TrustRadius: an HG Insights company

ThreatCure® ShieldOps Platform

Score10 out of 10

1 Reviews and Ratings

Features

Top Performing Features

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 10

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 10

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 10

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 10

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 10

Threat Intelligence

Features for categories that leverage threat intelligence in network security

  • Network Analytics

    Analyzes various data reports and logs (DNS, firewall, user data, security information etc.) to identify threats in a network.

    Category average: 10

  • Threat Recognition

    Detection and recognition of malicious software within a network that could pose a threat to sensitive information.

    Category average: 10

  • Vulnerability Classification

    Prioritizing vulnerabilities, to determine which vulnerabilities are most urgent and require a quicker resolution.

    Category average: 8

  • Automated Alerts and Reporting

    Systems in place to automatically alert, report, or notify of issues that may need timely remediation.

    Category average: 10

  • Threat Analysis

    Analyzing known factors such as behavior patterns, affected areas, and other specific features to more easily identify a threat.

    Category average: 10

  • Threat Intelligence Reporting

    Generates reports that display information on threats (such as name, type, frequency of attack, area affected, etc.)

    Category average: 8

  • Automated Threat Identification

    Leveraging multiple sources of information (such as threat intelligence databases) to automatically identify threats.

    Category average: 10

Threat Hunting Tools

Tools that actively scan a network for threats. These tools will commonly integrate with and use threat intelligence databases for threat identification and elimination.

  • Scanning for Vulnerabilities

    Scans that identify vulnerable areas within a network.

    Category average: 8

  • Behavioral Analytics

    Using threat behavior to establish a pattern which can be used to identify the similar threats faster in the future.

    Category average: 10