The use cases vary. A lot of it depends on customer requirements and the customer environment. It’s tricky to pin down universal use cases.
Pre-Sales Consultant | Palo Alto Networks. at StarLink - Trusted Security Advisor
Flexible, reliable, and provides for many use cases
Pros and Cons
- "The initial setup is not overly complicated."
- "They need to improve their technical support services."
What is our primary use case?
What is most valuable?
We like that it is a hybrid. It’s flexible. You can really do whatever you need to do.
The initial setup is not overly complicated.
The solution can scale.
It is stable and reliable.
What needs improvement?
They need to improve their technical support services.
For how long have I used the solution?
I’ve been using the solution for about one year.
Buyer's Guide
Cybereason Endpoint Detection & Response
February 2025
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution has been very stable. There are no bugs or glitches, and it doesn’t crash or freeze. It’s reliable. The performance has been good overall.
What do I think about the scalability of the solution?
It is possible to scale the solution. If your company needs to expand, it can do so. It’s not an issue.
How are customer service and support?
Technical support could be better. We’d like to see them be more helpful and responsive in the future.
How was the initial setup?
It’s easier to set up that Cybereason Connect. It’s pretty straightforward. It didn’t take too long to deploy.
What's my experience with pricing, setup cost, and licensing?
I don’t have any insights into the pricing of the product. I don’t handle the licensing aspect of the solution.
What other advice do I have?
I would recommend the solution to other users and organizations. For the most part, we have been pleased with its capabilities.
In general, I would rate the solution eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Technical Consultant at Revel Tech Security Sdn Bhd
A lightweight, yet advanced detection system that keeps our endpoints safe
What is our primary use case?
Our company, as a distributor of the solution, looks into a few criteria that highlight the value of the solution. An important example is the deep hunting threat mechanisms that Cybereason has to offer.
One of the distinctions between Cybereason and many other vendors is that you are able to search easily through various parameters, such as machine ID, user ID, and malicious files.
How has it helped my organization?
Cybereason "communicates" with other endpoints to gather anonymous activities that run within the organization that normal AV fails to detect. It accumulates and compacts this into a single event case, where it is easy for the SOC team to do an investigation. This drastically reduces the time required to find the root cause of the event. This is one of the features that most of the other vendors lack, but allows the SOC team to receive an alert with the relevant details of the incident within a short period of time.
What is most valuable?
The sensors run within the endpoints, where it is lightweight and runs seamlessly in the background. It does not disrupt the work or activities of the end users, yet is able to detect almost any malicious activity running on the spot.
Adding to that, features like the canary files work like bait to any lateral movement case, where the threat actor is lured to "touch" those files. This, in turn, triggers the Malop engine, and immediately sends the alert to the SOC team to take action.
What needs improvement?
The technical support will need to be improved.
For how long have I used the solution?
About a year and a half.
What do I think about the stability of the solution?
I have the utmost respect for the stability of this solution, as it will be ninety-nine percent solid in keeping the endpoints protected from advanced cyber attacks.
How are customer service and technical support?
Since using the solution, post-installation I have not come to a point where I needed to contact their customer service or technical support. I have had no issues with the solution.
Which solution did I use previously and why did I switch?
We have used normal branded AV, which does not seem to be effective nowadays. Adding products to make up for what is lacking can be costly and it will also affect the performance of the endpoint, adding more resources and also time to do an investigation manually. Ultimately, this will affect productivity.
As Cybereason, it is built as NGAV plus EDR, meaning that it is a multi-functional solution that addresses the effectiveness of countermeasures for any cyber attacks. It is an ever-evolving process.
How was the initial setup?
The initial setup is pretty much straightforward. Simply follow the onboarding process as instructed by the vendor. The vendor is available to guide and assist with the onboarding process, and training for using the solution is also provided.
What about the implementation team?
As a distributor of the product, I have seen both vendor and in-house implementations. In the case of in-house deployments, there are clear instructions from the vendor. If issues should arise then they respond quickly to address the issue.
What's my experience with pricing, setup cost, and licensing?
Pricing is based on endpoints to be covered together with licensing. Be sure to make a request for flexibility in pricing.
Which other solutions did I evaluate?
We have evaluated Seqrite Endpoint Security, F-Secure Endpoint Detection and Response, Kaspersky Endpoint Security, Avast Endpoint, and Avira Endpoint Security.
