Senior Manager Security Operation Center at The Bank of Punjab
Real User
Top 5
2024-05-14T08:01:06Z
May 14, 2024
It was easy to integrate the tool with our infrastructure because all the APIs are pre-built. We just created a drag-and-drop prompt to integrate the solution with our infrastructure. I rate the overall solution a ten out of ten. Everyone needs to evaluate this solution according to their organization's needs because it can integrate well, but this depends on the technology you already have in your organization. It is an automation tool for detection and response, and while integration is possible, using legacy products could create issues. Some legacy products are closed systems and do not expose their APIs to other vendors. In such cases, you could run into problems. If you are considering this solution, check which APIs are available before you proceed. Otherwise, you may get the solution, but you must spend time on integrations. They provide integration support, but it's not automatic; it will take time.
Senior Manager Security Operation Center at The Bank of Punjab
Real User
Top 5
2023-12-11T10:56:50Z
Dec 11, 2023
Before committing, I recommend a Proof of Concept (POC) or demo first. This way, you can see if the product aligns with your specific use cases and security needs. Knowledge transfer is key, and D3 Security's team excels in this area. During the POC, your analysts gain valuable product knowledge, putting them ahead of the curve for deployment. In our case, the learning curve was steep initially, but by the end of the POC, my team was already building playbooks independently. D3 Security also schedules dedicated knowledge transfer sessions during the POC, making it a win-win for both parties. Since technology transfer is crucial for government entities like ours, this approach eliminates the need for additional learning after deployment, unlike with certain competitors like the Fortinet FortiSOAR case. While Fortinet FortiSOAR achieved the desired tasks, its knowledge transfer process was lacking, leaving us with a shaky foundation. D3 Security's approach solidifies the learning and empowers our team. Overall, I would rate the solution an eight out of ten.
Security Incident Response tools are a category of software solutions designed to assist organizations in detecting, analyzing, and responding to security incidents effectively.
It was easy to integrate the tool with our infrastructure because all the APIs are pre-built. We just created a drag-and-drop prompt to integrate the solution with our infrastructure. I rate the overall solution a ten out of ten. Everyone needs to evaluate this solution according to their organization's needs because it can integrate well, but this depends on the technology you already have in your organization. It is an automation tool for detection and response, and while integration is possible, using legacy products could create issues. Some legacy products are closed systems and do not expose their APIs to other vendors. In such cases, you could run into problems. If you are considering this solution, check which APIs are available before you proceed. Otherwise, you may get the solution, but you must spend time on integrations. They provide integration support, but it's not automatic; it will take time.
Before committing, I recommend a Proof of Concept (POC) or demo first. This way, you can see if the product aligns with your specific use cases and security needs. Knowledge transfer is key, and D3 Security's team excels in this area. During the POC, your analysts gain valuable product knowledge, putting them ahead of the curve for deployment. In our case, the learning curve was steep initially, but by the end of the POC, my team was already building playbooks independently. D3 Security also schedules dedicated knowledge transfer sessions during the POC, making it a win-win for both parties. Since technology transfer is crucial for government entities like ours, this approach eliminates the need for additional learning after deployment, unlike with certain competitors like the Fortinet FortiSOAR case. While Fortinet FortiSOAR achieved the desired tasks, its knowledge transfer process was lacking, leaving us with a shaky foundation. D3 Security's approach solidifies the learning and empowers our team. Overall, I would rate the solution an eight out of ten.