Categories:

#46

Deep Instinct is ranked #46 in the EDR Solutions product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

Deep Instinct Pricing

Based on our most recent analysis, Deep Instinct pricing starts at $40 (Annually).

Price
$
$
$
$
$
i
Starting From
$40
Pricing Model
Annually
Free Trial
Yes, Request for Free

Training Resources

Deep Instinct is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for Deep Instinct:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

Deep Instinct Benefits and Insights

Why use Deep Instinct?

Key differentiators & advantages of Deep Instinct

  • Customize Security: Prevent and detect malicious files at initial contact with the device or scan files on-demand based on organizational requirements. 
  • Counter Fileless Attacks: Reduces the attack surface by preventing fileless attack vectors like dual-use tools, script-based attacks and code injection techniques. 
  • Enhance Protection: Add a layer of endpoint protection based on file reputation that includes benign and known malicious files. Blacklist files according to loC lists and whitelist false positives. Isolates harmful files and terminates them remotely. 
  • Increase Accuracy: Leverage deep static analysis that uses deep learning to improve accuracy, increase detection rates and reduce false positives 
  • Centralized Management: Monitor and analyze all risks from a single platform. Leverage business intelligence to correlate events,reducing inspection efforts. 
  • Threat Analysis: Analyzes static automated threats, screenshots and network threats. Generate detailed reports covering statistics, highlights and insights on malware. 

Industry Expertise

Deep Instinct's expertise lies in using deep learning to prevent cyberattacks, particularly those involving unknown or zero-day threats. This makes it ideal for organizations that require robust protection against sophisticated and evolving malware, especially those with a high risk of ransomware attacks.

Synopsis of User Ratings and Reviews

Based on an aggregate of Deep Instinct reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Pre-Execution Threat Prevention: Deep Instinct excels at stopping threats *before* they can execute on your systems, which is a significant advantage in today's threat landscape.
  • Lightweight Agent: The software has minimal impact on system performance, ensuring your endpoints continue to run smoothly.
  • High Accuracy and Low False Positives: Deep Instinct boasts a low false-positive rate, freeing up your IT team from chasing down false alarms.

Cons

  • Reporting Features: Users have expressed a desire for more robust reporting features within Deep Instinct.
  • Remote Deployment: Deploying Deep Instinct to remote clients without a VPN can be challenging.
  • Resource Intensive Features: Certain features within Deep Instinct can be resource-heavy, potentially impacting system performance.
  • High Price Point: Deep Instinct's pricing is considered higher compared to some other similar endpoint security products.

Researcher's Summary:

Is Deep Instinct the deep end of endpoint security, or does it just make a big splash? Users rave about Deep Instinct's speed and efficiency, particularly its low false-positive rate. Unlike traditional endpoint detection and response (EDR) solutions that react to threats, Deep Instinct leverages deep learning to proactively prevent threats before they can execute. This proactive approach is a game-changer, saving security teams valuable time and resources by minimizing the need to chase down false alarms. Imagine a security guard who can identify and stop a potential threat before it even enters the building, rather than just reacting after an incident occurs. That's the power of Deep Instinct's preventative approach.

However, no solution is perfect. Some users point out that while Deep Instinct excels at prevention, its logging capabilities could be more robust. More detailed logs would be invaluable for forensic analysis and identifying the root cause of a security event. Think of it like this: Deep Instinct is like a highly skilled surgeon who can expertly remove a tumor but doesn't keep detailed medical records. While the surgery itself is successful, the lack of comprehensive documentation could be problematic down the line.

Overall, Deep Instinct is a powerful tool for organizations looking to level up their endpoint security. Its exceptional prevention capabilities, speed, and efficiency make it a top contender in the cybersecurity arena. However, the need for improved logging features shouldn't be overlooked. Deep Instinct is best suited for organizations that prioritize proactive threat prevention and are willing to trade off some logging detail for unparalleled protection. It's like having an elite security force guarding your digital assets, ensuring that threats are neutralized before they can cause any damage.

Key Features

  • Malware Classification: Deploys an autonomous cyber security, malware classification module to classify known and unknown malware into seven categories. 
  • Root Cause Analysis: Performs root cause analysis on detected threats to recognize the attack chain. 
  • Neural Network: Secure mobile, endpoints, servers, network perimeters and VDIs from sophisticated threats with a multi-layered security architecture. 
  • Intelligent Defense System: Continuously improves security to counter ever-evolving cyber threats by producing a D-Brain prediction model and distributing it to D-Clients 
  • Prevents Attack Vectors: Scans executable and non-executable files to prevent file-based malware, deploys endpoint protection software to avert spyware, implements antivirus endpoint protection to counter fileless attack vectors and mitigates ransomware using static/behavioral analysis. 
  • End-to-End Mobile Protection: Protects mobile devices from: 
    •  Malicious attacks on WiFi networks, including MitM, SSL MitM, HOSTS file modification and certificate abuse. 
    •  Attacks targeted to steal private data or money, such as ransomware, backdoors, droppers, banking trojans, botnets, network redirectors, infostealers, rooters and more. 
    •  Attackers with physical access to a device capable of exploiting sensitive data. Enforces different configurations to reduce the attack surface. 

Limitations

At the time of this review, these are the limitations according to user feedback:

  •  Doesn’t work on Linux platforms. 
  •  Complex for beginners to learn and implement. 
  •  High false positive rates disrupt productivity. 

Suite Support

mail_outlineEmail: [email protected]
phonePhone: (212) 981-2703 (New York). Additional country-specific numbers are available on the contact page.
schoolTraining: Sign up on the vendor portal for a certified engineer training course.
local_offerTickets: Fill out a form on the support portal to submit a request.