Best Software for 2025 is now live!
Product Avatar Image

Arctic Wolf Networks

Show rating breakdown
222 reviews
  • 6 profiles
  • 11 categories
Average star rating
4.6
#1 in 1 categories
Grid® leader
Serving customers since
2012
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Arctic Wolf

157 reviews

Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.

Product Avatar Image
CylanceENDPOINT

57 reviews

CylanceENDPOINT transforms your organization to become self-defending from all types of cyberthreats from file-based malware to sophisticated script and memory attacks. In addition to providing complete visibility into attacks attempting to camouflage their actions amongst trusted components while simplifying investigation and response by grouping and prioritizing alerts and providing simple workflows and templates empowering junior analysts to operate as seasoned professionals. All of this is offered through an operationally efficient solution that ensures protection across all device types and whether online or offline.

Product Avatar Image
Stridepoint LMS & Compliance Courses

8 reviews

Stridepoint's LMS and Courses cover a wide range of topics with the ability to customize and brand content. Our LMS is easy to use and can be integrated with SSO and other APIs. Our courses cover a wide range of topics, or you can contract us to create one for you. You can host the courses you need in our LMS or we can make them portable to be used in yours. Course categories include: HIPAA, FERPA, FMLA, Sexual Harassment, Anti-Money Laundering, Title IX, GLBA, PCI.

Product Avatar Image
Arctic Wolf Incident Response Services

3 reviews

Product Avatar Image
Relay

1 review

Relay by Stridepoint is Managed Security Awareness. Our micro-learning content is delivered directly to a user's inbox via direct links. All the user has to do is click "launch" to immediately begin a session that is always 3minutes or less. No user logins. No user passwords. Hands-off Phishing Simulation. Gamification. All tracked. Admins have a dashboard that provides at-a-glance reporting and alert tools to keep your organization focused on creating a culture of security.

Product Avatar Image
Stridepoint Social Engineering Audits

0 reviews

Stridepoint has a team of social engineering experts with over 15 years of experience. Our audits are the real deal. We are real experts using real-world scenarios and making real calls to assess and test your people. Our Social Engineering Audits - Determine susceptibility to Social Engineering attacks in the areas of phone/vishing, phishing, and suspicious links. - Develop highly specialized training to help employees defend against Social Engineering - Uncover previously unknown risks and vulnerabilities - Create a baseline to compare future Social Engineering assessments - Reinforce behavior which successfully thwarts Social Engineering attempts in order to build a strong Culture of Security.

Profile Name

Star Rating

187
28
6
2
3

Arctic Wolf Networks Reviews

Review Filters
Profile Name
Star Rating
187
28
6
2
3
Paul G.
PG
Paul G.
Cyber Security and Forensics Engineer at Volkswagen Group, Region Americas; GIAC Advisory Board Member
01/20/2016
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

Cylance: next Generation Endpoint Protection

As a young company, Cylance is very eager to please and this translates very well when working with a company for the first time. The technology is amazing and truly has to be seen to be really appreciated.

About

Contact

HQ Location:
Eden Prairie, MN

Social

@AWNetworks

What is Arctic Wolf Networks?

Every year new technologies, vendors, and solutions emerge—yet despite this constant innovation, high-profile breaches are all over the headlines.In response, organizations have scrambled to develop a better security posture, but the dizzying array of options leaves resource-constrained IT and security leaders wondering how to proceed.Enter Arctic Wolf, the market leader in Security Operations.Using the cloud-native Arctic Wolf Aurora Platform, we help organizations end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, Managed Security Awareness, and Incident Response; each delivered by our Concierge Delivery Model. Highly-trained security experts work as an extension of internal teams to provide 4×7 monitoring, detection and response, as well as ongoing risk management to proactively protect organizations while continually strengthening their security posture.

Details

Year Founded
2012