We use Field Effect Covalence at three automotive car dealerships to monitor all of our endpoints and make sure that they comply with updates and security and to notify us of any threats or vulnerabilities that they may have.
Vice President at a manufacturing company with 51-200 employees
Is constantly monitoring, easy to manage, and mitigates security risks
Pros and Cons
- "The most valuable features are AROs, which provide timely notifications for out-of-compliance or out-of-specification detections."
- "While Covalence addresses our notification and visibility needs, it falls short in keeping information up-to-date, which is where our MSP comes in to supplement its functionality."
What is our primary use case?
How has it helped my organization?
Covalence being backed by experts who are constantly monitoring for attacks and risks is important to us.
Managing Covalence is easy.
The actions, recommendations, and observations work well and are timely. The only frustration we've had is when there is certain software that's out of date and it keeps finding traces of the software that did not get updated or uninstalled. Overall, they work very well.
Covalence's benefits were clear from the start. It revealed the significant outdatedness and deficiencies in our existing systems, and within just a few months, it identified a security vulnerability we would have completely missed otherwise.
Covalence informs us of threats with minimal false positives.
Covalence helps us mitigate security risks by recommending actions like keeping software current, removing unnecessary or unknown programs, and eliminating applications that could potentially compromise our organization.
What is most valuable?
The most valuable features are AROs, which provide timely notifications for out-of-compliance or out-of-specification detections. Additionally, the recently introduced endpoint view, which displays the health status of our network endpoints, has become an essential daily tool.
What needs improvement?
While Covalence addresses our notification and visibility needs, it falls short in keeping information up-to-date, which is where our MSP comes in to supplement its functionality.
I'd love to see a feature in Covalence that allows manually removing endpoints from the view and receiving notifications if they come back online. Currently, I use the Endpoint View daily, but some systems stay online for up to 30 days even when no longer in service. The ability to manually remove these would be very helpful. Additionally, since Covalence is a key tool for software updates and patch management notifications, it would be fantastic if it could automate some of this process or provide links to the latest software versions. While Covalence highlights the need for updates and what needs to be done, it doesn't necessarily point users to where they can find the software itself.
Buyer's Guide
Field Effect MDR
January 2026
Learn what your peers think about Field Effect MDR. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Field Effect Covalence for four years.
What do I think about the stability of the solution?
Field Effect Covalence has shown minimal stability issues, with only one incident attributable to a five-year-old hardware appliance.
What do I think about the scalability of the solution?
Field Effect Covalence is highly scalable. It happens naturally as we add and remove devices.
How are customer service and support?
The technical support team is professional, helpful, and responsive. I can't recall ever encountering an issue that they couldn't resolve.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment of Covalence proved challenging due to my lack of experience, but subsequent deployments were much smoother as I gained familiarity with the process.
Our last two deployments took a couple of hours to complete.
I typically deploy the hardware and maybe help with the group policy. But then, for the most part, our managed service provider IT company, sets up the group policy, and it pushes it out that way the first time, and then it's just an ongoing automated process after that.
What was our ROI?
While I have not seen a quantifiable return on investment from Covalence, a major cybersecurity incident could have been incredibly expensive, highlighting its potential importance.
What's my experience with pricing, setup cost, and licensing?
Field Effect Covalence's pricing is just right.
What other advice do I have?
I would rate Field Effect Covalence nine out of ten.
The only maintenance Covalence requires is updating the endpoint agent twice a year, at most. These updates are released by Field Effect and necessitate modifying the group policy to reflect the new version. This is because the old group policy won't work with the updated agent.
Completely unfamiliar with Field Effect before consulting for an end user, I've come to appreciate it immensely. Now, it brings me real peace of mind.
My advice to almost everyone I've talked to about Covalence is that in the first few months, there's gonna be a lot of leg work, bringing your systems up to date and in compliance with what the AROs are recommending. But once you have them up to date and know what to look for, it's pretty easy maintenance going forward of your network.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Vice President, Information Technology at a insurance company with 201-500 employees
Fast with great support and a simple setup
Pros and Cons
- "Direct and easy and quick communication to the Field Effect cybersecurity team experts has led to quick resolution of any problems or alerts."
- "The ConnectWise PSA integration is two-way but does not send our comments back to the Field Effect portal."
What is our primary use case?
We wanted a technology partner to provide complete cybersecurity protection to our entire organization.
In the past, we had multiple solutions from different vendors and they were difficult to manage. I wanted one vendor to protect us from top to bottom and provide a single "pane of glass" for our technical team to manage.
I was also looking for a vendor with a stable team of cyber specialists who were easily and quickly accessible to us for consultation on any issues or questions. Additionally, we wanted to be billed in Canadian dollars.
How has it helped my organization?
The IT team is having to spend far less time investigating cybersecurity incidents and cybersecurity "noise" and more time on tasks that drive the business forward.
We have one cybersecurity partner who has a 360-view of all activity on our network and is able to paint a picture of behaviour and respond to suspicious activity more intelligently. The result is fewer false alarms and less time wasted by our technical team on noise and fruitless investigations. The Field Effect team of experts is an extension of our IT team.
What is most valuable?
Direct and easy and quick communication to the Field Effect cybersecurity team experts has led to quick resolution of any problems or alerts. The ARO system provides easy explanations of issues detected and simple instructions for resolution. If an issue is expected we can respond accordingly and suppress future alerts pertaining to the same issue. If we believe we have resolved an issue, the Field Effect team will verify our solution and report on the issue again if our solution does not address the problem.
What needs improvement?
The solution could improved DNS filtering and fuller integration into ConnectWise PSA (I understand both are in the works). The current roaming DNS filter doesn't seem to be too complete and we're hoping to be able to eliminate purchases on other filters, such as Umbrella.
