Kaspersky EDR Optimum Review
November 20, 2023

Kaspersky EDR Optimum Review

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Kaspersky EDR Optimum

After our company fell victim to the Akira Ransomware attack, we diligently sought a robust solution to fortify the security of our infrastructure and safeguard our vital information. Our quest led us to discover the Kaspersky EDR Optimum solution. Since its implementation, we've gained a profound sense of security, knowing that we can efficiently confront elusive and sophisticated cyber threats. The Kaspersky EDR Optimum system provides comprehensive visibility into potential threats across all endpoints, empowering us to proactively detect and eliminate these threats. With its arsenal of proactive measures, including isolating devices from the network, conducting IOC scans to hunt for threats, and initiating automatic actions such as critical scans and quarantine/removal, we're equipped to swiftly and effectively respond to any potential security risks.
  • Threat visibility
  • Threat hunting
  • Proactive actions
  • Investigation capabilities
  • Include additional investigation actions like get file etc.
  • Increase time for storage of telemetry data past 30 days
  • Threat hunting
  • Threat visibility
  • Investigation and Response actions
  • Heightened visibility of threats
  • Automated threat response
  • Enhanced comprehension of threats
Kaspersky EDR Optimum's ease of use has significantly streamlined our ability to handle threats. Its user-friendly interface and intuitive controls have expedited our detection process, allowing for quicker identification of potential issues. This, in turn, has enabled us to swiftly analyze threats, diving deeper into their nature and understanding their scope more efficiently. Moreover, its simplified approach hasn't compromised the depth of analysis. We've been able to delve into threats with precision, examining their intricacies without the hassle of navigating through complex interfaces. The quick access to pertinent information has empowered us to make informed decisions rapidly. In terms of response, the ease of use has been a game-changer. With straightforward response mechanisms integrated into the platform, we can respond promptly and effectively. This has led to quicker containment and mitigation of threats, minimizing potential damages and ensuring smoother operations overall. Overall, the user-friendly nature of Kaspersky EDR Optimum has elevated our threat detection, analysis, and response capabilities by making the entire process more efficient and accessible.
Based on our interaction with Kaspersky EDR Optimum's tools, we've had a favorable experience up to this point.
Kaspersky EDR Optimum provides an advanced endpoint security suite equipped with layered protection technologies, top-tier security measures, and automated responses. Kaspersky EDR Optimum stands out from other solutions by being accessible through both cloud-based and on-premises deployment choices, catering fully to isolated environments. Its user interface is intuitive, offering user-friendly navigation, while its investigative tools and responsive actions fulfill all our requirements. Utilizing Kaspersky EDR Optimum and its Sandbox capabilities, safeguards our company against sophisticated threats across all stages, simultaneously cutting down on labor costs.

Do you think Kaspersky EDR Optimum delivers good value for the price?

Yes

Are you happy with Kaspersky EDR Optimum's feature set?

Yes

Did Kaspersky EDR Optimum live up to sales and marketing promises?

Yes

Did implementation of Kaspersky EDR Optimum go as expected?

Yes

Would you buy Kaspersky EDR Optimum again?

Yes

Kaspersky EDR Optimum allows administrators to not only visualize an attack's spread path but also respond to it in just a few clicks, boosting the company's capacity for protection. Thanks to these new options users can quarantine files, isolate hosts to stop any further spread within the network, and scan for Indicators of Compromise (IoC). If an attack has been detected and stopped on one computer, an administrator can find indicators of this compromise across other devices and be able to stop the spread of infection.