it_user1098648 - PeerSpot reviewer
Technical Consultant at Revel Tech Security Sdn Bhd
Real User
A lightweight, yet advanced detection system that keeps our endpoints safe

What is our primary use case?

Our company, as a distributor of the solution, looks into a few criteria that highlight the value of the solution. An important example is the deep hunting threat mechanisms that Cybereason has to offer.

One of the distinctions between Cybereason and many other vendors is that you are able to search easily through various parameters, such as machine ID, user ID, and malicious files.

How has it helped my organization?

Cybereason "communicates" with other endpoints to gather anonymous activities that run within the organization that normal AV fails to detect. It accumulates and compacts this into a single event case, where it is easy for the SOC team to do an investigation. This drastically reduces the time required to find the root cause of the event. This is one of the features that most of the other vendors lack, but allows the SOC team to receive an alert with the relevant details of the incident within a short period of time.

What is most valuable?

The sensors run within the endpoints, where it is lightweight and runs seamlessly in the background. It does not disrupt the work or activities of the end users, yet is able to detect almost any malicious activity running on the spot.

Adding to that, features like the canary files work like bait to any lateral movement case, where the threat actor is lured to "touch" those files. This, in turn, triggers the Malop engine, and immediately sends the alert to the SOC team to take action.

What needs improvement?

The technical support will need to be improved.

Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.

For how long have I used the solution?

About a year and a half.

What do I think about the stability of the solution?

I have the utmost respect for the stability of this solution, as it will be ninety-nine percent solid in keeping the endpoints protected from advanced cyber attacks.

How are customer service and support?

Since using the solution, post-installation I have not come to a point where I needed to contact their customer service or technical support. I have had no issues with the solution.

Which solution did I use previously and why did I switch?

We have used normal branded AV, which does not seem to be effective nowadays. Adding products to make up for what is lacking can be costly and it will also affect the performance of the endpoint, adding more resources and also time to do an investigation manually. Ultimately, this will affect productivity.

As Cybereason, it is built as NGAV plus EDR, meaning that it is a multi-functional solution that addresses the effectiveness of countermeasures for any cyber attacks. It is an ever-evolving process.

How was the initial setup?

The initial setup is pretty much straightforward. Simply follow the onboarding process as instructed by the vendor. The vendor is available to guide and assist with the onboarding process, and training for using the solution is also provided.

What about the implementation team?

As a distributor of the product, I have seen both vendor and in-house implementations. In the case of in-house deployments, there are clear instructions from the vendor. If issues should arise then they respond quickly to address the issue.

What's my experience with pricing, setup cost, and licensing?

Pricing is based on endpoints to be covered together with licensing. Be sure to make a request for flexibility in pricing.

Which other solutions did I evaluate?

We have evaluated Seqrite Endpoint Security, F-Secure Endpoint Detection and Response, Kaspersky Endpoint Security, Avast Endpoint, and Avira Endpoint Security.

What other advice do I have?

I highly recommend this solution for any organization that is solely depending on normal AV. Cyber attacks are rising exponentially, where tools are more advanced in penetrating the wall of security within the organization. A single hole could lead to devastating effects on the business.

The latest updates are quite user-friendly. This makes it easy to conduct an investigation, which leads to a reduction in time for determining the root cause of the event.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user692280 - PeerSpot reviewer
Manager Projects at a tech services company with 10,001+ employees
Real User
Malop analysis and the detection part are the most valuable features.

What is most valuable?

Malop analysis and the detection part are the most valuable features.

What needs improvement?

Technical support needs to improve.

For how long have I used the solution?

I have used this solution for around six months.

How is customer service and technical support?

The technical support team is overall good and co-operative.

How was the initial setup?

The setup is straightforward, provided you have the required infrastructure support as prerequisites.

What's my experience with pricing, setup cost, and licensing?

It’s a good product, so you can go for it.

What other advice do I have?

Please go for it as this is an efficient product in the cyber security space.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cybereason Endpoint Detection & Response
April 2024
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.
Security Consultant at a computer software company with 10,001+ employees
Consultant
Easy to set up but can be confusing for end-users
Pros and Cons
  • "The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
  • "The product's reporting isn't great."

What is most valuable?

The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running.

What needs improvement?

One area for improvement is that this solution isn't so easy for the end-user, especially at level 1. Sometimes the information from the product can be confusing for users at both levels 1 and 2. In addition, the product's reporting isn't great, which should be improved.

For how long have I used the solution?

I have been using this solution for about seven months.

How are customer service and support?

Technical support varies on a case-by-case basis, but sometimes it takes a lot of time for them to come back to us with a solution. I would like to see better support in the future.

Which solution did I use previously and why did I switch?

I previously used Trend Micro's antivirus solution.

How was the initial setup?

The initial setup was easy.

What about the implementation team?

I used an in-house EDR team to implement this product.

What other advice do I have?

I would advise trying to cut down on false positives as these can create a lot of issues between teams. I would rate this product as 7.5 out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Cybereason Endpoint Detection & Response Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Cybereason Endpoint Detection & Response Report and get advice and tips from experienced pros sharing their opinions.