The ConnectWise PSA integration is two-way but does not send our comments back to the Field Effect portal. Additionally, they have recently come out with an option that does not require a physical appliance onsite. This will be valuable for smaller locations.
For how long have I used the solution?
I've used the solution for over two years - since Nov 2022 approximately.
What do I think about the stability of the solution?
The solution has been extremely stable and predictable.
What do I think about the scalability of the solution?
It's very scalable from the very smallest organizations to the largest.
How are customer service and support?
Customer service and support are very responsive - particularly with possible cyber incidents. We hear from them nearly immediately on urgent issues and within a day on other questions.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had used Arctic Wolf and a bundle from ConnectWise. The Arctic Wolf product, although very complete, was significantly more expensive. The ConnectWise solution included SentinelOne but was more challenging to use as it did not have one place to look for security issues.
How was the initial setup?
Initial set up was very simple and detailed instructions were provided by FE for the appliance and network adjustments. FE engineers provided white glove support.
What about the implementation team?
It was done in-house as the setup was very simple.
What was our ROI?
We didn't do a formal ROI.
What's my experience with pricing, setup cost, and licensing?
In our evaluation, two years ago, we found the Field Effect Covalence product and service to be the simplest to set up and pricing was lower than the other competitors.
Which other solutions did I evaluate?
We have tested and implemented a few other solutions.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Field Effect MDR
January 2026
Learn what your peers think about Field Effect MDR. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
Service Desk Support Specialist at a tech services company with 11-50 employees
Helpful support, proactively allows users to stay ahead of threats, and protects sensitive information
Pros and Cons
- "The automated response feature is incredibly effective."
- "While it's essential to stay informed about potential issues, the recurring notifications about past vulnerabilities can lead to confusion and may detract from our focus on current threats."
What is our primary use case?
We are dedicated to keeping our clients' fleets compliant and secure. Our proactive approach allows us to receive timely notifications when attention is needed, enabling us to act swiftly.
Our system highlights specific devices, files, or software that require attention and provides a CVE number detailing potential vulnerabilities and remediation steps. If you ever find yourself unsure about how to address an issue, their knowledgeable team is just a text message away. With real people ready to assist, they go above and beyond traditional security software to ensure your peace of mind.
How has it helped my organization?
Thanks to the MDR, it is easy for us to effectively develop policies to address vulnerabilities. By integrating Mobile Device Management (MDM) with our MDR, we can swiftly tackle detected issues. This combination enhances our cybersecurity posture and provides peace of mind, significantly reducing downtime.
By proactively staying ahead of potential threats, we ensure our systems remain secure and efficient. This strategic approach not only safeguards our operations but also reinforces our commitment to maintaining a robust security environment.
What is most valuable?
The automated response feature is incredibly effective. For instance, we can automatically lock a Microsoft 365 account if a login attempt occurs from an unauthorized country. This proactive measure significantly enhances our security posture by swiftly mitigating potential risks.
The system's ability to respond instantly to suspicious activities not only protects sensitive information but also provides peace of mind, knowing that our accounts are safeguarded against unauthorized access. Overall, this functionality is a valuable asset for maintaining robust security.
What needs improvement?
We've noticed that some alerts are indicating vulnerabilities that have already been resolved. While it's essential to stay informed about potential issues, the recurring notifications about past vulnerabilities can lead to confusion and may detract from our focus on current threats.
Streamlining the alert system to filter out these resolved issues would enhance our efficiency and ensure that we concentrate on the most relevant and pressing security matters. Overall, refining this aspect would significantly improve our experience.
For how long have I used the solution?
I've used the solution for two months now.
What do I think about the stability of the solution?
So far, we haven't had any issues; it's always been stable.
What do I think about the scalability of the solution?
The solution is pretty scalable. You can go from a small company to a big company, from a local software agent to a network monitor.
How are customer service and support?
Whenever we reached out for assistance or to whitelist a reported vulnerability that we knew was not harmful to our environment, we found the team exceptionally easy to work with.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We are in the process of integrating existing solutions with this new product. Rather than merely replacing what we have, this addition provides an opportunity to enhance our current capabilities.
How was the initial setup?
The initial setup was straightforward.
What about the implementation team?
Someone else acquired this solution for the company I'm working with.
What was our ROI?
As a technician, this question falls outside my role. That said, I recognize the significant benefits of a tool that accomplishes tasks in a fraction of the time compared to manual security methods.
What's my experience with pricing, setup cost, and licensing?
The price is in accordance with the provided services.
Which other solutions did I evaluate?
We did not evaluate a different solution.
What other advice do I have?
You should certainly consider trying Field Effect; it is a robust solution that will soon be essential for any organization prioritizing security.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Dramatically improved our security posture to Best-In-Class and saves a significant amount of time and money
Pros and Cons
- "I like how comprehensive Field Effect Covalence is."
- "I would like Covalence to include patching."
What is our primary use case?
We use Field Effect Covalence for multiple cases including, our internal protection, standard client protection, and for incident response for all of our customers.
Along with the cloud product APIs & Endpoint Agents, the network Appliance can be deployed on-premises, in the cloud, and on hybrid platforms. On-premises solves for data sovereignty requirements. We have clients that use all three configurations.
How has it helped my organization?
The expert-backed monitoring of Field Effect Covalence is a crucial advantage. While many security products offer monitoring, it's the quality that sets Field Effect apart. Their data centers in Australia, the UK, Canada, and the US ensure real-time human oversight of traffic, eliminating the noise and false positives that plague other solutions. Having sold dozens of similar products, I can confidently say that Field Effect is the most effective and efficient in its class. Their alerts are actionable and accurate.
