Good security tool for the price
March 02, 2020

Good security tool for the price

chris maddox | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User

Overall Satisfaction with SolarWinds MSP Threat Monitor

We use MSP Threat Monitor for multiple clients that we support in an MSP capacity. We use it to find any vulnerabilities. Find some possible security solutions. Monitor log events, and provide security breakdowns to the client. We try to show where they are vulnerable and how we can address those issues going forward.
  • Nice reporting features.
  • Able to brand it for your company.
  • Easy to use interface.
  • Steep learning curve.
  • Usually takes a bit to get the scans to run easily in a new environment.
  • Could have more reporting options.
  • Great to use as a tool to plan how to improve their environment.
  • The ongoing monitoring is good for clients with sensitive data.
  • Having intrusion detection in the same tool makes it nice.
While things like Tripwire and Nessus may have some more options, Threat monitor does a good job in a slicker package. Tripwire offers a lot more in-depth scanning and revert capabilities. However, it also requires a little more overhead with the agents, etc. Threat monitor while it takes a little bit to learn, becomes pretty easy once you get over that learning curve.
SolarWinds offers live chat support for all its products built-in. So if you are working on something you can just reach out to someone at that time, and usually get an answer pretty quick. If you are trying to get something done it's a lot better than submitting a ticket and waiting for the email response.

Do you think SolarWinds Threat Monitor delivers good value for the price?

Not sure

Are you happy with SolarWinds Threat Monitor's feature set?

Yes

Did SolarWinds Threat Monitor live up to sales and marketing promises?

Yes

Did implementation of SolarWinds Threat Monitor go as expected?

Yes

Would you buy SolarWinds Threat Monitor again?

Yes

We use this among all our clients. When we first start working with a new client we run scans on their networks and then try to show them where they are vulnerable, and where they should shore up their security. Then we use those reports to road map how we want to fix their infrastructure.