of the portal."
"I think that the pricing for the Check Point products should be reconsidered, as we found it to be quite expensive to purchase and to maintain."
"We determined that Stealthwatch wouldn't provide the machine learning model that we required."
"It's a good solid solution but integration with Network Access Control products with Cisco ISE would be good."
"Cisco Stealthwatch can improve by having bundled packages for popular add-ons. It would be a lot easier for people implementing it, have let's say a better way to use the product."
"Many of these tools require extensive on-premises hardware to run."
"We would like the solution to make more advances in the way that Extreme Networks has been doing."
"It's not great as a standalone solution."
"There could be better integration on the programming side, which uses Python. StealthWatch could provide a template for Python to manage the switches. For example, it would be nice if StealthWatch bounced a port automatically it detected something anomalous."
"Stealthwatch is still maturing in AI. It uses artificial intelligence for predictions, but AI still needs to mature. It is in a phase where you get 95% correct detection. As its AI engine learns more, it will become more accurate. This is applicable to all the devices that are using AI because they support both supervised and unsupervised machine learning. The accuracy in the case of supervised machine learning is dependent on the data you feed into the box. The accuracy in the case of unsupervised machine learning is dependent on the algorithm. The algorithm matures depending on retrospective learning, and this is how it is able to detect zero-day attacks."
Microsoft Defender for Office 365 protects all of Office 365 against advanced threats like business email compromise and credential phishing, and automatically investigates and remediates attacks. With Defender for O365 you get Integrated threat protection for all of Office 365 that gives you:
- Native protection for Office 365 with built-in protection that simplifies administration, lowers total cost of ownership, and boosts productivity.
- Unparalleled scale and effectiveness with powerful automated workflows to improve SecOps efficiency.
- A complete solution for collaboration that protects you from attacks across the kill chain.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
Cisco Stealthwatch uses NetFlow to provide visibility across the network, data center, branch offices, and cloud. Its advanced security analytics uncover stealthy attacks on the extended network. Stealthwatch helps you use your existing network as a security sensor and enforcer to dramatically improve your threat defense.
Check Point Infinity is ranked 10th in Advanced Threat Protection (ATP) with 3 reviews while Cisco Stealthwatch is ranked 4th in Network Traffic Analysis (NTA) with 10 reviews. Check Point Infinity is rated 9.0, while Cisco Stealthwatch is rated 8.2. The top reviewer of Check Point Infinity writes "Good visibility and analytics, helpful customer support, and enables micro-segmentation across the network". On the other hand, the top reviewer of Cisco Stealthwatch writes "Provides valuable security knowledge and helps us improve network performance". Check Point Infinity is most compared with CyberArk Privileged Access Manager, Palo Alto Networks VM-Series, Palo Alto Networks WildFire and Skybox Security Suite, whereas Cisco Stealthwatch is most compared with Darktrace, SolarWinds NetFlow Traffic Analyzer, ThousandEyes, Palo Alto Networks Threat Prevention and Vectra AI.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.