What other advice do I have?
I highly recommend this solution for any organization that is solely depending on normal AV. Cyber attacks are rising exponentially, where tools are more advanced in penetrating the wall of security within the organization. A single hole could lead to devastating effects on the business.
The latest updates are quite user-friendly. This makes it easy to conduct an investigation, which leads to a reduction in time for determining the root cause of the event.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cybereason Endpoint Detection & Response
February 2025
Learn what your peers think about Cybereason Endpoint Detection & Response. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
832,138 professionals have used our research since 2012.
Security Architect at a tech company with 51-200 employees
Provides effective threat detection features and has good technical support services
Pros and Cons
- "The initial setup was straightforward."
- "There is room for improvement in the product features related to device control, particularly USB management."
What is our primary use case?
We use the product for enhancing security postures by leveraging behavioral analytics and security engines effectively minimizing false positives and detecting threats.
What is most valuable?
The product's most valuable features are its effectiveness in threat detection and the small number of false positives it generates. Its nine security engines and contextual descriptions of detected threats are beneficial for our clients' security teams.
What needs improvement?
There is room for improvement in the product features related to device control, particularly USB management.
For how long have I used the solution?
I have been using Cybereason Endpoint Detection & Response for about one and a half years.
What do I think about the stability of the solution?
The product has excellent stability.
What do I think about the scalability of the solution?
The solution scales well, as evidenced by our implementations for large organizations with thousands of users and servers.
How are customer service and support?
The technical support services are good.
Which solution did I use previously and why did I switch?
We have experience working with FireEye and Trellix EDR solutions, as well as Palo Alto. After analyzing functionality and effectiveness, we found Cybereason to be superior.
How was the initial setup?
The initial setup was straightforward. Although we encountered a few issues initially, they were quickly resolved, leading to a smooth overall implementation process.
What about the implementation team?
We implemented the solution as a partner of Cybereason, and our in-house team handled the deployment.
Which other solutions did I evaluate?
We evaluated other options, including Symantec, CrowdStrike, and SentinelOne.
What other advice do I have?
I rate Cybereason Endpoint Detection & Response a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Jul 29, 2024
Flag as inappropriateManager Projects at a tech services company with 10,001+ employees
Malop analysis and the detection part are the most valuable features.
What is most valuable?
Malop analysis and the detection part are the most valuable features.
What needs improvement?
Technical support needs to improve.
For how long have I used the solution?
I have used this solution for around six months.
How is customer service and technical support?
The technical support team is overall good and co-operative.
How was the initial setup?
The setup is straightforward, provided you have the required infrastructure support as prerequisites.
What's my experience with pricing, setup cost, and licensing?
It’s a good product, so you can go for it.
What other advice do I have?
Please go for it as this is an efficient product in the cyber security space.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Consultant at a computer software company with 10,001+ employees
Easy to set up but can be confusing for end-users
Pros and Cons
- "The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
- "The product's reporting isn't great."
What is most valuable?
The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running.
What needs improvement?
One area for improvement is that this solution isn't so easy for the end-user, especially at level 1. Sometimes the information from the product can be confusing for users at both levels 1 and 2. In addition, the product's reporting isn't great, which should be improved.
For how long have I used the solution?
I have been using this solution for about seven months.
How are customer service and support?
Technical support varies on a case-by-case basis, but sometimes it takes a lot of time for them to come back to us with a solution. I would like to see better support in the future.
Which solution did I use previously and why did I switch?
I previously used Trend Micro's antivirus solution.
How was the initial setup?
The initial setup was easy.
What about the implementation team?
I used an in-house EDR team to implement this product.
What other advice do I have?
I would advise trying to cut down on false positives as these can create a lot of issues between teams. I would rate this product as 7.5 out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cybereason Endpoint Detection & Response Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
Cisco Secure Endpoint
IBM Security QRadar
Intercept X Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
Check Point Harmony Endpoint
VMware Carbon Black Endpoint
Huntress Managed EDR
Trellix Endpoint Security (ENS)
Buyer's Guide
Download our free Cybereason Endpoint Detection & Response Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?
- What is the best EDR or XDR product for a company with 9000 employees?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
- How does EternalBlue work?
- What are the best on-premise Endpoint Security solutions for a Tech Services company with 10,000 employees?
- Which is better for Endpoint Security: EDR or XDR solutions?