Overview
Product Information on ThreatBook TDP NDR
What is ThreatBook TDP NDR?
ThreatBook TDP NDR Pricing
Overall experience with ThreatBook TDP NDR
“TDP Platform Increases Threat Detection Accuracy and Operational Safety for Companies”
About Company
Company Description
ThreatBook is a provider of cyber threat detection and response services. We developed new approaches to deliver high-fidelity, efficient, and actionable security intelligence. We integrated these capabilities with a full life cycle threat detection system and incident response mechanisms to enhance protection across cloud, network, and endpoints. This helps enterprises respond to threats efficiently, reduce complexity, and improve security operations.
Company Details
Do You Manage Peer Insights at ThreatBook?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About ThreatBook TDP NDR
Reviewer Insights for: ThreatBook TDP NDR
Deciding Factors: ThreatBook TDP NDR Vs. Market Average
Performance of ThreatBook TDP NDR Across Market Features
ThreatBook TDP NDR Likes & Dislikes
TDP is an excellent security product , and its core advantages are particularly prominent; (1)The alarm mechanism has a high accuracy rate, which greatly enhances the efficiency of our threat detection and response.(2)The produce design is humanized, ensuring that the safety team can quickly master and put it into use without any threshold(3)the team offers round-the-clock follow-up services and can quickly iterate and optimize based on our feedback.
I appreciate the detection accuracy and the timeliness of problem-solving response of the TDP product
(1)The key indicator statistics and visual display board in the TDP, as well as the visual statistics dashboard, have greatly enhanced the value density of our of our safety operation. It condenses a vast number of alerts into actionable insights, compressing threat response from hours to minutes and directly reducing our security operations costs. (2)TDP highlights the exact intrusion events separately, which enables us to instantly focus and initiate the highest-priority emergency response process.
The overall TDP platform is very good. We have a constructive suggestion, we hope to extend the retention period of log data and open up a longer time limit for exporting historical reports. This will greatly facilitate our in-depth analysis and summary of the annual security situation.
Although the false positive rate is low, there is still room for optimization, and there are still some limitations in vulnerability detection.
TDP is a very good product . To further enhance the user experience, I suggest extending the log storage time and increasing the upper limit of single log export.
Top ThreatBook TDP NDR Alternatives
Peer Discussions
ThreatBook TDP NDR Reviews and Ratings
- Manager of IT Services<50M USDIT ServicesReview Source
TDP Platform Increases Threat Detection Accuracy and Operational Safety for Companies
The TDP platform has brought substantial improvements to the safe operation of our company . Its high-precision alarm capability significantly reduces false alarm interference, becoming the core guarantee for our threat detection response. - IT MANAGER50M-1B USDInsurance (except health)Review Source
ThreatBook TDP NDR Enhances Accuracy with Integrated Threat Intelligence Monitoring
ThreatBook TDP NDR monitors based on full traffic and integrates threat intelligence to make detection more accurate. Our current user experience is excellent-it provides threat detection and identifies risky attack surfaces.We can leverage these attack surfaces to conduct asset convergence, which has proven highly effective. - IT Manager10B+ USDIT ServicesReview Source
Visual Dashboard Simplifies Security Alerts and Reduces Operational Response Time
TDP is a highly recommended product . Every day . We are confronted with a vast number of security alerts and limited operational resources. TDP can help our team enhance work efficiency, reduce a large amount of ineffective work , and focus valuable human resources on dealing with real threats. - Information Security Engineer1B-10B USDIT ServicesReview Source
Comprehensive Coverage of Zero-Day Rules Enhances Discovery of Unknown Threats
The attack chain visualization function of Online TDO is clear and intuitive, effectively presenting two types of threat sources: penetration attacks and viruses and Trojans. We particularly recognize its design that focuses on successful events of vulnerability exploitation and attacks, which provides crucial decision support for rapid response and handling, significantly enhancing the efficiency of threat management. - Marketing Manager10B+ USDHardwareReview Source
TDP Offers Reliable Threat Detection and Streamlines Security Event Investigations
As an NDR product,TDP demonstrates excepionolly strong threat detection capabilities.We have validated this through multiple penetration tests and red-blue team exercises-it accurately identifies attack behaviors from massive volumes of logs and marks them as 'successful attacks',presenting the most critical security events intuitively to our security operations team. Additionally, it serves as a probe that provedes highly reliable data sources for our SIEM platform,significantly reducing our investigation efforts.



