Top Rated Security Alternatives
1,826 Security Reviews
Overall Review Sentiment for Security
Log in to view review sentiment.

Major performance feature is this product is user friendly. user can scan his/her machine with Microsoft Defender easily. Review collected by and hosted on G2.com.
Many wrong forensic capabilities are not present in it. Review collected by and hosted on G2.com.

It's ability to process millions of tracking information in just a few seconds. Review collected by and hosted on G2.com.
There is no solid reason to dislike MS Sentinel. Review collected by and hosted on G2.com.
Defender have the ability to detect sophisticated threats and risks. Also able to detect hardware-based security attacks for example Keylogger, Rubber ducky etc. Review collected by and hosted on G2.com.
The central dashboard should be more appealing and easy to understand to the less-techy peoples. Review collected by and hosted on G2.com.

If you have MS Defender in your device then it makes your device theft free qnd smooth running process and secured MS 365 experience, no malware attack happens, no third party content allowed.Easy integration and smooth end user interface. Review collected by and hosted on G2.com.
Sometimes it blocks third party site to access. Review collected by and hosted on G2.com.

'Automated Investigation and Response (AIR)' is a feature that is most impressive and has proved extremely useful in many incidents within my organization.
'Incident Management' within MDE is very effortless yet very in-depth at the same time. The detailed activity timeline of events and industry-leading threat intelligence for the associated artifacts make it stand aside.
I can assure you that 'Threat Hunting' cannot be more seamless than MDE compared to the other competitor products. Review collected by and hosted on G2.com.
Remediation features are not significantly up to the mark compared to vulnerabilities' in-depth details.
Baseline Assessment is only limited to 2 benchmarks, STIG and CIS. Should expand that coverage.
Instability noticed in updating the status of the device status. Sometimes, MDE shows the devices as 'Inactive' even after 24 to 48 hours of booting up. Review collected by and hosted on G2.com.
The capabilities of Microsoft Defender to detect and monitor vulnerabilities, AV status on all the servers. The advance hunting capabilities provide more ease to get into the details. Review collected by and hosted on G2.com.
To be very honest there is no con associated with MS Defender for Endpoint but I would recommend one feature that it should have is smart tracking of advanced attack patterns such as Randomwares. Review collected by and hosted on G2.com.
- Centralized security solutions for all cloud resources.
- Good support with Azure.
- I am using it in hybrid environment where we scan our infrastructure in AWS as well.
- Get detailed insights.
- Easy Implementations for azure cloud. Review collected by and hosted on G2.com.
- Vulnerability scanner is not as good as tools like nessus.
- Implementations/Integration is very complex for other clouds like AWS and GCP Review collected by and hosted on G2.com.

Real life analytics and monitoring best performance
Integration and azure seamless service
User friendly configuration and management Review collected by and hosted on G2.com.
Customisation limitation,
Azure front door sometimes experiences occasional service outage or disruption. Review collected by and hosted on G2.com.

Microsoft Defender for Identity offers several advantages. It utilizes advanced analytics and machine learning to monitor user behavior, identify suspicious activities, and promptly detect threats. It provides a comprehensive view of user activities and generates alerts when potential security risks are detected, allowing for quick response and investigation. Furthermore, the integration with other Microsoft security solutions, such as Azure Active Directory, enhances the overall security posture of organizations. Review collected by and hosted on G2.com.
Microsoft Defender for Identity is a robust security tool. However, there are several important factors to consider. Firstly, the initial setup and configuration can be intricate, requiring a comprehensive understanding of the environment and the risks associated with identities. Additionally, smaller organizations may need to take into account the cost involved as this solution is part of the Microsoft Defender suite, which entails licensing and subscription fees. Review collected by and hosted on G2.com.