Deep Instinct Valuable Features
The most important thing is that it is for prevention. It prevents attacks of any type of malware. Normally, what we've seen in other products is that they are not for prevention. They isolate a possible threat that they don't understand or know about, and then they check it with our database to see if it needs any correction or elimination. This means that the threat is already inside a customer's base, whereas Deep Instinct prevents a threat from getting in. Prevention is basically done by an agent in each installation, PCU, or product. An agent has its own intelligence to be able to detect if it should stop a threat or not. It has been taught. It is like a brain that has been taught to react according to any possible threat.
Deep Instinct is very light. It doesn't take too much CPU attention or memory. It doesn't slow down the performance. You don't really realize any change in the performance, which makes it very different from other solutions. They are usually heavy for the users.
Administrator at BAPS Swaminarayan Sanstha
It has given us a more structured approach for detecting and preventing threats. It has machine learning-based detection and prevention. Their engines, in even older versions, are able to pick these viruses and malware. They have posted a lot of use cases online for detecting different viruses and malware that have been out for many years.View full review »
Owner at a computer software company with 1-10 employees
The most valuable feature is its ability to detect and eradicate ransomware using non-signature-based methods. It is not a traditional EDR.View full review »
Naveen Hariharan Vijaya
Threat Intelligence and Forensics Investigation Specialist at True Digital Group
The user interface is a good feature. It shows which process has been accessed and the flow. The detections for PowerShell are also pretty good as is the active scripts detection feature.
It's a new solution that is beneficial for the endpoint because they have a new perspective on cyber security.
The agent and this platform do not require the endpoint to be connected to the network because the agent is designed to understand the threat, and tags it.
When the platform is connected to the network, he receives new mathematics as well as other tools to check the threat.View full review »