"The great tool for threat mitigation. Simple and easy to use"
Our organization is pleased to say that the tool has enhanced our security standards greatly. It ensures that our users only access approved web categories and they remain safe while browsing the Internet which gives reliability to our working structure
"The Cadillac of Secure Web Gateways"
Over all from the product experience and the versatility the Bluecoat Proxy does an exceptional job. Whatever we can think of doing to enhance security posture of our network security environment stand point the proxy has features and solutions to make it work. The appliance is very capable in it's purpose, hence, today is deemed the Cadillac of secure web gateways.
"Great Identity Management solution"
MIM is a great Identity management tool. Very flexible with different HR solutions and provides the customization we require to reach to all of our existing systems. The integrations and management are intuitive. Highly recommend over other Identity Management solutions.
"Fast, effective, automated security efficacy testing"
I have been wanting a product that can test the efficacy of my various security products, and identify any weaknesses in either those products or the policies applied to them. However, I initially approached Cymulate on the recommendation of an EDR vendor with whom I was running a POC. They suggested getting a trial running as other customers of theirs have been using Cymulate effectively as well. I ended up talking with sales pretty quickly to setup a Cymulate POC which we ran at the same time as our EDR. We have been slowly adding capabilities to the testing including our email security service recently. Cymulate updates their checks almost daily, so I run tests against my selected devices automatically as new Immediate Threats are released, and one larger test weekly. The reporting is easy to use and understand, and it ties back to our EDR to determine if the EDR alerted or killed/quarantined the simulation. This product does require a good understanding of how the tools you are testing work. For instance, our EDR looks at files once they begin execution so simply dropping a malicious file on the test system will not necessarily trigger it. If I add hashes to the blocklist it will. The system also provides another avenue of intelligence for my team, and we can determine which of the new threats we need to pay more attention to than others.
"Excellent endpoint security for enterpise segments"
We installed Quick heal endpoint security 2 years back and we really surprised to use the product. They have excellent Dlp,email security anti-spam features to secure your web trafficking security attacks. Along with robust solution, they do have excellent 24/7 support and solve all concerns in a short span of time
"Saves both Time and Money ... The best investments for businesses managing PCs."
Patch My PC is simple to use, easy to configure, and most of all you can set it and forget it, with the exception of going back from time to time to update select new applications that have been added to the catalog. We looked at competitors but nothing else compared to the product being offered by Patch My PC for the price or the simplicity of setup and operation.
"A strong contender with public interest at heart in the BAS market"
I have rarely worked with an organization that takes customer success as seriously as these guys, even when signed up for the long haul. This fact, coupled with the freely available AttackIQ Academy for training and their commitment to adding additional value to the platform makes me happy to have renewed an already existing multi-year engagement.
"The product filled a human resource gap for testing attack signatures on security devices"
I am using the product in banking environment for 3 months in current company and used in my former employer company about a year. The product has provided wide visibility about our current defansive security devices and policies. We could see better what we were missing about our environment. As a finance company we don't have enough human resource for testing every attack signature in production environment manually. The product has filled that gap for us.
This IBM security tool helps us to control our database so that only authorized users can access the records in the database. It a great tool used across every department within our organization. It's a tracking tool that grants you access to each individual accounts for monitoring.
"Great Help for Achieve CISSP Certification"
CISSP boot camp is most helpful online course for the CISSP certification this program is lot help for passed my CISSP certification and this online course has valuable and useful instructions to pass the CISSP certification.
"Stormshield - stability and great support."
We use over 20 units of Stormshield UTMs in our organisation. They are all connected through VPN tunnels providing secure network for all users. After almost two years I can say that these devices are stable and efficient. Support is good and in local language.
"Pentera Automated Security Validation -- Best of its Class!"
My experience with Pentera has been fantastic. It has integrated perfectly in our environment leading us to discovering & remediating numerous vulnerabilities. It has scaled well in my company with the ability to create remote attack nodes. Kicking off a pen-test or vulnerability assessment has been extremely simple and has had little to no impact on users in our environment.
This research requires a log in to determine access