Likelihood to Recommend
Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through
. Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.
Read full review
If you want to analyze the full path focusing on the signatures it’s the best product in the market. If you want to test phishing, data exfiltration/DLP, DNS I don’t recommend Picus. Scenario based attacks also lacking. However Picus support is awesome and I like the development team. When we open a case, they’ll always return with the right answer
Read full review Pros The speed of identification of threats makes it a highly efficient tool. It works automatically and detects the threats and hence it is time-saving for the people like us who have a lot to manage. Metadata gathering can be done and it is so effective in identifying any kind of anomalies. Integration. Read full review It has thousands of signatures and up-to-date attack vectors (It's the largest set in the market) Attack vectors are mapped with existing vendors like Checkpoint and Mcafee, where you don't spend time finding out which cve mapped to which protection Ability to focus/highlght solely new threats, it's superb for 0days and up-to-date protections. As there are always timing issue between updates and apply the updates on the products. Blocked vs not blocked ratios on the dashboard with drill down menu specifiying the set of protections or signatures on the defensive measures Already mapped mitre att&ck framework on the dasboard. SOC and analyst team using the Mitre framework. Detection analytics enhance the analytics capabilities with pinpoint accuracy where to focus and how to prevent Timeline and scheduled reports from the dashboard in flexible format Read full review Cons Forcepoint Insider Threat functionality meets our needs. No room for improvement. Read full review Visualization of network and the products Complex/Scenario based attacks Phishing tests DNS and Data exfiltration attacks Automatic action through the apis for the products on the path Strategical and tactical reports for Cisos Automatic SOAR entegration with already builtin playbooks Read full review Alternatives Considered
because it provides [the] following benefits as [compared] to others; Modifying or stealing confidential or sensitive information for personal gain. Theft of trade secrets or customer information to be used for business advantage or to give to a foreign government or organization. Sabotage of an organization's data, systems, or network.
Read full review
We use other vendors
etc. All of them have their advantages and disadvantages. Please take a look at TrustRadius reviews of each product. I don’t want to go head to head for each product in this
review. I select Picus because it's local startup company in our region. I like their support and engineering team. Support is marvelous. Product is giving what we expected from the product. Price is adequate. Reporting and dashboard is superb.
Read full review Return on Investment We can detect the riskiest users and can identify abnormal behavior. Our company is enjoying a safe and sound environment. It is time-saving. Not so cost-effective. Read full review With Picus we have the tangible KPIs for the security Detetcion and Prevention rates for the latest attacks are significantly increased We work with many security vendors. We use picus scores and share specific outputs with the company in case of decreasing score rates where the development and product team analyzes their updates or product engines to increase the rates. It helps our strategic plans where to focus and invest for the following years and planning/prioritizing the security budgets to specific highlighted areas Read full review ScreenShots