Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
Commvault Cloud is the ultimate cyber resilience platform built to meet the demands of the hybrid
enterprise. Beyond its core functionality of data backup and recovery across diverse workloads, including applications, databases, virtual machines, and files, Commvault Cloud stands out as a robust defense against ransomware. Going beyond backup, the platform integrates advanced data security features such as encryption, access control, and threat detection, safeguarding against unauthorized access and cyber threats.
If budget allows using the per socket license and not the agent based with per GB counter for Dedup is the way to go.
New licensing is easy and affordable.
If budget allows using the per socket license and not the agent based with per GB counter for Dedup is the way to go.
New licensing is easy and affordable.
Vectra threat detection and response is a complete cybersecurity platform that collects, detects, and prioritizes security alerts. The Cognito platform for Network Detection and Response (NDR) detects and responds to attacks inside cloud, data center, Internet of Things, and enterprise networks. The platform also provides automated response capabilities for low-level threats and escalates more severe anomalies to security personnel.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
Deep Discovery is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Overall, the price is good.
The price of the solution is lower compared to the competition.
Fidelis Elevate integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.
It's quite expensive but we can customize it to reduce the price.
Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution.
It's quite expensive but we can customize it to reduce the price.
Fidelis Endpoint is an expensive product. My company makes yearly payments toward the licensing cost of the solution.
Singularity Hologram, a component of the SentinelOne Singularity platform, leverages advanced, high-interaction deception and decoy technology to lure in-network attackers and insider threat actors into engaging and revealing themselves. By mimicking production IT, IoT, and OT OSes, applications, data, native cloud technologies, and more, Singularity Hologram uncovers covert adversary activity, collects high-fidelity telemetry, and garners actionable intelligence to help you strengthen your defenses. Singularity Hologram decoys appear indistinguishable from production assets and are designed to engage and misdirect attackers away from real systems and data. All decoys encompass a breadth of form factors, adapting to a variety of business & organizational needs.
The cost of operations is very low.
The cost of operations is very low.