Likelihood to Recommend Armor gives you what you need to be successful regardless of technical ability. If you can maintain the systems yourself, you are definitely ahead of the game with their service. If you're not prepared to configure and maintain the systems, they do a pretty good job of getting it set up during the onboarding process so that you don't need to dig into the technical guts too much. If you find yourself in over your head, their support staff can handle it for you in most cases.
Read full review Microsoft Defender is very good while we are enhancing our organization's security, and it is very useful in getting threat alerts and vulnerabilities that can harm our system and users. It is recommended to use this to improve overall security and threat protection of our users and organization. With the help of Microsoft Defender, we get fully covered and secured.
Read full review Pros Security - we have requirements met right out of the box and the implementation of new resources is done with security in mind. Speed - We can scale resources easy and the infrastructure is fast and efficient. Responsiveness - Support tickets are handled very fast with almost immediate solutions. Read full review detect and respond to security threats in the cloud environment, reducing the risk of data breaches and unauthorized access. The product assists our organization dealing with sensitive data in achieving and maintaining compliance with data protection rules. The product provides real-time visibility into the cloud environment, offering insights into ongoing security activities. It guarantees that security teams can actively handle possible threats by delivering real-time monitoring and notifications, reducing the impact on business operations. Read full review Cons Authentication and access against the secure messaging portal is overkill when the response I'm logging in to see merely says, "yes, we have your message. An agent will respond shortly". There should be an option to receive updates like this through email. The online portal that allows us to clone servers is very slow to respond. More than once I've spun up an additional server due to the lack of visual feedback on the initial request. The web application firewall does not seem to be sophisticated enough to differentiate between logged in administrators and end users. We use a CMS system which allows admins to create scripts. These often get barred by the WAF even though they are not malicious. Read full review 'Regulatory Compliance' is definitely an area of improvement for MDC. The complex and high number of controls within a specific framework should allow a more helpful and detailed guidelines in order to tackle them. The limitation of options in the incident management menu of MDC has proven to be a hassle while managing security alerts. For example, an analyst cannot even provide a comment about the actions taken on an incident. There is a missing functionality of connecting other EDR or XDR solutions to MDC which I think should be there for a CSPM tool. Read full review Support Rating Approximately 50% of all messages we receive are automated. Either that an agent will be assigned, has been assigned, or a ticket is closed. I'd like to see more 'real' interaction, and less box ticking, though I appreciate process has to be followed. That's the one point off. Everything else is very good.
Read full review Alternatives Considered Defender for Cloud (previously known as Azure Security Center) is a more comprehensive and extensive security solution. Currently, threat analytics make up only a small portion of the whole picture. It encourages a comprehensive picture of the cloud environment across all of its endpoints. For example, firewalls, virtual machine coverage, etc. When compared to the former Threat Analytics, the attack surface of Defender for Cloud is vastly expanded.
Read full review Return on Investment It creates a great insight in all assets that are available The CSPM makes sure that certain risk that might have been missed are addressed Being able to query across the data gives great insights in threats and possible vulernabilties for CVEs Read full review ScreenShots Microsoft Defender for Cloud Screenshots