Ideal for an overwhelmed SecOps/Security team
April 18, 2022

Ideal for an overwhelmed SecOps/Security team

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Vulcan Cyber

We use Vulcan to get a clear picture of the vulnerabilities of our rapidly-growing organization and how they could actually affect us, as well as a perspective into how serious those vulnerabilities really are. Vulcan helps us make real-time decisions in terms of where to prioritize, what's a pressing issue, and it also gives us guidance into how to mitigate the risks of those vulnerabilities. We use Vulcan in all of our production, staging, and Dev environments to keep them updated and protected.
  • Alerting us to critical vulnerabilities
  • Prioritizing the patch tasks that are most time-sensitive
  • Providing a solution and roadmap to pressing issues
  • Auto-update feature could be streamlined
  • Securing the environment
  • Mitigating risks
  • Suggested solutions save time and research
  • Saving research hours for SecOps team
  • Saving resolution hours for Security Engineering team
  • Protecting the company from data breaches -- which could tremendously affect the business
  • IBM Resilient Security Orchestration and Automation and Response (SOAR)
Vulcan was easier to implement with our existing Security environment. The UX and UI were more intuitive and user-friendly. While SOAR is a super solid product, for our business Vulcan made more sense. It was more of a natural fit for a rapidly-expanding company in a hyper-growth phase using Edge technology.

Do you think Vulcan Cyber delivers good value for the price?

Yes

Are you happy with Vulcan Cyber's feature set?

Yes

Did Vulcan Cyber live up to sales and marketing promises?

Yes

Did implementation of Vulcan Cyber go as expected?

Yes

Would you buy Vulcan Cyber again?

Yes

It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.