Field Effect Covalence is by far the easiest product to manage that I have ever dealt with.
The Action Recommendations Observations (ARO) feature of Covalence is a fundamental tool. It effectively guides people on how to prioritize tasks. "Actions" clearly indicate specific steps to take, while "recommendations" advise whether something deserves attention and what Covalence suggests doing about it. This flexibility is crucial, as not every observation translates to a problem requiring action. Some may simply require monitoring and context to determine the appropriate response. Compared to other priority systems in the market, ARO offers several advantages. Firstly, it facilitates clearer communication and understanding. Secondly, it empowers lower-skilled resources to address issues effectively, leading to cost savings. In essence, ARO serves not only as a valuable communication tool but also as a driver of profitability.
Covalence could be used as a single cybersecurity product for some organizations and it is the most important product in our stack but it is not our whole stack.
Covalence saves us a significant amount of time compared to other security systems we've used. We spend 50 percent less time managing Covalence because it eliminates false alarms. In the past, we'd constantly receive alerts that required us to investigate and ultimately dismiss as non-critical, like a door left open or a window unlocked. With Covalence, if it tells us something is wrong, it's truly wrong. No more wasted time on trivial issues. The way Covalence structures alerts and communicates information also allows us to dispatch the right resources efficiently. It automates many of the tasks we used to handle manually, taking the guesswork out of decision-making. It's as simple as following Covalence's instructions. Before, we'd have to verify the alert, determine the appropriate response, and then execute it. Covalence takes care of all that, which is a game-changer. For example, if Covalence detects an open door in a specific room, it automatically sends the right person to close and lock it. No more scrambling to figure out who to send or wasting time on unnecessary communication.
Covalence identifies and prioritizes critical threats, providing actionable intelligence and step-by-step instructions to mitigate them. This simplicity and efficiency are hallmarks of Covalence's effectiveness.
Covalence offers recommendations on how to mitigate risks proactively. While most MDR, XDR, and even EDR products simply alert us to ongoing threats, Covalence takes a preventative approach. They provide data that delves deeper into vulnerability management, highlighting outdated browsers, operating systems, and suspicious domain registrations that could be precursors to attacks. This focus on predictive and proactive measures helps prevent issues before they arise, setting Covalence apart from many other security products.
Investing in proactive security with Covalence has significantly enhanced our security posture. Preventing incidents before they occur is demonstrably the most cost-effective approach, as compared to the reactive expense of emergency response. By enabling us to address potential problems proactively, Covalence fosters a remarkably efficient and stress-free environment. This translates to happier customers, happier employees, and an overall phenomenal outcome.
What is most valuable?
I like how comprehensive Field Effect Covalence is. I like the SOC process and the customer service. There is not much that I don't like about Field Effect Covalence. Field Effect Covalence is the best product in its class, bar-none.
What needs improvement?
Field Effect mentioned including patching in their product roadmap, and that would be a significant game-changer for them. I'm not aware of any other product that offers all three functionalities: detection, vulnerability management, and integrated OS & 3rd party patching. This addition would be a major improvement and make Field Effect a truly unique offering in the market. I recently spoke with the CEO, and he expressed optimism about bringing this feature to the product. I would like Covalence to include patching.
For how long have I used the solution?
We have been using Field Effect Covalence a little over two years.
What do I think about the stability of the solution?
We have never had issues with the stability of Field Effect Covalence.
What do I think about the scalability of the solution?
Field Effect Covalence is meant for the SMB market but I have deployed the product for many enterprise clients and it performs equally well at scale.
How are customer service and support?
The technical support is top-notch, super fast, and excellent.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We chose Field Effect Covalence after seeking an alternative to SentinelOne and CrowdStrike. While CrowdStrike offered robust security, its cost and size presented challenges. We ultimately desired an established solution with demonstrably greater efficacy.
How was the initial setup?
The deployment is straightforward and we can usually deploy in one day.
One person is required for the deployment.
What about the implementation team?
We are an integrator so we implement the solution in-house for ourselves and our customers.
What was our ROI?
Field Effect Covalence has paid for itself within six months of implementation.
What's my experience with pricing, setup cost, and licensing?
Field Effect is considering revising its agreement terms. While the contract duration might change, the pricing remains highly attractive. In some cases, it's half the price of competing products, and at high volume, it can be as much as 50 percent less than CrowdStrike, for example. Covalence offers even greater efficiency and functionality, making it a more effective product with wider capabilities than its competitors. Combined with the significantly lower price, it becomes an extremely compelling option.
Which other solutions did I evaluate?
I have extensive experience selling security solutions in this field. I've likely marketed and implemented over 50 different products that compete with Field Effect Covalence. My experience includes solutions like Splunk, SumoLogic CrowdStrike, SentinelOne, Blackpoint, Perch, Artic Wolf, and RocketCyber, and I could readily name at least 20 more. With this background, I confidently consider myself an expert in security solutions. In my professional opinion, none of the competitive platforms I've encountered match the capabilities and effectiveness of Field Effect Covalence.
What other advice do I have?
I would rate Field Effect Covalence a ten out of ten.
A minimal amount of maintenance is required. Covalence is self-sustaining.
Understandably, some people haven't heard of Field Effect Covalence. Several factors contribute to this. Firstly, the company is based in Canada, which may limit its reach in the US market. Secondly, they're still relatively young, having only been around for six years. Building brand awareness takes time, especially for a new company. However, I value effectiveness over popularity. I'd rather choose a less-known product that's demonstrably more effective than a widely recognized one that falls short in performance.
