Top Rated D3 Security Alternatives

Auto scanning of application source code. Ease of creating customized workflow for incidence managemrnt. Production application security analysis through reporting module. Screen navigation iis very goog. Review collected by and hosted on G2.com.
No such issues observed till now. We got excellent results till now. Review collected by and hosted on G2.com.
68 out of 69 Total Reviews for D3 Security
Overall Review Sentiment for D3 Security
Log in to view review sentiment.

Aside of course on the out of the box solution it offer, what I like the most is it's flexibility to be integrated to other security solutions that is not even on their supported list of products like in our case and our client, the Huntsman SIEM. By developing an API using phyton we're able to integrate the two solutions. This is a good as it indicate that it is client-centric because even if the product is not yet supported by the platform, there's always that possibility of combining it to create a solution that will help client to have workflow, better visibility to analyze and act faster to mitigate possible cybersecurity attacks. Review collected by and hosted on G2.com.
Based on the time I handled this product, I really didn't have issues with it. The documentation and knowledge is readily available over the internet and could really help you understand it and if there's an issue, though the support team whom is on different timezone, the response is very quick Review collected by and hosted on G2.com.

A cloud based software with a 24/7 online support system that allows you to have access to it anytime anywhere. The system is highly scalable and flexible. This allows adjusting to the desired needs. With this software you can also create a database of repeat offenders, you can also categorize incidences based on various things such as type, time and location. It also allows the linking of associated photos and related information. Has the best user interface which is well designed and generally easy to use. Other features available include; court management integration, dispatching, evidence management among others. Review collected by and hosted on G2.com.
Nothing, has been the best tool for our company. Review collected by and hosted on G2.com.

D3 security system is a highly scalable from sites with only a handful of officers to very large sites. The latest version includes significant improvements to the reporting tool, allowing incident reports to create a database of repeat offenders, link associated photos and related information and categorise incidents based on type, location and time. Review collected by and hosted on G2.com.
No serious setbacks experienced so far, but I feel that this can fail in some parts as the administrative can be somewhat poorly explained in documentation. There is a slight learning curve previously, but it is easy to use once you know where to find things you are looking for. Review collected by and hosted on G2.com.

I am imoressed by D3 security system since it has a rapid automated threat rensponse which quickly validates threats and easly accelerates incident rensponse.Moreso it has proven frameworks which can continually be improved and updated hence fkexible. Review collected by and hosted on G2.com.
I havent beared any major drawbacks obout this system,however more operation intergration should be considered as it requires skilled staff especially in its orchestration and Automation operations. Review collected by and hosted on G2.com.

The most incredible thing about this software is that it provides a platform for incident response , management and security operations and it also integrates with other threat notifying and alerts the user incase if a threat. Review collected by and hosted on G2.com.
The software retailer's sell it expensive compared to others, it also requires the user to undergo training in order to use it fully. Review collected by and hosted on G2.com.

The user interface is well designed and easy to use . Review collected by and hosted on G2.com.
So far I have no big dislike for this software. However, learning this software curve may take some time. Review collected by and hosted on G2.com.

The system has helped to achieve rapid incident resolution, case management investigations, advanced incident reporting and consistent security. Review collected by and hosted on G2.com.
This system remains the best only that the maintenance charges are high. Review collected by and hosted on G2.com.

I'm pleased with the way software is able to investigate alerts automatically of any incoming threats and respond by making a remediation within few seconds. Review collected by and hosted on G2.com.
There is need to add firewall in the system to help do away With hackers or else device maybe invaded by outsiders to access individual personal data. Review collected by and hosted on G2.com.

it helps to properly document evidence and address the life cycle of an event including cyber security operations and digital forensics investigation Review collected by and hosted on G2.com.
its expensive for our organization to maintain it and it requires individual with experience for carrying out the operation in the organization Review collected by and hosted on G2.com.
I like this platform because it enhances security ,incident response,management,investigation, automation and orchestration
It also enhance early alerts and detects threat found on the system Review collected by and hosted on G2.com.
This platform only works well on well enabled network and Android devices ..it also works on powerd device which uses electricity not available where there is no electricity Review collected by and hosted on G2.com.