Capacidad para detectar y responder a diversas amenazas a través de varios canales y su categorización de violaciones. La principal ventaja es la interacción directa con el analista a quien se le ha asignado el incidente, lo que da un toque personal, mientras que con otros actores solo vemos que se utilizan correos electrónicos o contactos genéricos. Reseña recopilada por y alojada en G2.com.
Recursos de lista blanca y lista aprobada de URL para ser incluidos en el portal, en lugar de la configuración de backend por el equipo. Reseña recopilada por y alojada en G2.com.
Estoy haciendo seguridad para un banco, lo que más nos preocupa es la exposición de información de los clientes a los usuarios en internet. La información, incluyendo la cuenta, el número de tarjeta de crédito, etc., está siendo monitoreada y proporcionada con muy buen soporte de advertencia por Group-IB. Además, sintetizar información sobre ciberataques también se vuelve más fácil para nosotros al usar los servicios de Group-IB. Reseña recopilada por y alojada en G2.com.
No he tenido ningún otro problema que me haya hecho sentir insatisfecho con este producto. Reseña recopilada por y alojada en G2.com.
Useful threat intel, especially in the cybercrime sphere. Timely and proactive RFI service with detailed investigation and analysis. Reseña recopilada por y alojada en G2.com.
Some functions of platform can be further improved. Will be good to have more customized and detailed report for customers. Reseña recopilada por y alojada en G2.com.
GIB TIA is providing comprehensive threat intelligence and there accuracy on the compromised credentials,card data is much higher compared to other players in the same segment.
The variety of IOA/IOC information and graph feature is helpful for soc analyst.
Easy access and direct communication to the analyst through their service desk, makes it easy for internal analyst to get in depth knowledge on the alerts,queries raised instead of going through CSM Reseña recopilada por y alojada en G2.com.
Third party integration application to multiple SIEMs need be improved, browser plugin for easy analysis, risk scoring for IOC can be developed in their pipeling Reseña recopilada por y alojada en G2.com.
Takedown services, ability to detect fake domains, websites, etc. Ease of use and beautiful portal Reseña recopilada por y alojada en G2.com.
Since using it, there is nothing I dislike until now. Reseña recopilada por y alojada en G2.com.
Facilidad de uso y los informes ricos en detalles. Reseña recopilada por y alojada en G2.com.
a veces el portal es de alguna manera lento... Reseña recopilada por y alojada en G2.com.
1) Takedown capabilities and monitoring of customers' assets to prevent abuse, misuse and/or fraudulent use of customers' brands
2) Different features available on the platform (such as typosquatting observations etc)
3) Willingness to assist with us cases, technical glitches and more complex investigations (good customer support)
4) Flexibility to incorporate growing demands of our customers
5) Platform is relatively easier to use Reseña recopilada por y alojada en G2.com.
It is not about disliking the service, but instead what could perhaps be improved:
1) Service Desk lags on some occassions but functionality has remained intact more or less
2) Some takedowns remain ongoing even when detected by the platform and accepted to work over 10 months ago.
3) Mismatch of observations associated with different instances.
4) The closure of some tickets raised through the Service Desk should only be decided by the entities who raised the ticket in the first place, and not DRP analysts. Reseña recopilada por y alojada en G2.com.
Implementation was very easy with no hassles. The platform is simple to use and does most of the work for you with minimal inputs from the front-user end. The features it has will cover most business's requirements from a DRP platform. What has impressed the most is the speed of detections and the simplicity of using the platform, which will automate alerting for you. Reseña recopilada por y alojada en G2.com.
It took soemtime for the models built into the DRP platform to be compatible and learn our business use cases. Reseña recopilada por y alojada en G2.com.
Device fingerprinting, global id technology and graph analysis Reseña recopilada por y alojada en G2.com.
Actually everything is working optimum level. But maybe we can detect and show in admin panel which aplications may cause overlay activity. Reseña recopilada por y alojada en G2.com.
Provides detailed information in very simple, well laid out style, that you can check daily at a glance. Also covers all aspects of threat intelligence and gives the user different insights through multiple potential threat vectors. Customer support is usually very responsive and address any queries quickly. Reseña recopilada por y alojada en G2.com.
No downsides noticed so far with Threat Intelligence. Reseña recopilada por y alojada en G2.com.