Promisec References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (2799)
    Verified68+ References
  • 4.8 / 5.0 (2221)
    Premium93+ References
  • 4.8 / 5.0 (2080)
    Verified27+ References

Promisec Testimonials

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References68 total
    About

    Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed monitoring and IR services. The Cybereason platform is powered by a custom-built in-memory graph, the only truly automated hunting engine anywhere. It detects behavioral patterns across every endpoint and surfaces malicious operations in an exceptionally user-friendly interface.

  • Reference Rating
    4.7 / 5.0
    Customer References93 total
    About

    Orca Security was founded on the belief that cloud security visibility solutions need to provide full-stack visibility into all organizational assets, including the cloud infrastructure level, operating systems, applications, and data, with no risk or per-asset integration cost. The Orca Cloud Visibility Platform utilizes its unique SideScanning technology to seamlessly deliver "deep cloud inspection"​ comprehensive full-stack visibility into all of your entire cloud infrastructure and assets in a fraction of the time and cost of alternative approaches.

  • Reference Rating
    4.7 / 5.0
    Customer References27 total
    About

    SentinelOne was founded in 2013 by an elite team of cyber security and defense experts who developed a fundamentally new, groundbreaking approach to endpoint protection. SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated integrated response and to adapt their defenses against the most advanced cyberattacks.

  • currently locked
  • currently locked
  • currently locked
  • currently locked