Field Effect has a proof-of-concept that boasts an incredible retention rate. While I don't recall the exact figure, it's around 95 percent of users who try it stick with it, which is truly remarkable. It's a phenomenal outcome that speaks volumes about the power of Covalence. Sometimes, the best way to understand its impact is not through detailed analysis, but simply by experiencing it firsthand. Install the POC and see. Field Effect Covalence is phenomenal, and you will love it.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
President & Cybersecurity Specialist at a tech services company with 1-10 employees
Comprehensive cybersecurity with advantages such as proactive threat prevention, universal scalability and effective deployment across diverse organizational structures
Pros and Cons
- "Unlike previous solutions, where we were solely informed of security incidents, Covalence's MDR allows for real-time incident prevention."
- "One limitation is that if someone takes their laptop outside the office building, the DNS firewall provides minimal coverage, and we are unable to generate reports."
What is our primary use case?
We use it for our clients, outsourcing our security operation center requirements. We rely on their solutions to meet our cybersecurity needs. It helped us gain a deeper understanding of the security landscape within our clients' networks, focusing on the intricacies of each endpoint. This became particularly crucial during the shift to remote work amid the COVID-19 pandemic. At that time, we reached out to Covalence to assess its compatibility with our requirements, and I believe that collaboration has proven to be successful.
How has it helped my organization?
The primary advantage is the notable improvement in our response time to incidents. With the categorization and severity indication, we can swiftly and efficiently react to security incidents. The action tag significantly boosts the internal priority, facilitating a quicker response.
It's crucial for us that Covalence is supported by a team of experts who consistently monitor it for potential attacks and risks. This aspect holds significant value for us, as it aligns with our expectations from a security vendor. Knowing that knowledgeable professionals are actively overseeing the system provides me with a sense of reassurance and peace of mind. In the initial three months, there were a couple of incidents where they promptly intervened and assisted in identifying issues. It took us approximately three to six months to fully recognize and experience these benefits.
Coordinating and handling Covalence is a breeze; we haven't encountered any management issues. The installation and deployment processes are straightforward and hassle-free, causing no complications on our end.
We leverage the solution's tagging system for categorizing security threats as recommendations or observations, aligning seamlessly with our internal ticketing system. When any action, observation, or recommendation is flagged, it automatically generates a corresponding ticket. These tickets are then scheduled with our technicians based on priority for timely resolution.
The categorization of security threats through tagging is instrumental in addressing the most pressing issues. Immediate actions are our top priority, demanding immediate attention and analysis. Observations fall into a medium priority category, as they may or may not pose a significant risk. Recommendations are assessed when a technician is available, and prioritized based on urgency.
It serves as a comprehensive cybersecurity product that proactively safeguards all our services against threats. This is crucial because, without it, we would spend hours attempting to decipher and correlate information across various tools.
It aids our security team in saving time by providing more actionable alerts. Their effectiveness in filtering out false positives and non-invasive alerts is commendable, preventing our team from investing time in non-critical matters. We haven't quantified it with specific metrics, so I can't provide a precise figure. However, based on my experience, I have observed a substantial amount of savings overall.
It has taken the place of several cybersecurity solutions for us, including replacing a previous SOC vendor. We are currently in the process of transitioning from our antivirus vendor to Covalence.
It has significantly enhanced our security coverage, providing me with a sense of peace of mind. Managing three different vendors, each with its own security focus, used to be challenging. With Covalence, having visibility across all aspects and layers, they can efficiently correlate logs without our intervention.
It keeps us informed about the significant threats and provides guidance on addressing them. Each ARO includes recommendations. Leveraging the integration with ConnectWise, they automatically generate a ticket for us, complete with a checklist of recommendations.
The impact we observe on our security operations is notable. The checklists provided, especially geared towards system administration and help desk tasks, are particularly beneficial. These checklists simplify processes for our team, reducing the need for extensive cybersecurity training. It's advantageous to have a vendor that collaborates effectively with our team, making the implementation of security measures more seamless and efficient.
They offer recommendations for risk reduction, encompassing aspects such as vulnerability scanning, code assessment, and evaluation of security tool effectiveness. These recommendations, termed AROs are communicated through tickets. Our team then reviews and prioritizes these recommendations to address them accordingly. There are instances where misconfigurations may occur, whether intentionally or unintentionally by our team. Having a third-party vendor closely examine these configurations is valuable. Even if a risk is acknowledged, it provides us with an awareness of its existence and potential impact.
What is most valuable?
Their most valuable feature is the MDR capability. Unlike previous solutions, where we were solely informed of security incidents, Covalence's MDR allows for real-time incident prevention. This means that if the profiles are configured correctly, they can actively halt security incidents.
The significance lies in having a unified interface—a single pane of glass—where our security vendor can gain visibility into every facet of the network.
What needs improvement?
One limitation is that if someone takes their laptop outside the office building, the DNS firewall provides minimal coverage, and we are unable to generate reports.
For how long have I used the solution?
I have been working with it three years.
What do I think about the stability of the solution?
It offers good stability capabilities. We haven't faced any issues related to that.
What do I think about the scalability of the solution?
It is highly scalable. It safeguards all our organizations comprehensively, providing protection for every system in use. Our infrastructure includes a physical office and a Microsoft Azure environment in the cloud, creating a slightly complex setup—all effectively covered by Covalence. Currently, our user base consists of approximately fifteen individuals, and we have around thirty endpoints.
How are customer service and support?
The technical support provided by Covalence is reliable. Whenever assistance is required, we either open a ticket or request help through the ARO. In the case of serious issues, they promptly respond. For less critical matters, their response time is generally within the next business day or as needed. I would rate it nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Active Pulse Networks and ConnectWise security suite, employing two different solutions. The decision to switch arose primarily from their reactive nature; although they would alert us to potential issues, they lacked the capability to take proactive actions. This became evident, especially during the shift to a hybrid workforce due to COVID-19.
