Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Sign in
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

"A good threat tool"

  • By Sandy S.
  • on 06/29/2019

What do you like best about the product?
Generally excellent instrument to identify and stay away from digital assaults utilizing man-made consciousness progressively. Interestingly, the device advances as the strategies of digital assaults advance gratitude to the way that it depends on a man-made brainpower that is found out and improved after some time. It permits to discover digital assaults and dangers in the cloud, server farm and in business situations.
What do you dislike about the product?
Need all around data of the instrument to recognize possible security perils. This puts aside chance to end up acquainted with the product.I severely dislike about this is you need a minium of knowleadge about you see beacuse its overflowing with therms without information
What problems is the product solving and how is that benefiting you?
The eventual fate of security needs to settle on choices for people, however help people settle on choices all the more rapidly. This innovation is genuinely a power multiplier in an industry that is suffocating in information that necessities to drive choices.
Recommendations to others considering the product:
At present I would state that it is the best stage to distinguish, forestall and anticipate cyberattack dangers. My organization is one of the biggest banks on the planet and has depended on this instrument, after a long investigation by the IT specialists of the organization.


There are no comments to display