I appreciate it's detailed threat simulation and its ability to automate red teaming processes. The platform integrates effortlessly with our exisiting security stack, offering in-depth vulnerability assessments. Real-time attack simulations are particularly valuable for preemptively addressing security gaps. Review collected by and hosted on G2.com.
The initial setup could be simplified, and the pricing might be steep for smaller organizations. Review collected by and hosted on G2.com.
It is a really useful tool to detect attacks across different private and public hostnames and machines, very good detection in Linux machines actually. It also has great views for activity logs including any accounts accessed and power to enumerate all accounts via powershell and bash both. Review collected by and hosted on G2.com.
It requires some time and learning to get used to the tool and is not easy to start with. Also it lacks some integration in its marketplace which stops from automating the deployment. Portal also has many glitches and frequently stop working with insufficient details to the error shown Review collected by and hosted on G2.com.
Ease of use,
Understanding number of features.
For any doubt help of Customer Support
For using in projects ease of integration Review collected by and hosted on G2.com.
More focus making easy in integrating the platform Review collected by and hosted on G2.com.
Randori recon is an excellent platform to administer your attack surface and vulnerabilities. Randori enhances the platform's functionality by offering additional integration choices with IBM SIEM and QRadar, for instance. The primary distinguishing characteristics lie in its backbone abilities to proactively discover, connect, and disclose the facts of all pertinent applications and resources. The dashboard offers a wealth of information on risks, including prioritized exposure as well as health scores. The Randori recon tool offers an excellent user interface that is easy to grasp and manipulate. Review collected by and hosted on G2.com.
This tool doesn't really have anything wrong with it, although there was a small issue that arose during configuration that was promptly fixed. Still, there is room for development on this part. Review collected by and hosted on G2.com.
The increasing attack surface due to cloud deployability gets tougher for the security team to map and work on them. A tool like Randori Recon has gelped our client to continuosly discover assets that are exposed to attack surfaces in our network infra for both in-house and cloud offerings. Review collected by and hosted on G2.com.
Intgration of devices with many vulnerability assesment tools gets problematic sometimes. The IP ranges addition is manual which adds the work requirement for our admin. Review collected by and hosted on G2.com.
Randori recon best capability comes with it's ability to seamlessly integrated with other tools like Qradar. After thorough assesment of the attack surface and asset discovery packet assesment can be done for the same on Qradar. Review collected by and hosted on G2.com.
Once the reconnaissance for attack surfaces is done, the pre-defined Use-cases needs to be tuned to reduce the increasing false-positve.
Second challenge we have faced with it's integration with non-IBM product. Review collected by and hosted on G2.com.
- It integrates with IBM's well known tool SIEM and QRadar
- Provides insights about attack surface and attacker's entry point
- Also scans for vulnerabilities that can help us develop a better tool Review collected by and hosted on G2.com.
- It does not integrates with non-IBM tool
- Need to enter IP ranges manually
- Integration is troublesome sometimes Review collected by and hosted on G2.com.
In comparison to other security platforms, IBM Randori has made itself stand out due to its enhanced integration and centralized dashboard which was easy to be familiar with for our team. Its threat detection flexibility has made it a trustworthy software for identification and alerting of threats while surfing over internet. Review collected by and hosted on G2.com.
Further enhancement of the real-time threat intelligence would make it an even stronger player to implement its wide variety of services. There was lack of visibility of the final point use case of the various devices involved while using it. Review collected by and hosted on G2.com.
The integration of IBM Security Randori Recon with its peers like IBM's SIEM has expanded its flexibility tremendously. The alert of threats as per their measurement of risk has helped us greatly. Their priority scores have been the standard for measuring the risk associated with every alert. Review collected by and hosted on G2.com.
Its implementation while integrating with platforms like Qualys has been really troublesome at times. There was no self-service option for us to add our customized IP Addresses. Other than this we did not face much of difficulties with our experience. Review collected by and hosted on G2.com.
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use user interface are among top appreciated pros for me Review collected by and hosted on G2.com.
Cost is the big factor here. its costlier and complex to setup Review collected by and hosted on G2.com.