How was the initial setup?
The initial setup is straightforward.
What about the implementation team?
Deployment typically follows a client overview process where we gather details on the number of locations, users, and servers. We share this information with Covalence, and based on the complexity and needs, they recommend a suitable solution. This could involve an on-premises device for clients with physical offices or a cloud-based appliance hosted in Covalence's data center for those without a physical office. After deciding on the solution, we install the device on-site for on-premises deployment. Following this, we deploy agents to all workstations. Throughout the deployment process, there are regular check-ins and coordination with Covalence to ensure everything is on track and address any pending matters. From our end, a single technician is capable of handling the entire deployment process within approximately one month. However, for smaller clients, we can efficiently deploy agents on their systems within a week.
Maintenance typically involves updates. The agents are designed to auto-update, ensuring they receive the latest versions automatically. In rare instances where challenges may arise, we have the flexibility to create a script and perform manual updates for all agents. However, such occurrences are infrequent.
What was our ROI?
We have observed a positive return on investment considering the level of service we receive from them in relation to what our clients pay. Their approach to pricing is advantageous as they don't provide individual client-based pricing; instead, they offer bulk pricing for our total seats. This flexibility allows us to distribute the cost across multiple clients, making it affordable for small businesses. Consequently, small businesses can access enterprise-level security that might have been financially challenging for them otherwise. The quality of service and the benefits received by both sides of the business make the investment worthwhile.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair and reasonable. Covalence stands out for its focus on catering to the needs of SMBs, making it a more cost-effective choice in comparison to competitors. It offers flexibility by not imposing minimum user requirements and can accommodate even small businesses with just two users.
Which other solutions did I evaluate?
During our evaluation period, we were simultaneously testing ConnectWise along with another solution. Initially, a few of our clients were utilizing ConnectWise, but after testing both options, we decided to make the transition to Covalence. Initially, when we engaged with Active Pulse Networks, their pricing was reasonable. However, as they expanded, their solutions became more tailored for enterprise customers, leaving SMBs with higher costs. In contrast, Field Effect's pricing is more universal and suitable for both small and large businesses.
What other advice do I have?
I would recommend it and suggest trying a demo and setting up a trial within the organization to experience how it works firsthand. Testing and experiencing it yourself are essential to truly understand its capabilities. My main advice is to invest more time in the scoping phase, particularly during the initial onboarding and scoping document creation. This will significantly contribute to the effectiveness of the system. Ensure that the organization profile is accurately set up to minimize the chances of miscommunication when addressing actual incidents. Overall, I would rate it nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Reseller
CEO at a tech services company with 11-50 employees
A hassle-free and scalable cybersecurity with user-friendly deployment, comprehensive monitoring, reliable tech support and cost-effective pricing structure
Pros and Cons
- "The standout feature is its continuous 24/7 monitoring of all network traffic, providing unparalleled vigilance."
- "In terms of improvement, there are instances where the ARO responses are slightly slower than preferred."
What is our primary use case?
I internally implement it to enhance our cybersecurity measures, especially given the management of numerous clients. The primary use cases involve comprehensive management and monitoring functions. It effectively oversees all incoming and outgoing internet traffic, providing a centralized control hub from the headquarters. Furthermore, it extends endpoint protection to all computers within the network. Additionally, the solution continuously monitors the Microsoft 365 environment around the clock. The synergy of these three functionalities offers an enhanced and constant overview of internet traffic, enabling the detection of any suspicious activities in real time.
How has it helped my organization?
One of the primary advantages is the assurance and peace of mind that comes from constant surveillance. Unlike the previous approach, which involved manually sifting through logs, having Covalence means there's always someone monitoring everything. Another significant benefit is the enhanced ability to meet security protocol objectives, especially when dealing with high-profile clients or pursuing government contracts. Covalence plays a crucial role in achieving compliance, addressing the stringent requirements set by cybersecurity insurance.
The realization of benefits from deployment is almost immediate. Once Covalence is deployed, it begins recording and monitoring right away. Within the initial three to five days, it establishes a comprehensive understanding of the data flow within the organization. In cases where there are issues, especially in a newly installed environment, it might take a few days to identify patterns. However, once up and running, any malicious activity triggers immediate recognition, allowing for swift response and mitigation.
An integral aspect of the solution's effectiveness lies in its backing by a team of dedicated experts. These professionals engage in continuous monitoring for potential attacks and risks, providing a crucial layer of security. The significance of this support becomes evident in the daily influx of alarms, where numerous alerts are generated regularly.
In terms of IT management, this product stands out as the most user-friendly solution I've encountered in years. Its ease of management and deployment is unparalleled.
It offers the convenience of a single cybersecurity product that proactively safeguards all the diverse services across our organization or for our clients. Notably, the latest updates to the Covalence client, installed on computers, are as effective as any standalone antivirus solution suggesting that, in the future, Covalence could serve as a comprehensive solution encompassing antivirus, malware protection, and cybersecurity monitoring.
It's crucial to rely on a single cybersecurity product for trust and efficiency. Managing multiple solutions for different aspects can be cumbersome, requiring constant monitoring of various portals. Covalence simplifies this by providing a centralized dashboard where everything is easily accessible in one place.
It significantly contributes to time savings for our security team. By leveraging an automatic scheduling system, we efficiently connect to client computers to address identified issues promptly. While the percentage of saved time might be less for a smaller operation like ours, where regular client connections are the norm, the real value lies in pinpointing where immediate attention is needed.
It has become our singular cybersecurity solution, leading us to phase out multiple other cybersecurity products. Specifically, we've begun removing Bitdefender solutions from clients who now utilize Covalence.
