TrustRadius: an HG Insights company

Mandiant Cyber Security Consulting

Score8.7 out of 10

7 Reviews and Ratings

What is Mandiant Cyber Security Consulting?

Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Media

An overview of Mandiant Cyber Security Consulting offerings.

Top Performing Features

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.8

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 8.8

  • Risk Assessment

    The service has the ability to identify and assess potential threats and vulnerabilities to an organization's data and systems.

    Category average: 8.8

Areas for Improvement

  • Incident management

    System captures risk-related incidents, including cause and result

    Category average: 8.2

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 8.2

  • Penetration Testing

    Simulating real-world attacks to identify vulnerabilities in an organization's systems.

    Category average: 8.2

Mandiant Cyber Security Consulting Pen Testing

Cons

  • A more slimmed-down copy of the pen test report for the nontechnical members of the C-Suite would be great.

Pros

  • Communication
  • Expert knowledge and skill
  • Flexibility and going the extra mile

Use Cases and Deployment Scope

We use Mandiant Cyber Security Consulting primarily for pen testing. We have tested our web app twice and have another test scheduled that will also include our AWS infra. This allows us to stay on top of emerging threats at a level far above automated scanning + helps us prioritize where to invest internal resources for remediation.

Return on Investment

  • Concrete findings that need to be remediated
  • Clear evidence of the findings so that we can replicate them
  • Succinct guidance on what needs to be fixed

Other Software Used

CrowdStrike Falcon Endpoint Protection, Trend Micro Deep Security Smart Check, Jamf Pro

The One Stop Shop for Cyber Security

Cons

  • Mandiant already provides world class Cyber Security Services.

Pros

  • Digital Threat Footprint recording and detection
  • pre-emptive actions to curtail potential cyber attacks

Use Cases and Deployment Scope

Mandiant Cyber Security even though a bit on the expensive side provides the best cyber threat protection that we can get. Their service helped in reducing our attack surface and make our organization almost impenetrable. Our Labs have forensic information that needs the maximum security that we can get and that is provided by Mandiant.

Return on Investment

  • We reduced the number breaches by 88% when compared to 2020
  • Sensitive Data is encrypted with military grade encryption and passed to clients.
  • Security Monitoring is now 24/7 and we do not have to worry about resource management.

Mandiant: The Shield We Needed – A Cybersecurity Consulting Triumph

Cons

  • Less detailed reports
  • More about Penetration Testing
  • Result driven Incident Response Preparedness Plan

Pros

  • Thorough security investigation
  • Easy to use
  • Cost effiective and best quality

Use Cases and Deployment Scope

We implemented Cybersecurity Post-Incident Recovery for a Financial Institution client of ours. The financial institution was experiencing a significant cybersecurity incident, such as a data breach or a ransomware attacks which resulted in data exposure, operational distruptions, reputational damage, and potential regulatory fines. We wanted to effectively recover from this incident, minimize further damage, and strengthen cybersecurity defenses. Mandiant's expertise in incident response and cybersecurity consulting provided a comprehensive solutions such as;

<ol><li>Incident Response and Recovery - the experts immediately initiated incident response procedures to contain the breach, identify the extent of the compromise, and remediated the affected systems. They worked on recovering the lost data, assessed the impact on business operations, and prioritized the restoration of critical services.</li><li>Forensic Analysis - This helped us to undertsand how the breach occured and what are the threat actors and their tactics (TTPs). </li><li>Security Gap analysis - This helped improvise and enhance the existing cyber security controls, close security gaps. </li><li>Regulatory Compliance and Reputation Management - They also provided guidance on communication and reputation management, helping our client rebuild trust with their customers and stakeholders.</li><li>Security Awareness and Training - Mandiant recommended and provided the necessary training and awareness program to the client to prevent future incidents stemming from human error or social engineering attacks. </li></ol>

Return on Investment

  • Team was well informed and educated
  • Built trust amongst clients
  • Thorough Risk and Gap analysis

Other Software Used

PwC Cybersecurity and Privacy Consulting, Verizon Security & Privacy Multi-Device, Accenture Security Services

Our experience with Madiant Cyber Security Consulting

Cons

  • Bugs fixing
  • Price

Pros

  • Expert in the cyber security field
  • Protects system from all sorts of cyber attacks
  • Great customer support
  • Customization

Use Cases and Deployment Scope

We mostly use it to protect us from outside attacks on our servers or systems. It has helped us in protecting our data and provide full security from any threats whatsoever.

Return on Investment

  • Data security
  • Incident management
  • Complete suite for cybersecurity

Alternatives Considered

Jamf Pro