Likelihood to Recommend -To track the vulnerability level of a windows network. -To push windows and other application updates from a central location. -Produce reports to highlight work being done to protect a network. In some organizations, you may have to prove for audit reasons you are enforcing policies put into place around cyber-security. This software can help you track work done on an ongoing basis for such purposes.
Read full review Microsoft Defender is very good while we are enhancing our organization's security, and it is very useful in getting threat alerts and vulnerabilities that can harm our system and users. It is recommended to use this to improve overall security and threat protection of our users and organization. With the help of Microsoft Defender, we get fully covered and secured.
Read full review Pros Install an agent to thoroughly scan machines to discover vulnerabilities. Keeps there lists up-to-date with applications outside of windows and lets you know when an update is available. Read full review detect and respond to security threats in the cloud environment, reducing the risk of data breaches and unauthorized access. The product assists our organization dealing with sensitive data in achieving and maintaining compliance with data protection rules. The product provides real-time visibility into the cloud environment, offering insights into ongoing security activities. It guarantees that security teams can actively handle possible threats by delivering real-time monitoring and notifications, reducing the impact on business operations. Read full review Cons It could be a bit of information overload which some things are shown can become noise. Maybe different levels of "security" for lack of a better term may be better where you have a summary vs detailed level when it comes to rating the vulnerability of the entire network. I find I sometimes have issues with PCs on a different network accessed across a VPN where timeouts often occur with very large updates. This aspect can be improved. Read full review 'Regulatory Compliance' is definitely an area of improvement for MDC. The complex and high number of controls within a specific framework should allow a more helpful and detailed guidelines in order to tackle them. The limitation of options in the incident management menu of MDC has proven to be a hassle while managing security alerts. For example, an analyst cannot even provide a comment about the actions taken on an incident. There is a missing functionality of connecting other EDR or XDR solutions to MDC which I think should be there for a CSPM tool. Read full review Support Rating I only tried to access there support once and it was a relatively pain-free process. They also have a lot of documentation available online which can be used to learn and tailor the software to suit your needs. It just takes time and effort to plan, execute and monitor going forward.
Read full review Alternatives Considered WSUS was the other alternative I considered but I believe GFI takes updates, reporting, and functionality to a different level for an enterprise/medium-size business environment.
Read full review Defender for Cloud (previously known as Azure Security Center) is a more comprehensive and extensive security solution. Currently, threat analytics make up only a small portion of the whole picture. It encourages a comprehensive picture of the cloud environment across all of its endpoints. For example, firewalls, virtual machine coverage, etc. When compared to the former Threat Analytics, the attack surface of Defender for Cloud is vastly expanded.
Read full review Return on Investment Certainty. It allows you to know where on your network needs attention. Peace of mind. As security professionals, we can only put the necessary things in place to prevent malicious persons from exploiting a network. The software allows you to know whether or not your risk of exploitation is high or low. and if high what to do with it. Read full review It creates a great insight in all assets that are available The CSPM makes sure that certain risk that might have been missed are addressed Being able to query across the data gives great insights in threats and possible vulernabilties for CVEs Read full review ScreenShots Microsoft Defender for Cloud Screenshots