The communication with Covalence is primarily facilitated through our ticketing system, although critical incidents may prompt phone call alerts. They inform us of significant threats through various channels, and their active monitoring solution empowers them to take immediate action, such as shutting down compromised computers or Microsoft 365 accounts. This multi-faceted notification approach is highly beneficial, particularly when incidents occur outside regular working hours. It ensures prompt action even if we're not actively monitoring, a capability that wouldn't be possible without their service.
The swift response to evolving threats is crucial. Moreover, the simplicity of deploying and using their solution is a key factor that streamlines the provision of cybersecurity services to my clients, significantly easing my workload.
The impact on our security posture has been significant, greatly enhancing our overall cybersecurity coverage. By utilizing their products, I feel more confident that we are comprehensively protected, extending beyond a mere antivirus and malware solution.
What is most valuable?
The standout feature is its continuous 24/7 monitoring of all network traffic, providing unparalleled vigilance. It empowers end-users by enabling them to promptly report suspicious emails for a swift assessment of their legitimacy. Moreover, with the deployment of an office appliance, users gain access to DNS filtering, a powerful tool that not only restricts access to specific websites but also actively scans for and blocks access to harmful sites.
The solution's categorization of security threats into actions, recommendations, or observations is a crucial feature. The seamless integration of AROs into my system is noteworthy. When Covalence identifies issues, whether related to software updates, vulnerabilities, or potentially malicious transactions, it automatically generates tickets within my ticketing system. This integration allows our team to promptly verify the nature of the issue, particularly in cases where certainty is not absolute.
What needs improvement?
In terms of improvement, there are instances where the ARO responses are slightly slower than preferred. While I understand the necessity for human review in certain cases, there is a consideration for enhancing the speed, especially for situations where a quicker response, perhaps within three to four minutes, could be more beneficial based on the nature of the attack.
For how long have I used the solution?
I have been working with it for approximately four years.
What do I think about the stability of the solution?
It is generally stable, no notifications or issues have arisen in the deployment and ongoing use of the surveillance system. Unlike many applications that may conflict with legal or accounting software, or antivirus solutions that could impact day-to-day usage, Covalence has not posed any such problems.
What do I think about the scalability of the solution?
It is highly scalable. We've successfully deployed it in various firms, ranging from those with seventy to eighty users to others with ten, fifteen, or twenty users, and the performance has been consistent across all scenarios. There are no noticeable issues or challenges related to scalability.
How are customer service and support?
I am highly satisfied with their level of customer service and support. It's one of the best ones in the market. I would rate it ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward. The assistance provided during the implementation phase is noteworthy, making the process seamless. Once implemented, the ongoing maintenance is remarkably straightforward, requiring minimal intervention on my part to ensure that it remains up-to-date and operational.
What about the implementation team?
The implementation process is straightforward and user-friendly – we simply plug it into the current network, and the system takes care of the rest. Deploying agents is equally hassle-free, requiring the installation of a small piece of software on all computers, after which it autonomously manages itself. Installing the 365 connectors is a quick three to five-minute task, easily handled by any IT administrator. The strategy for deployment involves an initial assessment to determine whether there are on-premise servers or a physical office network, in addition to cloud services that need protection. Once this assessment is completed, the decision is made on whether to deploy a physical appliance or a virtual appliance. The next step is to order and deploy the chosen appliance. The overarching strategy depends on the specific needs, such as protecting the headquarters and multiple clients.
The deployment time varies depending on the number of clients. For clients with a small server, the process takes approximately an hour. After installing all the connectors, the Covalence agents are automatically delivered to computers as they are turned on. For remote workers, coordinating the connection and ensuring the installation of the Covalence agents typically takes a couple of hours to three hours.
Maintenance is minimal and lightweight. Periodically, Field-Effect may contact us for assistance with specific updates, and after they perform the updates, they provide information on any machines that encountered issues with the new agents.
What was our ROI?
The clients who benefit most from the ROI are those dealing with security clearance levels mandating strict compliance. For them, the immediate return is evident in the alleviation of IT issues related to cybersecurity compliance.
What's my experience with pricing, setup cost, and licensing?
The shift to a per-user pricing model and the introduction of a base price for the on-premises or virtual appliance has been particularly advantageous. This pricing structure aligns well with the needs of almost all my clients, especially smaller companies, eliminating the challenges associated with block pricing.
What other advice do I have?
My advice for risk reduction is centered on leveraging the recommendations provided by each ARO. Every ARO not only identifies a potential issue but also offers a recommended fix or solution. For instance, if they detect a certain protocol enabled on a server, they not only provide mitigating factors but also suggest possible methods to turn off or protect the service.
I would recommend it due to the simplicity of deployment, the comprehensive monitoring solution, reliable tech support, and the user-friendly tools for integrating plugins into email programs like Outlook for added functionalities. When discussing these features, coupled with the straightforward pricing structure, it becomes easy to convey the benefits in comparison to other products on the market. The implementation process is notably one of the simplest in the industry, making the overall adoption of the solution hassle-free. Overall, I would rate it nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP
Manager of Digital Customer Engagements and Projects at a healthcare company with 11-50 employees
Backed by experts, easy to manage, and saves us time
Pros and Cons
- "It provides valuable insights into our IT environment, enabling us to improve reselling, upgrades, and customer management."
- "Covalence's SEAS feature wasn't very user-friendly."
What is our primary use case?
We leverage Field Effect Covalence for our customers' cybersecurity needs. We offer it as a value-added service to our clients, acting as a trusted reseller for Field Effect. For companies that have experienced security breaches or vulnerabilities, we prioritize recommending Field Effect Covalence's immediate deployment. Integrating Covalence enables swift remediation through its robust cybersecurity policies and tools. Moreover, we actively promote the adoption of Field Effect Covalence as a comprehensive security solution within our existing customer base, as we firmly believe in its efficacy.
