Sistema DRP y sistema de inteligencia de amenazas. Reseña recopilada por y alojada en G2.com.
Nada en cuanto a lo que estoy usando el sistema hasta ahora. Reseña recopilada por y alojada en G2.com.
-First, let's talk about the tool: The interface is quite easy to see and well described from the dashboard to each case.
Easily filter and track processing status.
- The second is about Coordination: Quick answers and support for most requested cases. Processing rate up to 98% Reseña recopilada por y alojada en G2.com.
There are a small number of undetected violations in practice, we manually detect about 2 cases a month that the tool does not detect (the tool detects about 60 cases on average). Reseña recopilada por y alojada en G2.com.
Very in-depth reports about cybercrime groups. Extensive database of leaked information relating to us or our customers. Reseña recopilada por y alojada en G2.com.
Intelligence information about software vulnerabilities is not very detailed. Reseña recopilada por y alojada en G2.com.
The ability to detect violations is always improved, the customer support attitude is very professional. Reseña recopilada por y alojada en G2.com.
Sometimes slow response to local attack campaigns (perhaps a common problem for companies providing a global service). The portal interface sometimes has errors. Reseña recopilada por y alojada en G2.com.
- Beautiful interface, easy to use, clear functions.
- Very good ability to detect information leaks from malicious cnc channels and forums
- Allows custom match rules with information leak events from git, github, databreach, Darkweb...
-Support service from the team is good and fast. Reseña recopilada por y alojada en G2.com.
Some records of account information leaks were discovered later than in reality. However this is acceptable. Overall, nothing disappointed me. Reseña recopilada por y alojada en G2.com.
1. Últimas amenazas
2. Phishing
3. Servicio de eliminación
4. Investigación de amenazas Reseña recopilada por y alojada en G2.com.
1. La interfaz de usuario necesita mejoras
2. Detección de URLs de phishing
3. Páginas falsas de redes sociales deben estar junto con el portal existente
4. Nuevas características esperadas, por ejemplo, Sandbox Reseña recopilada por y alojada en G2.com.
The ability to interact with Threat Actors, the availability of breaches and the possibility to talk to analysts quickly to resolve any issues Reseña recopilada por y alojada en G2.com.
It happens that analysts do not read inquiries carefully and respond by giving incorrect or partial information Reseña recopilada por y alojada en G2.com.
It is straight forward and easy to use platform Reseña recopilada por y alojada en G2.com.
some times the service desk doesn't respond on the spot Reseña recopilada por y alojada en G2.com.
proactive approach for threats and we get all the lates threat actors vulnerbilites etc. Reseña recopilada por y alojada en G2.com.
unable to takedown URL in quick bases it takes time to update Reseña recopilada por y alojada en G2.com.