Top Rated Security Alternatives
1,827 Security Reviews
Overall Review Sentiment for Security
Log in to view review sentiment.

Really easy to setup and depoly using intune or script. The intergration onto intune with conditional access is perferect to manage resource access. Review collected by and hosted on G2.com.
setup has a lot of menus and hidden items in places you dont expect. Like hiding webfilter in the advanced setup area! Review collected by and hosted on G2.com.
It is a solid, efficient, and reliable security tool with the best feature being the real time updates about threats and also the seamless integration with other tools like ServiceNow Review collected by and hosted on G2.com.
Learning how to use Microsoft Defender at first can be a little challenging especially the architecture and integration into other apps like XDR, could be more user friendly Review collected by and hosted on G2.com.
provide advanced security against cyber threats by combining endpoint security, detection, and response capabilities across various Microsoft services.Ease access for portal as single tenent level and easy to implement policy and settings. Review collected by and hosted on G2.com.
Does not have multitenant console and sometimes logs not enough and need always higher end license. Review collected by and hosted on G2.com.

One of the best thing I like about Microsoft Defender is Safe Attachments in email Review collected by and hosted on G2.com.
There is nothing to dislike about Microsoft defender forr Office 365 Review collected by and hosted on G2.com.

Quick overview of the potential threats and valunarabilities via the Dashboard is quite impressive thing that I liked about MS Defender for Endpoint. Review collected by and hosted on G2.com.
The visibility of threats still needs improvement a bit compared to other products in the market. Review collected by and hosted on G2.com.

Microsoft 365 Threat Detection and Protection Integrates with Comprehensive Cloud App Security Policy Enforcement and Compliance, Ease of Management and Deployment. It's critical to consider your organization's unique organizational demands, the current state of cloud apps, and your existing security infrastructure while evaluating Microsoft Defender for Cloud Apps. This tool has all the cloud security aspects covered to keep data and enviornment secured adn safe. Review collected by and hosted on G2.com.
The understanding of features and available integration is littile complex for an end user to understand, if this is improved it will make this tool very handy and more efficient. Review collected by and hosted on G2.com.

Senitel is a service that can be used for security information, security orchestration and automation.
The best thing is its very easy to setup. Can ignest data drom variety of sources
In simple threat detection and analysis made easy Review collected by and hosted on G2.com.
Only issue i have seen is Data query speed is low this can be improvised Review collected by and hosted on G2.com.

the most important thing is the security system and real time alert system for unauthorized access, easy to use and user interface is user friendly.it is also easy to implement Review collected by and hosted on G2.com.
but one thing is that alert system is sometimes not working properly.sometimes it says something is wrong but it's not. Review collected by and hosted on G2.com.

It helped me alot in my work and made easier to investigate the issue from basics.
After learning this, I found that day today useful thing. Firewall is everywhere present, that may cause blocking in your things from downloading or network as well. After learning this you will get to know how to avoid these issues Review collected by and hosted on G2.com.
While learning it feels some clumsy. But if you keep patience, you will learn it in very good way. Time taking Review collected by and hosted on G2.com.

Threat Intelligence and automated response capabilities. Review collected by and hosted on G2.com.
complexity in setup and configuration, which requires additional exploration of docs. Review collected by and hosted on G2.com.