"The most valuable feature of Microsoft Defender for Cloud Apps is to stop shadow IT."
"We have become more aware of what services our users are using, how often they are using them, and what data is being sent out of the organization and to which services. So, it is really a lot about visibility and helping us make decisions based on that. It drives some of our policy decisions for adding extra security controls."
"There are a lot of features with benefits, including discovery, investigation, and putting controls around things. You can't say that you like the investigation part but not the discovery. Everything is correlated; that's how the tool works."
"The solution does not affect a user's workflow."
"The ability to prevent users from using certain applications is one of the most valuable features. It doesn't require any configuration for implementation from the client perspective. It just works right away and gives you the information you need."
"If your business requirements are relatively simple, it can get the job done."
"Better logging allows us to find problems and take appropriate steps to lock them out."
"The general usability of the solution is very straightforward."
"We are protecting all our workstations."
"I like that you can implement it in the managed service portfolio."
"The initial setup is very fast and very easy."
"If some unusual activity happens on the network, such as I open administrator sessions in a short duration of an hour on many computers in the lab, it sends me an alert about my network saying that one user opened three, four, or five sessions in one hour. Similarly, if I try to play with the disk size on a computer, it will send me an alert, and it will also stop the operation."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"We are very satisfied with the level of performance we get."
"The NDR is good in their solution and they have NTG for email."
"The initial setup is simple."
"The ability to see what we have not seen before is most valuable. It is very interesting to find out the most vulnerable devices in our network."
"Darktrace is very flexible."
"I find it very good in the way that they show the past events, including the attack history."
"It is very easy to work with Darktrace once you know how it works and the type of permissions that you need to get related to the security over a network. The interface is awesome. I'm sure that you have seen Ironman, and you know Jarvis, the computer of Tony Stark. The interface of Darktrace is very similar, and you can see in 3D, like a hologram, the whole network, traffic, and all the traces inside the network. The interface is awesome, and it provides a lot of information. At least for us, it is very easy to handle this interface, get the reports, and do the interpretation of those reports. Darktrace also provides mobile monitoring. With an app on your mobile phone, you can view the information live, which is very useful for area directors and field engineers. Darktrace can be also correlated with any type of big data solution, such as Splunk."
"The Antigena feature is most valuable. Once it learns your environment, Antigena can step in and block a denial of service attack, a ransomware attack, or just about anything that doesn't belong in the environment. It can detect any type of attack that hits the environment because it understands what normal looks like for the network. It is very useful for an autonomous response."
"We are able to detect a lot of things, actually, and see what is happening in our network."
"The response time could be better. It will be helpful if the alerts are even more proactive and we can see more data. Currently, the data is a little bit weak. It is not complete. I can't just see it and completely know which user or which device it is. It takes some effort and time on my part to investigate and isolate a user. It would be great if it is more user-friendly or easy for people to understand."
"Microsoft Defender for Cloud Apps' initial setup was quite technical but we were prepared. The time of the implementation depends on the job and how many users are being set up."
"It takes some time to scan and apply the policies when there is some sensitive information. After it applies the policies, it works, but there is a delay. This is something for which we are working with Microsoft."
"There are challenges with detection and there are challenges with false-positive rates."
"In the future, I would like to see more plug-and-play capabilities that use AI to tell you what needs to be done. It would be helpful if it scanned our devices and made security suggestions, on a configuration basis."
"I want them to enhance in-session policy."
"The integration with macOS operating systems needs to be better."
"I believe it's only set to be integrated with Microsoft Defender for identity and identity protection. I would like to see it available for use with something like Office 365 Defender. I don't think it's integrated with that yet."
"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time."
"I'd like to see more data loss prevention within the product."
"Most of their times are in Greenwich Mean Time. I would like to see more local time zones."
"They have some things in the pipeline, we understand, and they're going to be able to support Android and all these other devices soon. The key is the devices - which is an aspect that is lacking right now. Every company has that problem, not just Cynet."
"Compliance reports need to improve."
"We'd like something that makes it easier to manage specific points."
"In terms of what could be improved, I would say the usability of this product for new threats. Meaning, not everything which is new is properly seen by the product and not all the required actions are taken."
"Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play."
"The solution could be easier to use."
"It is expensive, but everything else has been great so far."
"The interface is too mathematical and it should be simplified."
"The interface and dashboards could be improved for ease-of-use."
"I think there is some MSSP missing."
"I would like to see more protection in the endpoint. Especially because we have a lot of people using VPNs. If they would improve end point security, it would give more control there."
"Its documentation is not up to the mark. At times, I have a lot of trouble finding a solution. Even when I posted questions on the community chats, it took a lot of time for me to get answers. That's something that can be improved. Darktrace can focus on creating a more interactive community. If there are more people from Darktrace to focus on community chats, it would be better."
"The initial setup is more complex and time-consuming than some solutions."
More Microsoft Defender for Cloud Apps Pricing and Cost Advice →
Cynet is ranked 4th in Extended Detection and Response (XDR) with 17 reviews while Darktrace is ranked 1st in Intrusion Detection and Prevention Software (IDPS) with 30 reviews. Cynet is rated 8.6, while Darktrace is rated 8.4. The top reviewer of Cynet writes "A complete, transparent, and centralized solution ". On the other hand, the top reviewer of Darktrace writes "A 10/10 solution with an awesome interface, good stability and scalability, flexible pricing, and good support". Cynet is most compared with SentinelOne, Microsoft Defender for Endpoint, CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Sophos Intercept X, whereas Darktrace is most compared with CrowdStrike Falcon, Cisco Stealthwatch, Vectra AI and SentinelOne.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.