We implement Field Effect Covalence to satisfy cybersecurity policies and remediate existing threats and incidences.
We've deployed Covalence in the cloud for some clients, but most have on-premise deployments due to our pre-existing on-premise equipment. While I anticipate a shift towards cloud adoption as clients transition to cloud services, our current focus remains on physical installations.
How has it helped my organization?
Covalence's backing by experts who constantly monitor for attacks and risks is a great advantage. I've had the pleasure of working with them for a long time, and their professionalism and expertise are truly commendable.
The tagging feature effectively prioritizes tickets by highlighting the most urgent issues. When someone receives a tagged alert, it automatically becomes a top priority. Observations, while important, are addressed later as resources permit.
Managing Covalence is easy and their support team is good if we run into a problem.
While Covalence doesn't proactively cover all our threat services, they've made significant strides over the years. Their continuous development efforts have expanded their capabilities beyond what we currently utilize. While we collaborate with their development team on specific needs, their overall coverage surpasses our current requirements.
Covalence saves us significant time by eliminating the need to manually search for vulnerabilities. Instead of hunting through side channels, we receive vulnerability reports directly, streamlining the process. Additionally, Covalence identifies outdated software, allowing us to automate updates previously handled manually. This automation, driven by Covalence's insights, saves us a considerable amount of back-end time by eliminating manual tasks.
We have implemented other cybersecurity solutions for our customers, including Darktrace, but have found them to be inadequate compared to Covalence, leading us to consolidate onto this superior platform.
Covalence has improved our client's security coverage. They love the solution.
Covalence keeps us informed about the most critical security threats and guides how to address them. We hold monthly meetings to discuss ongoing security concerns, and in case of urgent issues, we communicate directly with Covalence's team. Additionally, we maintain regular communication with their development, support, and admin teams.
Covalence delivers daily recommendations to help us reduce platform risk. These recommendations are crucial, as addressing them safeguards against potential threats. Therefore, they are of great importance to both us and our customers.
What is most valuable?
Covalence is an impressive product that has gained significant traction with customers. It provides valuable insights into our IT environment, enabling us to improve reselling, upgrades, and customer management. This is primarily due to the increased visibility it offers into our infrastructure, which was previously fragmented across multiple portals. Covalence consolidates this information into a single pane of glass, providing a centralized hub for accessing all relevant data. Furthermore, it integrates seamlessly with our ticketing system, event solutions, and various business processes.
What needs improvement?
Covalence's SEAS feature wasn't very user-friendly. I heard they're working on improvements to provide better user feedback, but I don't know if that's been implemented yet. Regardless, it's good to see they're addressing the issue.
For how long have I used the solution?
I have been using Field Effect Covalence for almost five years.
What do I think about the stability of the solution?
We typically put our appliances in passive mode. And so they mirror traffic, but they do not interrupt traffic. I don't recall any customer having disruption because of the Covalence appliance.
What do I think about the scalability of the solution?
Field Effect Covalence is easily scalable.
How are customer service and support?
The technical support team is excellent. They are highly responsive and have a deep understanding of the product. It has been a pleasure working with them as one of the lead project managers.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously partnered with Darktrace, but our experience with Covalence was significantly more positive, leading us to switch.
How was the initial setup?
The initial deployment is straightforward, and Field Effect has a supportive team to assist if needed. However, there are some preliminary steps we need to take in the portal, which typically takes about 30 minutes if we have all the necessary information. On-premises deployment time can vary depending on the specific circumstances, such as the number of locations, appliances, and internet links involved. Therefore, the deployment timeline ultimately depends on the company's infrastructure and configuration. The longest a deployment has taken us is a few days and the shortest was half an hour. One person from our team is required for the deployment. In some situations, there may be a person involved from the client's side because they have some information for us but most of the time we have all the information.
What's my experience with pricing, setup cost, and licensing?
The licensing model itself is solid, but we're ironing out some inconsistencies in how customer profiles are configured. This is particularly relevant in a user-based model, where company headcount might be low while actual user counts are higher due to contractors or remote workers. It creates a gray area about which users get billed, but we're actively discussing solutions with Field Effect.
What other advice do I have?
I would rate Field Effect Covalence an eight out of ten.
While Covalence rarely requires maintenance, we've encountered two instances requiring service in the past. In one case, an appliance overheated as a result of an external environmental factor and in the other, hardware failure necessitated a complete replacement. Fortunately, both replacements were handled promptly.
I suggest getting a demo. It is quite impressive. If anybody knows anything about cybersecurity, they'll see by the demo that Field Effect Covalence covers everything.
Before deploying Covalence, it's crucial to have thorough documentation to properly scope the project. The biggest pitfall is deploying Covalence into the wrong environment because of an inadequate understanding of the existing infrastructure. A thorough scoping meeting is essential to define what needs to be protected, and this often requires a detailed inventory of the current environment, which some organizations may lack.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: MSP Reseller
Vice President, Information Technology at a manufacturing company with 51-200 employees
If something is identified by the system, you can reach out to a human if you need help with the analysis
Pros and Cons
- "It's running in the background and does a packet-level analysis of everything that comes in. It also has an auto-response feature, so if something gets through and is clicked on, or somehow gets through the network, it gets isolated and quarantined, and we get notified."
- "The area where they can make it better is by giving responses to the end-user. For example, when there is an alert to the administrator, I get it. I have to copy and paste everything to everyone... And then I have to follow up with them, and it's a real pain."
What is our primary use case?
It's our cybersecurity solution for cloud, network, and endpoints. We do a weekly review of the endpoints, and because software is always changing and no software is secure, we are updating software all the time. We rely on them for our cybersecurity solution.
