Cofense Triage "An Amazing show stopper for Phishing mails"
October 20, 2021

Cofense Triage "An Amazing show stopper for Phishing mails"

Nishant Aggarwal | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cofense Triage

Cofense Triage is used in our organization for investigation over the reported phishing emails. It is quite an effective tool to analyze the headers for the mail and detect if it is suspicious in nature. There are options to set up parameters in accordance with the organization which helps to prioritize the phishing emails' severity. Also, integration with Cofense Vision helps to quarantine the mail from the inbox.
  • Email Header Analysis and severity prioritization.
  • Intel fetch for the latest threats in the wild.
  • Auto Quarantine mails after integration with Cofense Vision.
  • User Interface.
  • Rule making should be in high level language.
  • Integration with SOAR.
  • Saved Time.
  • Saved Active breaches.
  • Overall the user awareness.
Cofense Triage has a much better GUI and rate of understanding the mails when reported by the user. The overall setup with other Cofense products gives an excellent opportunity to complete the email security suite of the organization. The info and intel provided within Cofense Triage are fair enough most of the time to come to final conclusion.

Do you think Cofense Triage delivers good value for the price?

Yes

Are you happy with Cofense Triage's feature set?

Yes

Did Cofense Triage live up to sales and marketing promises?

Yes

Did implementation of Cofense Triage go as expected?

Yes

Would you buy Cofense Triage again?

Yes

Cofense Triage is highly suited in an organization where the email gateway has missed a potential phishing mail and the SOC needs to do further analysis to figure out whether it was malicious or not. This really helps to avoid the risk of a compromise and removal of breached emails from the organization.

Cofense Triage Feature Ratings

Integration with Other Security Systems
9
Attack Chain Visualization
10
Centralized Dashboard
8
Live Response for Rapid Remediation
10