Corporate Vice President | Deputy Chief Information Security Officer at NCR Voyix
Real User
Top 20
2024-07-01T11:42:00Z
Jul 1, 2024
Over the years, we've needed to shift our use case, which is actually an advantage. We use Binary Defense to supplement and extend our monitoring capabilities across our enterprise. They're very flexible. They use our tooling and they monitor escalated issues. They do threat hunting for us. They do threat research for us as well. They provide threat intelligence when there's a breaking zero-day threat or if something new is happening in the security space. They provide deep technical expertise in detection, threat hunting, and intelligence in a way that directly covers what I need.
Cyber Security Engineer at a manufacturing company with 10,001+ employees
Real User
Top 20
2024-01-05T14:38:00Z
Jan 5, 2024
With Binary Defense MDR we check and handle security issues, closing ones that are okay and acting fast on potential problems. It is all about keeping things safe and responding quickly to any cyber threats.
Senior Manager of Information Technology and Security at Fathom
Vendor
Top 10
2023-12-07T19:22:00Z
Dec 7, 2023
We rely on Binary Defense MDR to protect our servers and employee computers from malware. It keeps a constant watch and lets us know quickly if there is any suspicious activity.
Infrastructure and Security Services Director at a manufacturing company with 1,001-5,000 employees
Real User
Top 20
2023-06-09T13:35:00Z
Jun 9, 2023
We use it to get security notifications. There are only two security people on my team, and monitoring things 24/7 would take a team of 10 or 12. We use Binary Defense to help monitor things for us so that my team can work on the day-to-day security tasks.
Head of Cybersecurity at a sports company with 501-1,000 employees
Real User
Top 20
2023-05-16T18:39:00Z
May 16, 2023
We're using it for dark web monitoring and alerting for our executive staff and our organization, and we're also utilizing them to actually manage and run our security operations center.
IT VP at a manufacturing company with 1,001-5,000 employees
Real User
Top 20
2023-05-12T12:48:00Z
May 12, 2023
We use Binary Defense to secure our environment against cyber threats. The solution provides 24/7 live monitoring. The solution currently covers around 3,000 endpoints.
Senior Manager, Cybersecurity at a energy/utilities company with 501-1,000 employees
Real User
Top 20
2023-04-28T19:05:00Z
Apr 28, 2023
We use Binary Defense MDR to monitor our security alerts and network traffic continuously. The solution provides a monitoring service that includes initial triage of alerts and escalation to my team for further action.
AVP, IT Security Compliance and Audit/Information Security Officer at Western Reserve Group
Real User
Top 10
2023-04-24T19:49:00Z
Apr 24, 2023
We're a small business, but we have a large number of endpoints to control. For an analyst, it's a large task if you have a thousand endpoints. So, we use the BDS tool, and we use them as a SOC for our tier one and tier two support. They take all our alerts and vet them, and then only give actionable ones to either my analyst or myself. We're a Cisco shop. I'm kind of old-fashioned, so I've got layered security in the organization. We've tied that all into the MDR solution, so not only do I have their tools, but I have our tools mixed in there. We have a very good view of the whole organization. If something were to happen, we should be able to catch it before it gets to the second endpoint if it's able to get that far.
IT Security Manager at a wholesaler/distributor with 1,001-5,000 employees
Real User
Top 20
2023-03-21T16:16:00Z
Mar 21, 2023
We're a big company with a small IT shop, specifically when it comes to IT security. We needed a partner that could be an extension of our exsisting team.
Senior Information Security Analyst at a manufacturing company with 10,001+ employees
Real User
Top 10
2023-02-22T19:10:00Z
Feb 22, 2023
Binary Defense provides us with Security Incident and Event Management (SIEM), managed by their third-party SOC team. They are our MDR provider that provides MSSP services; they review the alerts coming into our SIEM from all our devices across the globe, then translate those into alerts and incidents, and elevate them to my internal team, and we take care of it from there. Our environment is global, with three primary regions: Asia-Pacific, Europe, and North America. We have several remote sensors in each area, with intrusion detection sensors at some locations.
Binary Defense provides a Managed Detection and Response service using an Open XDR strategy that detects and isolates threats early in the attack lifecycle. Expert security analysts in the Binary Defense Security Operations Center leverage an attacker’s mindset, monitoring your environments for security events 24x7x365 and acting as an extension of your security teams. When a security event occurs, Binary Defense analysts triage, disposition, and prioritize the event. Analysts conduct...
Over the years, we've needed to shift our use case, which is actually an advantage. We use Binary Defense to supplement and extend our monitoring capabilities across our enterprise. They're very flexible. They use our tooling and they monitor escalated issues. They do threat hunting for us. They do threat research for us as well. They provide threat intelligence when there's a breaking zero-day threat or if something new is happening in the security space. They provide deep technical expertise in detection, threat hunting, and intelligence in a way that directly covers what I need.
We use Binary Defense to monitor all our devices, including our servers, laptops, and environments.
With Binary Defense MDR we check and handle security issues, closing ones that are okay and acting fast on potential problems. It is all about keeping things safe and responding quickly to any cyber threats.
We rely on Binary Defense MDR to protect our servers and employee computers from malware. It keeps a constant watch and lets us know quickly if there is any suspicious activity.
We use it to get security notifications. There are only two security people on my team, and monitoring things 24/7 would take a team of 10 or 12. We use Binary Defense to help monitor things for us so that my team can work on the day-to-day security tasks.
We're using it for dark web monitoring and alerting for our executive staff and our organization, and we're also utilizing them to actually manage and run our security operations center.
We use Binary Defense to secure our environment against cyber threats. The solution provides 24/7 live monitoring. The solution currently covers around 3,000 endpoints.
We use Binary Defense MDR to monitor our security alerts and network traffic continuously. The solution provides a monitoring service that includes initial triage of alerts and escalation to my team for further action.
We're a small business, but we have a large number of endpoints to control. For an analyst, it's a large task if you have a thousand endpoints. So, we use the BDS tool, and we use them as a SOC for our tier one and tier two support. They take all our alerts and vet them, and then only give actionable ones to either my analyst or myself. We're a Cisco shop. I'm kind of old-fashioned, so I've got layered security in the organization. We've tied that all into the MDR solution, so not only do I have their tools, but I have our tools mixed in there. We have a very good view of the whole organization. If something were to happen, we should be able to catch it before it gets to the second endpoint if it's able to get that far.
We're a big company with a small IT shop, specifically when it comes to IT security. We needed a partner that could be an extension of our exsisting team.
Binary Defense provides us with Security Incident and Event Management (SIEM), managed by their third-party SOC team. They are our MDR provider that provides MSSP services; they review the alerts coming into our SIEM from all our devices across the globe, then translate those into alerts and incidents, and elevate them to my internal team, and we take care of it from there. Our environment is global, with three primary regions: Asia-Pacific, Europe, and North America. We have several remote sensors in each area, with intrusion detection sensors at some locations.