Cybereason Defense Platform vs. Microsoft Defender for Cloud

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cybereason Defense Platform
Score 9.1 out of 10
N/A
Cybereason EDR consolidates intelligence about each attack into a Malop (malicious operation), a contextualized view of the full narrative of an attack. Each Malop organizes the relevant attack data into an easy-to-read, interactive graphical interface, providing a complete timeline, the flow of the attack in the network, and any malicious communications. Remediation actions can be automated or accomplished remotely with a click. The Cybereason Defense Platform empowers analysts of all…N/A
Microsoft Defender for Cloud
Score 8.5 out of 10
N/A
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.N/A
Pricing
Cybereason Defense PlatformMicrosoft Defender for Cloud
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cybereason Defense PlatformMicrosoft Defender for Cloud
Free Trial
NoYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Features
Cybereason Defense PlatformMicrosoft Defender for Cloud
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Cybereason Defense Platform
9.0
2 Ratings
6% above category average
Microsoft Defender for Cloud
-
Ratings
Anti-Exploit Technology8.22 Ratings00 Ratings
Endpoint Detection and Response (EDR)9.52 Ratings00 Ratings
Centralized Management9.52 Ratings00 Ratings
Hybrid Deployment Support6.01 Ratings00 Ratings
Infection Remediation10.02 Ratings00 Ratings
Vulnerability Management10.01 Ratings00 Ratings
Malware Detection10.02 Ratings00 Ratings
Best Alternatives
Cybereason Defense PlatformMicrosoft Defender for Cloud
Small Businesses
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10

No answers on this topic

Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cybereason Defense PlatformMicrosoft Defender for Cloud
Likelihood to Recommend
8.6
(2 ratings)
8.4
(31 ratings)
User Testimonials
Cybereason Defense PlatformMicrosoft Defender for Cloud
Likelihood to Recommend
Cybereason
I'd recommend Cybereason due to it's efficacy, low TCO, low false/positive rate. The product was easy to implement and maintain. One of the major advantages of using Cybereason is that it requires minimal training for level 1 users to use the tool.
Read full review
Microsoft
Microsoft Defender is very good while we are enhancing our organization's security, and it is very useful in getting threat alerts and vulnerabilities that can harm our system and users. It is recommended to use this to improve overall security and threat protection of our users and organization. With the help of Microsoft Defender, we get fully covered and secured.
Read full review
Pros
Cybereason
  • EDR
  • Forensics
  • Mitigation
  • Response
Read full review
Microsoft
  • detect and respond to security threats in the cloud environment, reducing the risk of data breaches and unauthorized access.
  • The product assists our organization dealing with sensitive data in achieving and maintaining compliance with data protection rules.
  • The product provides real-time visibility into the cloud environment, offering insights into ongoing security activities.
  • It guarantees that security teams can actively handle possible threats by delivering real-time monitoring and notifications, reducing the impact on business operations.
Read full review
Cons
Cybereason
  • Slow support
  • Bugs on their interface
  • Log extraction
Read full review
Microsoft
  • 'Regulatory Compliance' is definitely an area of improvement for MDC. The complex and high number of controls within a specific framework should allow a more helpful and detailed guidelines in order to tackle them.
  • The limitation of options in the incident management menu of MDC has proven to be a hassle while managing security alerts. For example, an analyst cannot even provide a comment about the actions taken on an incident.
  • There is a missing functionality of connecting other EDR or XDR solutions to MDC which I think should be there for a CSPM tool.
Read full review
Alternatives Considered
Cybereason
Cybereason provides superior protection than either Microsoft or CrowdStrike and a better TCO. We receive less false positives than with Microsoft Defender and Cybereason is easier for level 1 users to use.
Read full review
Microsoft
Defender for Cloud (previously known as Azure Security Center) is a more comprehensive and extensive security solution. Currently, threat analytics make up only a small portion of the whole picture. It encourages a comprehensive picture of the cloud environment across all of its endpoints. For example, firewalls, virtual machine coverage, etc. When compared to the former Threat Analytics, the attack surface of Defender for Cloud is vastly expanded.
Read full review
Return on Investment
Cybereason
  • Helps on threat hunting
  • MalOps is very good
  • When we face a bug, it takes too much time for them to respond
Read full review
Microsoft
  • It creates a great insight in all assets that are available
  • The CSPM makes sure that certain risk that might have been missed are addressed
  • Being able to query across the data gives great insights in threats and possible vulernabilties for CVEs
Read full review
ScreenShots

Microsoft Defender for Cloud Screenshots

Screenshot of Remediation of critical issues in codeScreenshot of Cloud security benchmark mapped to industry FramworksScreenshot of Prioritization of critical risks with contextual threat analysisScreenshot of Workload protectionScreenshot of Unified DevOps VisibilityScreenshot of Visualizations to improve security posture proactively