The main reason we wanted to have an MDR system was to monitor our network both internally and externally for any potential threats or risks that we might have that could create a problem for the business. That's the main reason for it.
I like the solution in part due to the fact that it is Canadian-based, so being from Canada, I like to work with Canadian vendors if possible. It is very comprehensive, and the price point is better than some of the others that I looked at, which were more expensive, for example, Arctic Wolf and eSentire, and some of the other sick security solutions on the market.
We get regular AROs that alert us of anything that we need to be aware of that's happening. The ARO features are really important since they're also ranked by risk. Something that's high or critical would get our immediate attention. And then medium and low, these are things that we know that we need to address. However, we've got a little bit more time to take a look at them. We've got a really small IT team, and I can't afford to have a full-time security person working for me. Having this as a service where their analysts are reviewing the incidents as they come up is helpful. They can help us troubleshoot or understand the source of the issue. That is really, really important for us as we have no way of doing this otherwise with a team of three people.
I like that surveillance is backed by experts who are constantly monitoring for attacks and risks. That's really the key selling point for me. I want my system to be constantly monitored. You want to know what's happening at all times within the network or even on some of our cloud services. For example, we use Microsoft 365. If someone's trying to hack one of our user's accounts, I want to know that that's happening. With this product, I would get an alert for that.
The ease of managing the product is great. I don't do it myself on a day-to-day basis. The team does it. However, the team likes the software. They understand how it works. When they need assistance, they can ask one of the security experts who will help them do the analysis and understand exactly what's happening, why it's happening, and help them resolve the issue. We've activated the active response, so when there's a risk where they see a particular user account that looks like it may have been infiltrated, it will automatically shut that down. That way, if something is happening, they shut the door right away so that if it's a hack or trying to get in, no one is going to get access.
We make use of the tagging of security threats such as actions, recommendations, and observations. We also have the add-ins for Outlook, as phishing has become prolific now. We're getting a lot of phishing emails. We've trained our employees to be alert when they see a phishing email. They know that they can go and click on the Covalence button in Outlook to report that message. The team is alerted that there was a phishing email that came in that way. In addition to that, when they click that button, it asks them a few simple questions about what actions they've taken. For example, did they click on a link? Did they open a document? Did they actually do anything that might be triggering some kind of a virus or something like that in our network? Covalence gets that information, and they can assess if there's a risk there.
We now have a single cybersecurity product that protects all of our threat services, and all the endpoints. East, West, North, South - it covers everything on all of our entry points. That's one of the big selling points is that every endpoint and every access point is covered.
Covalence helps our security team save some time. Since I don't actually have a full-time security team, it's really great. The IT team doesn't really have a lot of time to dedicate to security. And they aren't experts. They're more generalists. Therefore, just having access to true expertise in security is really, really important to me. And they're monitoring 24/7. My guys go home at night; they're not necessarily looking at any of the systems to see if something's going on. Having the alerts that come into all of our phones allows us to see right away if there's a high or critical alert, and we can immediately address it whatever time of day it is.
Besides the AROs that are really specific to my network, I get regular monthly reports. They include, for example, when there's a major threat that's out there that's been identified. They'll send out an email, and I can read up on that and determine if there's any risk to my organization.
Cylance gives recommendations on how to reduce risk. We meet regularly with the Covalence team, and we go over the status of our AROs, some of the situations that happened, any concerns, and things like that. They definitely provide recommendations as well on alert observations. Some of the recommendations are less of a priority for us. However, we definitely want to follow through on those so that we're closing the door on any possible threats.
I'd love the price to be a little bit less. I've been in IT for 25 years and security is obviously causing my budget to really balloon from what it used to be. I'm always looking to make things more cost-effective.
While the interface is pretty good, they could always improve on it and make it more user-friendly. Darktrace, for example, has a really nice interface, however, its functionality wasn't necessarily what we needed.
We originally started using the solution in February or March of 2022. However, I worked with it at a different company as well and used it there since 2019.
We've had no issues with stability at all.
The solution is completely scalable. We went through a growth phase last year, and they were able to keep up with that.
My team has contacted technical support, typically about pretty minor stuff. In the tear we've been on it, we've reached out maybe one to two times. They offer prompt responses. I've never heard anyone complain about them.
It did not replace any cybersecurity solutions. However, we did not have anything like this in place. We did look at alternative solutions before we made the decision to go with Covalence. However, we did not really have much of anything other than your basic antivirus software. We needed proactive instead of reactive security, which is why we chose this product.
While I authorized its use, I was not involved in the initial deployment. My staff was. There were two people who handled the implementation. It was mostly handled by one individual, however.
It's maintained by the vendor, and they do that remotely.
I've never sat down and calculated the ROI.
While they were very competitive compared to some of the other ones we looked at, I'm always looking to reduce my costs.
I'm a customer and end-user.
If someone was interested in an MDR system, I would definitely tell them to look at this product and include them in any vendor comparison that they were doing. They're very comparable to the other bigger, more well-known MDR solution providers out there. They bring a lot to the table. The company was founded with members from the Canadian National Defense. They really know what needs to be done at the highest levels of security, and they were able to take that knowledge and experience and build a solution that is comparable to all of the others out there.
They're a good team to work with. It's really important to me to have a team who are responsive and good to work with.
I'd rate the solution ten out of ten.