TrustRadius: an HG Insights company

Mandiant Managed Defense

Score6.8 out of 10

11 Reviews and Ratings

What is Mandiant Managed Defense?

Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.

Media

Managed Defense Dashboard
Community Protection Events Dashboard
Threat Hunting Details

1 / 3

Mandiant Managed Defense - Integration & Protection

Use Cases and Deployment Scope

We were looking for Managed Detection & Response solution for our customer as there was issues on clarity of threats , which can not be define Bad & Good by even best technology available in market. MDR services can be a cost effective way to access the necessary detection & response skills and resources without having to recruit, train and retain the internal talent.

Pros

  • Integration & Protection-Mandiant provide highest degree of integration with Endpoints, Networks ,email & Cloud and Identity solutions an organization already using
  • Strong Protection- Mandiant has best threat landscape technology which provide holistic view of security & Protection.

Cons

  • Due to split from FireEye Mandiant no longer can provide its own End Point Protection as part of MDR for customers that want to transition after incident is complete .
  • Single remediation response with no-ongoing monitoring

Return on Investment

  • Mandiant is strong on automated remediation & rollback
  • Predictable Pricing Rapid Response is sold as fixed days term license this takes way risk of hourly billing and runway costs

Alternatives Considered

Microsoft Defender Threat Intelligence

The Customer Support advantage alone, makes it worth it!

Use Cases and Deployment Scope

We used this product for managed security to help prevent and protect against cyber attacks or security breaches.

Pros

  • Accurate and detailed reporting
  • 24/7 Customer Support

Cons

  • I can’t think of anything that would need improvement

Return on Investment

  • Excellent incident response time
  • Less impact from Security Incidents

Alternatives Considered

Mandiant Advantage Threat Intelligence

Other Software Used

Mandiant Advantage Threat Intelligence

Good product

Use Cases and Deployment Scope

We use it to monitor our network and infrastructure servers, including firewalls, routers, switches, load balancers and proxies. It protects our organisation from advanced and emerging threats

Pros

  • Monitoring
  • Threat remediation
  • Training

Cons

  • Reporting

Return on Investment

  • Reduced remediation time
  • Removed manual monitoring

MDR - Immediate Impact

Use Cases and Deployment Scope

Antivirus, while a good tool, doesn't rise to the level of use that EDR/XDR etc does.

Not only do you need to detect that problems exist, you need to kill them at the point-of-attack.

Endpoint detect-respond does this.

MDR also has a pool of 24x7 engineers reviewing telemetry of interest to action or inform against.

Pros

  • SOAR
  • Pool of engineers 24x7
  • Cost-effective for what it does

Cons

  • View on assets under mgmt
  • Low-cost integrations with platforms/apps not already present
  • Customize what default view is

Return on Investment

  • RAPID response against threats
  • Improved posture
  • Major addition to the suite of tooling (SIEM, DLP, AV, monitoring)

Alternatives Considered

VMware Carbon Black EDR and Trend Micro Managed XDR

Other Software Used

SolarWinds Security Event Manager (SEM), Qualys VMDR

Managed Defense is a must-have for organizations with limited cybersecurity resources and staff.

Use Cases and Deployment Scope

Managed Defense provides our organization with 24/7 SOC capabilities for our small cybersecurity team by monitoring our FireEye/Trellix suite of products. In addition to alert monitoring, escalation, and response, they provide regular threat hunting and threat intelligence briefings.

Pros

  • Alert monitoring, escalation, and response
  • Threat hunting
  • Threat intelligence briefing

Cons

  • I cannot think of anything

Return on Investment

  • IT/SOC time saved by monitoring alerts
  • Improved time to remediation due to 24/7 eyes on glass
  • Hopefully less impact from security incidents due to early detection and containment

Other Software Used

Proofpoint Email Protection, CyberArk Privileged Account Security, Varonis Data Security Platform