Amazing job ThreatCure!!!
October 23, 2023

Amazing job ThreatCure!!!

Zohaib Khalid | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with ThreatCure® ShieldOps Platform

Despite utilizing numerous technologies such as SIEM, EDR, and SOAR, we were unable to obtain a comprehensive 360-degree perspective of the whole threat picture. We have complete visibility over our network, infrastructure, endpoints, GW, and cloud infrastructure thanks to ThreatCure ShieldOps. We now have the assurance to thwart zero-day assaults and uncover patient zero.
  • Indepth knowledge of our infrastructure
  • Complete Threat Landscape view
  • Early detection of threats
  • Would suggest ThreatCure red-teaming services.
  • Now with lesser opex we are getting complete visibility.
  • Now would like to acquire Threat Cure Guardian Care Services
While some items offer perfect sight, others fall short in other respects. The ThreatCure ShieldOps platform provides our management and incident response team with a 360-degree perspective. This facilitates quicker decision-making for the future. Furthermore, ThreatCure has an opex model, but other suppliers require significant Capex investments, which is an added advantage of SMB organization like us.

Do you think ThreatCure® ShieldOps Platform delivers good value for the price?

Yes

Are you happy with ThreatCure® ShieldOps Platform's feature set?

Yes

Did ThreatCure® ShieldOps Platform live up to sales and marketing promises?

Yes

Did implementation of ThreatCure® ShieldOps Platform go as expected?

Yes

Would you buy ThreatCure® ShieldOps Platform again?

Yes

ThreatCure Guardian Care services enable us to block C&C connections from some of our infrastructure systems. They told us that they had seen lateral movements in the early stages, which may indicate a ransom attack. They later provided us with a comprehensive report detailing the threat actors who were utilizing an insider threat in this.

ThreatCure® ShieldOps Platform Feature Ratings

Network Analytics
10
Threat Recognition
10
Vulnerability Classification
8
Automated Alerts and Reporting
10
Threat Analysis
10
Threat Intelligence Reporting
8
Automated Threat Identification
10
Scanning for Vulnerabilities
8
Behavioral Analytics
10
Anti-Exploit Technology
10