Arctic Wolf - Another Layer of Protection
January 23, 2024

Arctic Wolf - Another Layer of Protection

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

Arctic Wolf Cloud Detection and Response

Modules Used

  • Arctic Wolf Managed Cloud Monitoring
  • Arctic Wolf Managed Risk

Overall Satisfaction with Arctic Wolf Managed Detection and Response

Agents installed on all end points and servers. Monitoring location, logins and potential malicious file and scripts running. Email alerts sent to specified contacts and phone call if issue severity is high. Location based alerts for 365 accounts will trigger when a user account is accessed outside of whitelisted countries.
  • Monitoring 365 logins
  • Monitoring Windows processes
  • Active Directory monitoring
  • Some erroneous 365 alerts about failed logins
  • Need an easier method to suppress alerts (outside of email)
  • Too many places to look for info in console
  • Stopped unauthorized 365 access on user account
  • Pointed out malicious file activity on end point
  • Alert sent when a domain admin account was enabled
Different product and covers the gaps our other products do not address. CheckPoint does not offer the same security monitoring on emails and AD accounts. Ninja One is used mainly as an RMM. Arctic Wolf is just another layer of security with detailed reports and options our other products do not have.

Do you think Arctic Wolf Managed Detection and Response delivers good value for the price?

Yes

Are you happy with Arctic Wolf Managed Detection and Response's feature set?

Yes

Did Arctic Wolf Managed Detection and Response live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Arctic Wolf Managed Detection and Response go as expected?

Yes

Would you buy Arctic Wolf Managed Detection and Response again?

Yes

Arctic Wolf is a great tool to run in parallel with end point protection. It gives you some good weekly reports on locations, IP addresses, traffic, Active Directory and can be run on demand to categories specified. The quarterly meetings cover quite a bit of information and their support team is always there to assist.