Header banner
Revain logoHome Page
threatbook tdp logo

ThreatBook TDP Review

2

·

Very good

Revainrating 4.5 out of 5  
Rating 
4.4
Security, Endpoint Protection

View on AmazonView on ЯM

Description of ThreatBook TDP

ThreatBook TDP is a microstep online threat detection platform dedicated to accurately discovering internal missing hosts and helping security teams locate threats quickly and accurately.

Reviews

Global ratings 2
  • 5
    1
  • 4
    1
  • 3
    0
  • 2
    0
  • 1
    0

Type of review

Revainrating 4 out of 5

Fantastic tool but complicated setup process

The best feature in this software is that it allows us to view all of our logs in one place, so we can see trends more easily than if we were looking at each log file individually. It's also great for searching through old logs because you don't have to sift through hundreds or thousands of individual files. I dislike how difficult it was to set up and configure the software after installation. There are several features that aren't fully functional yet (such as alerting). We use Threatbook to

Pros
  • For security purposes nothing beats having access control lists available across various platforms including Windows AD groups & LDAP directory queries!
Cons
  • Also when viewing large amounts of data like say 100 Gb+

Revainrating 5 out of 5

Excellent tool for malware detection and identification

It has been very helpful in finding our known infected devices, as well as unknown ones that we can't find through other means (such as antivirus). The setup process was not too difficult but it did take some time for us to get used to how things work here. I wish there were more options when looking at logs/files - sometimes you need just one or two files before seeing what's going on with your system so having all of them open together isn't ideal. We are able to see which systems have…

Pros
  • Also helps show whether computers meet certain qualifications needed such virus scans done daily.
  • The UI also provides lots information from various log file data including firewall statuses etc
Cons
  • Nothing