Overall Satisfaction with Mandiant Managed Defense
We were looking for Managed Detection & Response solution for our customer as there was issues on clarity of threats , which can not be define Bad & Good by even best technology available in market. MDR services can be a cost effective way to access the necessary detection & response skills and resources without having to recruit, train and retain the internal talent.
- Integration & Protection-Mandiant provide highest degree of integration with Endpoints, Networks ,email & Cloud and Identity solutions an organization already using
- Strong Protection- Mandiant has best threat landscape technology which provide holistic view of security & Protection.
- Due to split from FireEye Mandiant no longer can provide its own End Point Protection as part of MDR for customers that want to transition after incident is complete .
- Single remediation response with no-ongoing monitoring
Do you think Mandiant Managed Defense delivers good value for the price?
Yes
Are you happy with Mandiant Managed Defense's feature set?
Yes
Did Mandiant Managed Defense live up to sales and marketing promises?
Yes
Did implementation of Mandiant Managed Defense go as expected?
Yes
Would you buy Mandiant Managed Defense again?
Yes
- Mandiant is strong on automated remediation & rollback
- Predictable Pricing Rapid Response is sold as fixed days term license this takes way risk of hourly billing and runway costs
Mandiant MDR includes authorized hands on keyboard response , The defendor experts for Hunting services does not include managed response, only hunting detection and alerting.
Unlike Mandiant ,\Microsoft will not offer detection and response based on third party product data. Nor does Microsoft have the capability to add Network detection & response for analyzing both clear and encrypted network traffic.
Unlike Mandiant ,\Microsoft will not offer detection and response based on third party product data. Nor does Microsoft have the capability to add Network detection & response for analyzing both clear and encrypted network traffic.