Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses.
There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream.
Nozomi Networks is a leading solution for enhancing cybersecurity in industrial control systems (ICS) and operational technology (OT). It offers robust threat detection, monitoring, and visibility into network activities, essential for securing critical infrastructure. Key use cases include detailed asset management and compliance with industry standards, all facilitated by the platform's real-time anomaly detection capabilities.
Users highly value its features such as comprehensive asset discovery, which identifies all devices in the network, and real-time monitoring that provides instant alerts for any anomalies. Advanced threat detection powered by machine learning algorithms ensures that the network remains secure from potential attacks. Moreover, the intuitive user interface simplifies cybersecurity management, enabling administrators to navigate and utilize the platform effectively.
Nozomi Networks has notably improved organizational workflows, enhancing efficiency, productivity, and communication. Automating routine tasks frees teams to focus on strategic activities, thereby contributing positively to achieving organizational goals and overall operational performance.
I have not seen any competition in terms of pricing, and it is quite reasonable.
The solution's pricing is good and cheaper than that of Claroty.
I have not seen any competition in terms of pricing, and it is quite reasonable.
The solution's pricing is good and cheaper than that of Claroty.
The Claroty Platform is designed to enhance cybersecurity in industrial settings by monitoring and securing control systems and operational technology. It provides deep visibility into OT networks, critical for detecting vulnerabilities and unauthorized activities.
Users benefit from its anomaly detection capabilities, swiftly addressing potential threats. The platform supports regulatory compliance through detailed audits of network activities and changes. Praised for its asset management, Claroty helps maintain an accurate device inventory, fundamental for robust cybersecurity posture management.
Key features include an intuitive interface and robust reporting tools that deliver insights and analytics, driving informed decisions and ensuring compliance. Users report that Claroty has significantly improved operational efficiency and productivity in their organizations.
It's a bit expensive compared to other solutions.
The tool is quite expensive.
It's a bit expensive compared to other solutions.
The tool is quite expensive.
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
It's not too expensive.
If you want to have all of the good features then you have to pay extra for licensing.
ExtraHop Reveal(x) is a highly effective network traffic analysis (NTA) solution that leverages a cloud-native architecture to empower organizations to overcome a world filled with increasingly sophisticated threats. It identifies 25% more threats than its competitors. Additionally, organizations that employ Reveal(x) say they resolve issues 77% percent faster than they would if they were using other similar solutions.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
I would rate the price a three out of five. It could be less expensive.
The solution is based on an annual subscription model and is expensive.
Check Point IPS is an intrusion prevention system that aims to detect and prevent attempts to exploit weaknesses in vulnerable systems or applications. The solution provides complete, integrated, next-generation firewall intrusion prevention capabilities at multi-gigabit speeds with a low false positive rate and high security. It helps organizations secure their enterprise network, and protect servers and critical data against known and unknown automated malware, blended threats, and other threats.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
I think that the price of support is around $40,000 USD or $50,000 USD per year.
The price of this product should be reduced.
Get in-depth operational technology (OT) asset visibility to better understand, manage and reduce your cyber risk. Tenable OT Security (formerly Tenable.ot) is an industrial security solution for your modern industrial enterprise. It can help you identify assets in your OT environment, communicate risk, prioritize action and enable your IT and OT security teams to work better together.
The product is inexpensive.
The tool's pricing is fair enough.
The product is inexpensive.
The tool's pricing is fair enough.
Microsoft Defender for IoT is a specialized asset discovery, vulnerability management, and threat monitoring solution for IoT/OT environments. Defender for IoT is an open system that also works with tools such as Splunk, IBM QRadar, and ServiceNow.
Zscaler Cloud IPS enables you to have all threat and alert data in one place. Full user, file and app context is available. Streaming to a SIEM allows further integration into the SOC ecosystem.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
The software has become more expensive at present.
The product is not affordable for small and medium enterprises.
OT network connectivity has become a mandatory business requirement. It requires a shift in the security mindset from “How can I air gap or isolate?” to “How can I stay secure while connected?”
CyberX helps secure the Industrial Internet by providing complete visibility into the OT Network as well as real-time detection and alerts of operational incidents, cyber threats and system tampering, in order to minimize disruption to operations and downtime. Seamlessly connecting to an existing OT network, our flagship platform, XSense, provides instant results by collecting data from across the OT environment utilizing Big Data and Machine Learning to optimize the detection of operational behaviors. Supporting security needs of industries such as energy and utilities, oil and gas, chemical and pharmaceuticals, manufacturing, transportation and more, XSense monitors physical devices to detect operational incidents and cyber-attacks.
MetaDefender OT Security gives you full visibility into your organization’s OT assets and networks by continuously discovering assets, monitoring for threats, vulnerabilities, supply chain violations, and non-compliance issues.
Waterfall Security Solutions Enhances Support For Osisoft Pi and continues to invest in secure IT/OT integration.
This is an expensive solution.
This is an expensive solution.
OTORIO's RAM² is an OT security solution with a unified framework built to help you proactively manage cyber security risks, build resilient operations, and future-proof operational environments.
In the hyper-connected enterprise, in which everything from simple IoT devices to complex multi-million-dollar systems are connected, traditional agent-based and human-generated security models simply cannot scale. Ordr solves this problem, providing enterprises with complete visibility and exhaustive control over every class of network-connected device and system. The Ordr Systems Control Engine is the only purpose-built solution to fully map the device flow genome at massive scale, using machine learning to completely and continuously inspect, classify and baseline the behavior of every device. Ordr’s software architecture is unique in its ability to process enormous quantities of data in real-time, using sophisticated AI to deliver closed loop security, automatically generating policies for each class of device and implementing those policies directly through the organization’s existing multi-vendor network and security infrastructure.