Top Rated Security Alternatives
1,827 Security Reviews
Overall Review Sentiment for Security
Log in to view review sentiment.
Defender for Office 365 is a great way to safeguard your email and other Microsoft 365 applications from multiple types of threats.It works well with your Microsoft 365 environment, and you can easily configure it from a single dashboard. It is especially valuable in protecting emails and users from phisphing and malicious attachments. Review collected by and hosted on G2.com.
It has a bit of a learning curve to configure core feature and ensure they are working without negitively effect users and their performance. Review collected by and hosted on G2.com.

Microsoft Defender for Office 365 provides protection from all kind of attacks and cyber threats like viruses, ransomware, malware, phishing, spoofing, etc. The integration of Microsoft Defender with Office 365 was seamlessly easy. My overall experience with this product has been satisfactory as it has worked as per our requirement. Highly recommended. Review collected by and hosted on G2.com.
Microsoft Defender with Office 365 is quite capable to cover and protect all the things as it is comprehensive. However , at times I have expereinced it also generates false alarms and alerts and because of this we unnecassarily have to investigate and waste our time. Review collected by and hosted on G2.com.

It provides analytics and threat information across your enterprise.it also helps in collecting logs related to attacks, hunting and helps in mitigate these threat alerts by using its AI algorithm. Review collected by and hosted on G2.com.
It is not that user friendly,It needs a bit tranning and efforts to learn it properly. Review collected by and hosted on G2.com.

Microsoft Defender for Endpoint exposes data in open formats and provides APIs that allow data engineers to integrate security data with their existing data pipelines and tools. This interoperability enables data engineers to leverage their existing data analysis skills and infrastructure to gain insights from security data. Microsoft Defender for Endpoint is actively developed and supported by Microsoft, with regular updates and new features. There is also a vibrant community of data engineers and security professionals who share knowledge and best practices for working with Microsoft Defender for Endpoint data. Review collected by and hosted on G2.com.
While there is some documentation available for Microsoft Defender for Endpoint, it could be more comprehensive and provide more specific guidance for data engineers. The ability to customize Microsoft Defender for Endpoint to specific organizational needs is somewhat limited. This can make it challenging for data engineers to tailor the tool to meet specific requirements. Review collected by and hosted on G2.com.

The platform supports a wide range of industry-standard certifications and regulations, such as GDPR, HIPAA, and SOC 2. This helps ensure that your organization remains compliant with data protection laws and maintains a strong security posture. Microsoft Defender for Cloud provides a unified console for security management across multiple cloud services, making it easier for HR teams to monitor and enforce security policies. Review collected by and hosted on G2.com.
Microsoft Defender for Cloud is a paid service, and the cost might be a concern for some organizations, especially small and medium-sized businesses. The pricing structure may not be as affordable for all organizations, compared to some other security solutions in the market. Review collected by and hosted on G2.com.

As a Human Resource Associate, here are some of the things I like about Microsoft Defender for Endpoint:
• It provides strong protection against cyber threats that can compromise employee data and privacy. This is important for HR to safeguard sensitive employee information like personal details, payroll data, PII, etc.
• It has robust detection and response capabilities. It can detect threats even for zero-day malware and provides automated investigation and remediation. This minimizes the workload on HR staff to investigate and respond to security incidents. Review collected by and hosted on G2.com.
As a Human Resource Associate, here are some of the potential downsides or limitations of Microsoft Defender for Endpoint:
• It is designed primarily for Windows endpoints. It may not provide comprehensive coverage if HR uses other platforms like Mac or Linux. Will need additional solutions to protect those devices.
• It can generate a high volume of alerts which may overwhelm HR staff. Fine-tuning the alerting rules and thresholds may be needed to filter out noise. Review collected by and hosted on G2.com.

When there is a suspected data breach, Sentinel can quickly collect and analyze security data from a variety of sources to identify the source of the breach and the extent of the damage. This information can then be used to notify affected employees and take steps to remediate the breach. Sentinel can monitor employee data access logs to identify unauthorized access attempts. This information can be used to investigate potential security incidents and take steps to prevent future unauthorized access. Review collected by and hosted on G2.com.
Microsoft Sentinel primarily focuses on security data collection and analysis, which may not provide HR associates with a comprehensive understanding of employee behavior and potential security risks related to their data access patterns. Microsoft Sentinel's sensitivity to potential security threats may result in an overwhelming number of alerts, making it difficult for HR associates to prioritize and address critical incidents effectively. Review collected by and hosted on G2.com.
Microsoft Sentinel boasts an intuitive user interface, making it easy for data scientists to navigate and interact with complex security data. The platform's design prioritizes clarity and simplicity, facilitating a smoother and more efficient experience in conducting security analyses.
Implementing Microsoft Sentinel is a straightforward process. The platform provides clear documentation and support, allowing data scientists to quickly integrate it into existing workflows. The ease of implementation ensures a faster transition to enhanced security analytics without significant disruptions. Review collected by and hosted on G2.com.
As a data scientist, one aspect of Microsoft Sentinel that I find less favorable is the platform's learning curve, particularly when diving into advanced customizations. While the user interface is generally intuitive, delving into intricate configurations or creating highly customized queries and playbooks may require a steep learning curve. Review collected by and hosted on G2.com.

What I appreciate most about Microsoft Defender for Endpoint is its comprehensive approach to cybersecurity. It seamlessly integrates various advanced security features, such as robust endpoint protection, real-time monitoring, centralized management, and AI-driven threat detection and response. This holistic approach provides a unified and efficient solution that helps organizations stay ahead of evolving cyber threats while offering ease of use and continuous innovation. Review collected by and hosted on G2.com.
Microsoft Defender for Endpoint offers a robust set of security features, some users may find certain aspects to be less flexible or customizable compared to other security solutions. Additionally, managing specific configurations might require a learning curve for those unfamiliar with the Microsoft ecosystem. Review collected by and hosted on G2.com.
Integrated Security Stack: One of the standout features is its integrated security stack, which seamlessly combines various security tools and features. This integration ensures a holistic approach to cloud security, covering aspects from identity and access management to threat detection and response.
Machine Learning Capabilities: Microsoft Defender for Cloud incorporates advanced machine learning algorithms that continually evolve to detect and respond to emerging threats. The ability to leverage machine learning not only enhances the accuracy of threat detection but also allows for proactive security measures.
User-Friendly Security: Navigating the Cloud with Ease Using Microsoft Defender
The user-friendliness of Microsoft Defender for Cloud is a game-changer for data scientists immersed in complex cloud ecosystems. The platform's design prioritizes simplicity without compromising on security robustness. Data scientists can easily navigate through the various features, configure security policies, and gain insights into potential threats without grappling with a steep learning curve. This emphasis on user-friendliness enhances productivity and ensures that cloud security remains a supportive, rather than a hindering, element in their workflow. Review collected by and hosted on G2.com.
From my perspective, one aspect of Microsoft Defender for Cloud that I find less favorable is its occasional tendency to generate false positives in threat detection. While the platform's security measures are robust, the occurrence of false alarms can lead to unnecessary disruptions and investigation efforts, potentially diverting valuable time and resources from more critical data science tasks. Review collected by and hosted on G2.com.