Likelihood to Recommend Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through
Forcepoint . Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.
Read full review If you want to analyze the full path focusing on the signatures it’s the best product in the market. If you want to test phishing, data exfiltration/DLP, DNS I don’t recommend Picus. Scenario based attacks also lacking. However Picus support is awesome and I like the development team. When we open a case, they’ll always return with the right answer
Read full review Pros Establishment of normal user behavior and early indication of a potential risk when a user starts to stray from normal activity. Automatically identify the riskiest user. Provides context as a prove to investigation. Read full review It has thousands of signatures and up-to-date attack vectors (It's the largest set in the market) Attack vectors are mapped with existing vendors like Checkpoint and Mcafee, where you don't spend time finding out which cve mapped to which protection Ability to focus/highlght solely new threats, it's superb for 0days and up-to-date protections. As there are always timing issue between updates and apply the updates on the products. Blocked vs not blocked ratios on the dashboard with drill down menu specifiying the set of protections or signatures on the defensive measures Already mapped mitre att&ck framework on the dasboard. SOC and analyst team using the Mitre framework. Detection analytics enhance the analytics capabilities with pinpoint accuracy where to focus and how to prevent Timeline and scheduled reports from the dashboard in flexible format Read full review Cons Visualization of data Options are hard to find Integration with Active directory Read full review Visualization of network and the products Complex/Scenario based attacks Phishing tests DNS and Data exfiltration attacks Automatic action through the apis for the products on the path Strategical and tactical reports for Cisos Automatic SOAR entegration with already builtin playbooks Read full review Alternatives Considered Powerful tool with smart data collection that helps us to automatically detect when a user strays into abnormal behavior and the integration with Forcepoint DLP which has helped us to quickly drive to smarter decision after detecting risky user behavior and the video collection and playbacks helps a lot during investigation.
Read full review We use other vendors
Verodin , AttackIQ,
SafeBreach ,
Cymulate etc. All of them have their advantages and disadvantages. Please take a look at TrustRadius reviews of each product. I don’t want to go head to head for each product in this
review. I select Picus because it's local startup company in our region. I like their support and engineering team. Support is marvelous. Product is giving what we expected from the product. Price is adequate. Reporting and dashboard is superb.
Read full review Return on Investment Licenses are bundle up. User based licensing. Renewal cost is almost same as purchasing cost. Read full review With Picus we have the tangible KPIs for the security Detetcion and Prevention rates for the latest attacks are significantly increased We work with many security vendors. We use picus scores and share specific outputs with the company in case of decreasing score rates where the development and product team analyzes their updates or product engines to increase the rates. It helps our strategic plans where to focus and invest for the following years and planning/prioritizing the security budgets to specific highlighted areas Read full review ScreenShots