Cynet Valuable Features
Chief Technology Officer at a tech company with 201-500 employees
It's transparent, so it's not something where every user has to press a button to download or do the thing. It is centralized, in fact. Personally, I use Malwarebytes and other tools, which are fine for home use. Cynet is also relatively silent in terms of operation, except when it's required to act. Another advantage is the way it segregates the data. We had the opportunity to test their deception feature, and it works.
The ability to work with small teams and provide value is its most valuable aspect. They provide so many different value propositions. There are a lot of different things that users can take advantage of.
The support is phenomenal. The global coverage also is great. You have total peace of mind.
The initial setup is very fast and very easy.
The stability has been good.
I have been asked to expound on my comment.
In this one solution, your endpoint protection not only includes nextgen anti-virus, but the inclusion of User and Enity Behavioral Analysis and Deception tactics IN THE SAME SOLUTION with automated remediation are just 4 value propositions for any size team responsible for information security policy enforcement.View full review »
Head of Operations at Investrust Bank Plc
The dashboard is quite good and easy to follow, in keeping with Cynet's paradigm of cybersimplicity.
The detailed visibility it gives into the endpoint is excellent. We deployed it at a bank recently. So far, it's been great at showing us what has been happening in the environment.
The users found the initial setup to be very simple.
Deception is another great feature (which is the next iteration in the honeypot technology).
The array of remediations as well as the forensics are also a plus.View full review »
Senior Cyberecurity Manager at a financial services firm with 5,001-10,000 employees
The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use.View full review »
Chief Information Security Officer at a construction company with 10,001+ employees
The most important thing for us is that the solution can be deployed in autonomous mode, and then it automatically blocks malware threats. On top of that, there is a service behind it with real people and they actually help with threat hunting and detection activities. The platform provides more than your normal EDR platform. Aside from the real people behind the product, it gives visibility on the network, on the file level, on the memory level, and it also does user behavior analysis, with a deception capability as well. It is quite feature-rich as far as I have seen and compared with other solutions on the market. We're enjoying that it has a bit more than the other platforms and it also allows us to discover what vulnerabilities we have on our endpoints as well which is more than you get from a typical EPP/EDR.View full review »
Network and Security Manager at a tech services company with 501-1,000 employees
We especially like the fact that it can stop any kind of attack. Its performance is also quite fast. There is a specific UI module that also works quite well.
The level of automation is very good because the majority of the time, it blocks the attacks without requiring anything from our side. The technicians don't have to do anything. They are just alerted about what happened. So, the user intelligence works quite well.View full review »
System Administrator at a tech vendor with 11-50 employees
If some unusual activity happens on the network, such as I open administrator sessions in a short duration of an hour on many computers in the lab, it sends me an alert about my network saying that one user opened three, four, or five sessions in one hour. Similarly, if I try to play with the disk size on a computer, it will send me an alert, and it will also stop the operation.View full review »
The most valuable feature is the monitored support behind it. The CyOp's team remains a great partner to protect us and help us feel safer.View full review »
CTO / CISO at a cloud provider with 11-50 employees
The general flexibility of the solution is its most valuable aspect.
The product is very easy to use. Customers really appreciate that.
There's 24/7 monitoring, which is nice.
The initial setup is straightforward.
The scalability is very good. It's an acceptable product for organizations of all sizes.
The stability is great.View full review »
Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool.
The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued. Additionally, the ransomware upgrade provided us with 100% protection.View full review »
I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues.
It is a very stable and scalable solution.
The price is great for all the features it offers, and the licensing is flexible.View full review »
Security Manager at a computer software company with 11-50 employees
The solution is very stable. We are very satisfied with the level of performance we get.
The scalability is quite good.
We have found the installation process to be simple.View full review »
Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management.View full review »
Associate Director at a comms service provider with 10,001+ employees
It provides good protection from ransomware and malware attacks. It is very good as compared to other products.
If any threat is there, their support is very good. They immediately respond to the users and do a follow-up. They call us and also provide email support.View full review »
ICT&CyberSecurity Services Team Lead at a comms service provider with 501-1,000 employees
I like that you can implement it in the managed service portfolio.View full review »