"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"The product is very easy to use. Customers really appreciate that."
"I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues."
"The most valuable feature is the monitored support behind it."
"This solution requires less management and is very easy to use."
"The initial setup is very fast and very easy."
"It provides good protection from ransomware and malware attacks. It is very good as compared to other products. If any threat is there, their support is very good. They immediately respond to the users and do a follow-up. They call us and also provide email support."
"The most favorable features have been behavior monitoring and zero-day threat protection."
"We have found the reports to be most valuable."
"Its ability to detect ransomware and malware is the most valuable. Its protection is also good."
"I'm using the cloud solution, which I really like. I like being able to update policies on the cloud so that when users who are working from home connect to the internet, their laptops will be updated automatically. I also like that this solution is easy to use and is stable and scalable"
"The features that I have found most valuable are the endpoint security with the zero-day vulnerability. They have an on-premise sandboxing solution which prevents any of those zero-day vulnerability issues."
"This is a very stable product and we plan to continue using it."
"The solution is stable and integrated into the system quite well."
"When comparing to other products the console is much more user-friendly, and it's easy to implement."
"They have some things in the pipeline, we understand, and they're going to be able to support Android and all these other devices soon. The key is the devices - which is an aspect that is lacking right now. Every company has that problem, not just Cynet."
"Most of their times are in Greenwich Mean Time. I would like to see more local time zones."
"The inability to add contact information inside the Cynet is also an issue because it makes things more complicated. I would like to have a simple feature to enter a contact name and number for the person taking care of that unit or that server."
"Could have better integration with other security applications."
"In terms of what could be improved, I would say the usability of this product for new threats. Meaning, not everything which is new is properly seen by the product and not all the required actions are taken."
"The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes."
"Linux servers are not supported."
"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time."
"The policies tend to be a bit more complex to set up, so we do need some expertise in setting up the policies."
"The technical support should be more proactive."
"In the future, the solution should include the XDR feature."
"No product can ever be rated a ten out of ten. They are always improving on one aspect or another."
"The integration capabilities could be a bit better."
"I would like to see better reporting."
"Lacking features, not yet fully mature."
"The integration could improve in this solution."
Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.
Cynet Consists Of:
With Cynet You Can:
Four different deployment methods:
Cynet Benefits and Features:
Features Users Find Most Valuable:
Reviews from Real Users
“I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues.” - Ken S., Director InfoSec and Audit at a manufacturing company
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use." - Senior Cyber Security Manager at a financial services firm
"The dashboard is beautiful, overall ease of use, and the UBA and NBA features are valued." - Harsh P., Cyber Security Operations Center Analyst at Vincacyber
Trend Micro Apex One™ protection offers advanced automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of modern techniques provides highly tuned endpoint protection that maximizes performance and effectiveness.
Cynet is ranked 3rd in Extended Detection and Response (XDR) with 12 reviews while Trend Micro Apex One is ranked 12th in Endpoint Protection for Business (EPP) with 50 reviews. Cynet is rated 8.6, while Trend Micro Apex One is rated 8.2. The top reviewer of Cynet writes "A complete, transparent, and centralized solution ". On the other hand, the top reviewer of Trend Micro Apex One writes "Antivirus and Malware scanning with reporting that allows you to report back with information". Cynet is most compared with CrowdStrike Falcon, SentinelOne, Darktrace, Microsoft Defender for Endpoint and Cortex XDR by Palo Alto Networks, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Sophos Intercept X. See our Cynet vs. Trend Micro Apex One report.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.