Mandiant Threat Intelligence
October 10, 2023

Mandiant Threat Intelligence

Sunil Redekar | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Mandiant Advantage Threat Intelligence

It gives high visibility of threats. We are using it in our organization mostly for incident response and its analysis. We also use it as a sandboxing. We also use same device for vulnerability detection and its remediation. It has high visibility of all ongoing threats that are currently active
  • Threat Detection
  • Vulnerability Remediation
  • Sandboxing
  • Require more options for view on device dashboard
  • Require quick support in analysis
  • Threat campaign feature visibility
  • Compact dashboard
  • Vulnerability analysis
  • All known threat detection
It gives more ways to analyze threats and options to fixed it. This device gives more visibility on vulnerability detection and its analysis. It provides detailed reports to have more information of all malwares which help us to increase overall security of our current organization.
As per my view, It has more options for threat detection and analysis than other products in market.

Do you think Mandiant Advantage Threat Intelligence delivers good value for the price?

Yes

Are you happy with Mandiant Advantage Threat Intelligence's feature set?

Yes

Did Mandiant Advantage Threat Intelligence live up to sales and marketing promises?

Yes

Did implementation of Mandiant Advantage Threat Intelligence go as expected?

Yes

Would you buy Mandiant Advantage Threat Intelligence again?

Yes

This device is well suited for threat analysis in our organization. It has very high visibility of all threats going on currently across the world from most of the countries. It has very excellent graphical view for more detailed analysis for our environment. We used in our organization for vulnerability analysis

Mandiant Advantage Threat Intelligence Feature Ratings

Network Analytics
8
Threat Recognition
8
Vulnerability Classification
7
Automated Alerts and Reporting
7
Threat Analysis
6
Threat Intelligence Reporting
8
Automated Threat Identification
8
Infection Remediation
7