Filtern nach:

Durchschnittliche Bewertung

  • Gesamt
    4/5
  • Benutzerfreundlichkeit
    3,5/5
  • Kundenservice
    4,5/5

Über TAP

Web-based threat analytics software that offers codified detection expertise and guided investigation workflows.

Erfahre mehr über TAP

Zeigt 2 Bewertungen

Verifizierter Rezensent
Director of IT Infrastructure
Bankwesen, 51-200 Mitarbeiter
Verwendete die Software für: Mehr als 2 Jahre
  • Gesamtbewertung
    5/5
  • Benutzerfreundlichkeit
    5/5
  • Eigenschaften & Funktionalitäten
    5/5
  • Kundenbetreuung
    5/5
  • Preis-Leistungs-Verhältnis
    4/5
  • Wahrscheinlichkeit der Weiterempfehlung
    9/10
  • Quelle des Nutzers 
  • Bewertet am 5.4.2019

"Know what threats are passing through"

Vorteile: It's easy to configure and setup. Updates are easy also. The TAP let's you know what threats it detects going across the network, as long as it's setup to tap on a port that has ingress and egress access to the network.

Nachteile: It is certainly expensive but in a security essential world, it's worth the investment

  • Quelle des Nutzers 
  • Bewertet am 5.4.2019
Verifizierter Rezensent
Senior Technical Systems Analyst - Messaging Development
Bankwesen
Verwendete die Software für: 1-5 Monate
  • Gesamtbewertung
    3/5
  • Benutzerfreundlichkeit
    2/5
  • Eigenschaften & Funktionalitäten
    2/5
  • Kundenbetreuung
    4/5
  • Preis-Leistungs-Verhältnis
    2/5
  • Wahrscheinlichkeit der Weiterempfehlung
    Nicht bewertet
  • Quelle des Nutzers 
  • Bewertet am 10.4.2018

"Not at all what we hoped for"

Vorteile: The product was able to identify threats coming into the network. However, it was unable to distinguish threats that had been blocked by other gateway or security appliances.

Nachteile: My biggest concern is it did not provide enough contextual information. It gave a very worrying picture of the environment that took a week to unpack because we needed to further trace the information. As it turned out all of the security incidents were blocked by other security appliances. But as the tap at the time did not look at the disposition of the connections just the source IP addresses and locations it created an intense amount of worry

  • Quelle des Nutzers 
  • Bewertet am 10.4.2018