I like that we can see which devices have been compromised, where an attack originated from, and what was the last activity on any device attached to our network.
The support team is very prompt and responsive for issues or questions. I also like how easy it is to set up alerts when there are certain conditions met or if a given threat has been detected in the past. Our organization is not using this product as a replacement for other tools but rather to augment our existing monitoring solution with additional insights into threats.