Darktrace is a leading cybersecurity solution that leverages artificial intelligence and machine learning to provide advanced threat detection, response, and risk management capabilities. Many reviewers find Darktrace's AI and machine-learning capabilities to be valuable. They appreciate its ability to detect anomalies and threats that might go unnoticed by traditional security tools. Overall, the general sentiment towards Darktrace from reviewers is positive. Users seem to appreciate its scalability, stability, AI capabilities, visibility, and ease of use.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
It is inexpensive considering what it can do and the competition.
If you consider the features and the cost of market leaders, we are satisfied with the pricing.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
We buy the licensing on a yearly basis, when we renew our contract. It is around $14,000.
The price for additional throughput is the highest in the industry.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
We have a three-year license for this solution.
Licensing for this solution is paid on a yearly basis.
The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.
The licenses for this solution are expensive.
The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.
The licenses for this solution are expensive.
Proofpoint Identity Threat Defense is a comprehensive solution designed to protect organizations from identity-based cyber threats. Its primary use case is to detect and prevent attacks that exploit compromised user credentials. By analyzing user behavior and assessing the risk associated with each identity, it identifies and stops threats like account takeover, business email compromise, and insider threats.