Ability to detect,respond to various threats acrosss various channels and their categorization of violation.
The main advantage is direct interaction with the analyst to whom the incident has been assigned gives personal touch, where as with other players we see only generice email id or contacts are being used. Review collected by and hosted on G2.com.
Whitelist resources and approved list of url's to be included in the portal, instead of backend configuration by the team Review collected by and hosted on G2.com.
I'm doing Security for a bank, the thing we're most worried about is the exposure of information from customers to users out on the internet. Information including account, credit card number, etc. is being monitored and provided with very good warning support by Group-IB.
Besides, synthesizing information about cyber attacks also becomes easier for us when using Group-IB's services. Review collected by and hosted on G2.com.
I have not had any other issues that have made me unhappy with this product Review collected by and hosted on G2.com.
Useful threat intel, especially in the cybercrime sphere. Timely and proactive RFI service with detailed investigation and analysis. Review collected by and hosted on G2.com.
Some functions of platform can be further improved. Will be good to have more customized and detailed report for customers. Review collected by and hosted on G2.com.
GIB TIA is providing comprehensive threat intelligence and there accuracy on the compromised credentials,card data is much higher compared to other players in the same segment.
The variety of IOA/IOC information and graph feature is helpful for soc analyst.
Easy access and direct communication to the analyst through their service desk, makes it easy for internal analyst to get in depth knowledge on the alerts,queries raised instead of going through CSM Review collected by and hosted on G2.com.
Third party integration application to multiple SIEMs need be improved, browser plugin for easy analysis, risk scoring for IOC can be developed in their pipeling Review collected by and hosted on G2.com.
Takedown services, ability to detect fake domains, websites, etc. Ease of use and beautiful portal Review collected by and hosted on G2.com.
Since using it, there is nothing I dislike until now. Review collected by and hosted on G2.com.
1) Takedown capabilities and monitoring of customers' assets to prevent abuse, misuse and/or fraudulent use of customers' brands
2) Different features available on the platform (such as typosquatting observations etc)
3) Willingness to assist with us cases, technical glitches and more complex investigations (good customer support)
4) Flexibility to incorporate growing demands of our customers
5) Platform is relatively easier to use Review collected by and hosted on G2.com.
It is not about disliking the service, but instead what could perhaps be improved:
1) Service Desk lags on some occassions but functionality has remained intact more or less
2) Some takedowns remain ongoing even when detected by the platform and accepted to work over 10 months ago.
3) Mismatch of observations associated with different instances.
4) The closure of some tickets raised through the Service Desk should only be decided by the entities who raised the ticket in the first place, and not DRP analysts. Review collected by and hosted on G2.com.
Implementation was very easy with no hassles. The platform is simple to use and does most of the work for you with minimal inputs from the front-user end. The features it has will cover most business's requirements from a DRP platform. What has impressed the most is the speed of detections and the simplicity of using the platform, which will automate alerting for you. Review collected by and hosted on G2.com.
It took soemtime for the models built into the DRP platform to be compatible and learn our business use cases. Review collected by and hosted on G2.com.
Device fingerprinting, global id technology and graph analysis Review collected by and hosted on G2.com.
Actually everything is working optimum level. But maybe we can detect and show in admin panel which aplications may cause overlay activity. Review collected by and hosted on G2.com.
Provides detailed information in very simple, well laid out style, that you can check daily at a glance. Also covers all aspects of threat intelligence and gives the user different insights through multiple potential threat vectors. Customer support is usually very responsive and address any queries quickly. Review collected by and hosted on G2.com.
No downsides noticed so far with Threat Intelligence. Review collected by and hosted on G2.com.