Header banner
Revain logoHome Page
sensato nightingale logo

Sensato Nightingale Review

1

·

Very good

Revainrating 4 out of 5  
Rating 
4.0
Security, Network Security

View on AmazonView on ЯM

Description of Sensato Nightingale

We believe genuinely effective cybersecurity is based on a holistic cybersecurity strategy. To enable this, a single platform is essential—a fully integrated platform out-of-the-box. That platform must incorporate your ability to comply with best practices, detect all attacks, and respond quickly. That platform is Nightingale. Nightingale Compliance Manager (CM) provides organizations with a rapid means of determining maturity as well as managing risk and policy exceptions. Nightingale Detection Manager (DM) combines network and host intrusion detection, honeypots, and vulnerability assessments to provide unparalleled protection. Nightingale Response Manager (RM) modernizes incident response by integrating playbooks, rapid response and automated countermeasures.

Reviews

Global ratings 1
  • 5
    0
  • 4
    1
  • 3
    0
  • 2
    0
  • 1
    0

Type of review

Revainrating 4 out of 5

Sensato Nightingale - Excellent Malware Protection

The customer service is excellent. They are always willing to help and make suggestions or changes to improve the product. The product is very easy to use. I like that it is able to detect and block malware. It is also easy to configure and can be used on any Windows computer. There is nothing I dislike about the product. I would highly recommend this product. I use it to scan my computers for malware and viruses. It is easy to use and has a very friendly interface. It is easy to configure and

Pros
  • Easy installation
  • Userful
  • Friendly GUI, quick scanning speed (20 minutes average)
  • Great detection rate with many threats blocked out!
Cons
  • Can not do deep scans without using command line mode; only simple searches available in gui search bar
  • No free trial version offered by Nod32 tech support team when asked if there was one.
  • Lackluster documentation provided from vendor regarding basic instructions such as howto run program after un