TrustRadius: an HG Insights company

Mandiant Cyber Security Consulting

Score8.7 out of 10

7 Reviews and Ratings

Features

Top Performing Features

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.8

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 8.8

  • Risk Assessment

    The service has the ability to identify and assess potential threats and vulnerabilities to an organization's data and systems.

    Category average: 8.8

  • Data Security

    Ensuring sensitive data is protected from unauthorized access and disclosure.

    Category average: 8.8

Governance, Risk & Compliance

The goal of IT governance is ultimately to ensure that the processes governing evaluation, selection, prioritization, and funding of competing IT investments are driven by the overall business

  • Incident management

    System captures risk-related incidents, including cause and result

    Category average: 8.2

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 8.2

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.4

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.5

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.8

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 8.8

Cybersecurity Consulting

Cybersecurity consulting aims to ensure continuous security assurance for business and government entities by helping to improve the efficiency of business, IT operations, and technology strategies for security and risk management.

  • Risk Assessment

    The service has the ability to identify and assess potential threats and vulnerabilities to an organization's data and systems.

    Category average: 8.8

  • Security Architecture

    Designing and implementing appropriate cyber defenses based on the organization's requirements, industry standards, and best practices.

    Category average: 8.5

  • Compliance Monitoring

    Ensuring that the organization is meeting all relevant regulations and standards, such as GDPR and HIPAA.

    Category average: 8.4

  • Data Security

    Ensuring sensitive data is protected from unauthorized access and disclosure.

    Category average: 8.8

  • Network Security

    Assessing the security of an organization's networks, such as firewalls, intrusion detection systems, and encryption.

    Category average: 8.8

  • Security Awareness Training

    Offering educational resources to employees on the importance of cyber security, best practices, and how to respond to potential threats.

    Category average: 8.5

  • Penetration Testing

    Simulating real-world attacks to identify vulnerabilities in an organization's systems.

    Category average: 8.2

  • Security Monitoring

    Providing ongoing monitoring of networks and systems for suspicious activity and responding to threats in a timely manner.

    Category average: 8.5