Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Overwatch Alternatives

Overwatch Reviews & Product Details

Overwatch Overview

What is Overwatch?

Overwatch — Security for the Internet of Things and Beyond.

Overwatch Details
Show LessShow More
Product Description

Overwatch — Security for the Internet of Things and Beyond.


Seller Details
Seller
Overwatch
Twitter
@GetOverwatch
154 Twitter followers

Recent Overwatch Reviews

Nishant S.
NS
Nishant S.Small-Business (50 or fewer emp.)
4.5 out of 5
"Over watch review"
It provides real time threat alert with devices and network. Like if we are using this as a service then it's gives alarm at real time with connec...
Verified User
U
Verified UserSmall-Business (50 or fewer emp.)
4.5 out of 5
"Great security solution"
There are different levels of services offered to match up with what you're looking for as well as the price point you are wanting to stay within. ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Overwatch Media

Answer a few questions to help the Overwatch community
Have you used Overwatch before?
Yes

2 Overwatch Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Overwatch Reviews
4.5 out of 5
2 Overwatch Reviews
4.5 out of 5
G2 reviews are authentic and verified.
Verified User in Human Resources
UH
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Overwatch?

There are different levels of services offered to match up with what you're looking for as well as the price point you are wanting to stay within. I like that this is not a "one size fits all" security solution. Review collected by and hosted on G2.com.

What do you dislike about Overwatch?

So far, there is really nothing I can complain about. We are new to the product after our previous solution just wasn't fitting with our needs any longer. The options with this software are a much better match Review collected by and hosted on G2.com.

What problems is Overwatch solving and how is that benefiting you?

Our internet security is always a big obstacle. We do staffing so we have people emailing resumes and documents constantly and it's harder these days to check for threats and breaches that may get into our system which is full of personal information Review collected by and hosted on G2.com.

Nishant S.
NS
Consultant
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Overwatch?

It provides real time threat alert with devices and network.

Like if we are using this as a service then it's gives alarm at real time with connection. Review collected by and hosted on G2.com.

What do you dislike about Overwatch?

Still need to mature and subscription pricing. Review collected by and hosted on G2.com.

What problems is Overwatch solving and how is that benefiting you?

It's solved the my network security problems. It's warn already if something vulnerable is attacking or either we are doing anything wrong with server. Review collected by and hosted on G2.com.

There are not enough reviews of Overwatch for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.3
(91)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.2
(69)
3
AWS IoT Device Defender Logo
AWS IoT Device Defender
4.4
(57)
AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits the security policies associated with your devices to make sure that they aren't deviating from security practices.
4
Azure IoT Hub Logo
Azure IoT Hub
4.3
(44)
Azure IoT Hub is a scalable, multi-tenant cloud platform (IoT PaaS) that includes an IoT device registry, data storage, and security. It also provides a service interface to support IoT application development.
5
Google Cloud IoT Core Logo
Google Cloud IoT Core
4.1
(31)
Google Cloud IoT Core is a fully managed service that allows users to easily and securely connect, manage, and ingest data from millions of globally dispersed devices.
6
AppSealing Logo
AppSealing
4.8
(27)
AppSealing is a trusted player in the world of mobile application security. In today’s application-focused world, security can’t slow down your speed of development. We utilize runtime application self-protection features to build scalable security solutions for your mobile apps business in quick time without 'ANY CODING'. Our powerful security suite ensures real-time in-depth application security like source code protection, anti-reverse engineering, cheat tool & emulator detection/blocking, and enforces app integrity. It protects 800+ mobile apps and 800 million+ devices, successfully blocking 70 million+ threats across the globe. Our esteemed clientele spans across Gaming, Fintech, Movie apps, E-comm, Healthcare, and O2o.
7
Appgate SDP Logo
Appgate SDP
4.8
(26)
Appgate SDP secures the network with a Software-Defined Perimeter's network security model that dynamically creates one-to-one network connections between the user and the resources they access.
8
Azure Sphere Logo
Azure Sphere
4.4
(23)
Azure Sphere is a new solution for creating highly-secured, Internet-connected microcontroller (MCU) devices. It provides a foundation of security and connectivity that allows you to create the intelligent products and experiences that customers love—and get them to market quickly—at a price point that enables the Internet of Things (IoT) at scale.
9
Trellix Embedded Control Logo
Trellix Embedded Control
4.3
(22)
McAfee Embedded Control provides whitelisting and file integrity monitoring technology to combat targeted malware, unauthorized software changes, and configuration alterations across commercial and industrial IoT devices.
10
Corelight Logo
Corelight
4.6
(20)
Corelight provides security teams with network evidence so they can protect the world’s most critical organizations and companies. On-prem and in the cloud, our Open Network Detection and Response Platform enhances visibility and analytics, leading to faster investigations and expanded threat hunting. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Based in San Francisco, Corelight is an open-core security company founded by the creators of Zeek®, the widely-used network security technology.
Show More