TechValidate Research on Cisco SecureX threat response


Cisco Threat Response Customer Review

4.5/5 Stars

How our organization uses Cisco Threat Response:

We typically use it to check the spread of malicious files detected, within the organization and to block/blacklist malicious file hashes and URL’s as necessary.

Also, use it as a due dilligence tool to see if any of the “most prevalent malicious files” posted in the Talos weekly newsletter and other threat feeds were ever seen in our environment.

Would you recommend Cisco Threat Response?

Yes, as we have found it to be a great tool to get a snapshot view of malicious incidents and their effect in our environment – files/URL’s, machines, filestrores, and users involved and the best way to mitigate the issue.





About This Data

This data was sourced directly from a verified user of Cisco SecureX threat response by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Cisco SecureX threat response