How has it helped my organization?
Covalence informs you of the threats and how to address them. They send emails and texts. They tell you what the level is. You can see the recommendations and ask for help. You can escalate. It's very helpful.
For a small business that doesn't have a full IT or cybersecurity department, their guys are there when you need them. If something comes up and gets identified by the system, you can reach out to a human if you need help doing the analysis. A couple of times, I ran software that did the analysis, and then I sent it back to them. They were able to review what the malware was and evaluate whether it was safe or not to proceed after it was clean.
What is most valuable?
For endpoint management, Covalence identifies operating systems that need updating to help us stay on top of everything. It's running in the background and does a packet-level analysis of everything that comes in. It also has an auto-response feature, so if something gets through and is clicked on, or somehow gets through the network, it gets isolated and quarantined, and we get notified. We've had one instance of that scenario where someone got an Excel spreadsheet that was malicious, and we were notified and it was quarantined. We worked with the forensic team at Covalence and ran a full review of that computer.
The packet-level analysis—knowing that everything that comes in is getting looked at—and the endpoint protection are the most valuable features. Whatever comes in, it can be as if your door is always open. If you're on the internet, things can creep in that you don't want. But Covalence is looking at everything that comes through.
And the auto-response is valuable, knowing that it's going to quarantine any malicious thing that happens to get through or when a user happens to click on something they shouldn't have clicked on. Email is the major vector of cyber attacks, and we do have training for that. But in the event that someone clicks on something they shouldn't, the system will isolate it and quarantine it. And their team does a post-event analysis.
They have experts available to do a forensic-level evaluation of what the issue is. Luckily, we haven't had any serious attacks. I don't know if that can be attributed 100 percent to Covalence, but we have peace of mind knowing it's there.
We use the tagging of alerts, recommendations, and observances, as well as the SEAS (suspicious email alert system). The tagging is a different way of categorizing threats. Endpoint management gives me the person that I need to deal with for a specific vulnerability. But the tagging identifies vulnerabilities at a vulnerability level. An example might be "out-of-date software soon," and then it would list out the 12 employees who are running that on their endpoints. If you approach it by endpoint, it's the opposite. It will say, "Here's the endpoint and all the vulnerabilities." The tagging helps me prioritize. Often, it's just an observance, such as someone using Tor browser for something. It comes in as text and email, and you can take care of it.
What needs improvement?
The area where they can make it better is by giving responses to the end-user. For example, when there is an alert to the administrator, I get it. I have to copy and paste everything to everyone, telling them, "Hey, your Zoom is out of date," or "Mac user, you have to update your iOS because there's a vulnerability." And then I have to follow up with them, and it's a real pain.
Also, with the email alert system, when people have suspicious emails they forward them. The analysis comes back, and I have access to it. But what I want is that if someone who is not the administrator sends in a suspicious email, they should get the email back with the response from Covalence. Now, it keeps that information in the administrator portal. But I want to get out of the way. If someone reports something, the answer should go back to that person, not to me. In some cases, it requires an admin to execute software updates, but I would like them to know exactly what they need to do to be up-to-date and have a vulnerability-free endpoint.
For how long have I used the solution?
We have been using Field Effect Covalence for at least three years.
What do I think about the stability of the solution?
I don't think it's ever crashed. It's always running in the background. I get reports on how many scans and how many malicious things it has stopped. I have peace of mind knowing we have some protection running.
What do I think about the scalability of the solution?
I would assume it's scalable, but it's not as if my company went from 40 to 5,000 employees. For us, the scalability is unknown.
How are customer service and support?
The support is good because you never know when you're going to need help with something.
That time I mentioned, when someone in the warehouse got an email with a spreadsheet that came up as a high alert, we quarantined him, and then we did the analysis with their help. I called in and support said, "We're going to send you an executable to give us all the data from that computer so we can analyze it, see how they got in, and what toolkit they used for the Excel."
There was no repercussion, but it was great being able to call immediately and have a forensic-level guy on the line that could advise us.
And if I ever have questions, I can send an email, and they're really good about responding. That's when it's more of a casual question. But when something is pressing or urgent, that's when you call in.
They're good in both respects. They're very good. When I needed them, they were absolutely there.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had something super-basic and rudimentary: a firewall and spam filter. That wasn't a model that was keeping up with cybersecurity threats. We went from having a super low-level, basic security setup to having an actual modern cybersecurity tool to help us identify and deal with threats.
Cybersecurity is a standard requirement now. It's not that you can just get away with a firewall and a spam filter. We knew a lot of companies that got hacked, and we wanted to be ahead of the curve. I brought it up and was doing some initial due diligence, and then our CFO said we needed a solution. I had told them before about Field Effect Covalence and that I reached out to all the majors, but the starting point for them was $24,000 a year.
The fact that Covalence is backed by experts who are constantly monitoring for attacks is very important to us. One of the reasons I selected Covalence was because their founder was a big name in cybersecurity. He was Canada's number-one cybersecurity guy, and he worked with a task force that was like the MI5-equivalent of cybersecurity back in the day. That was good to know.
Also, with this product, you have access to all of these features, whereas with other systems, it seemed like if something happened, you would have to pay a consultant some crazy rate per hour to sort out your situation. Whenever something happens or I have a question about one of the endpoints, they have people to help out.
I have an account manager, which is very helpful, and we do quarterly reviews. It's a complete solution for us as a small to midsized company. There were a lot of solutions out there for enterprises, because that's where the money is, but cyberattackers don't care if you are a small or midsized company. If they can get money out of you, they're going to hit you. They shoot things out, and wherever they land is is where they go. So this was the right solution for us, and we've been really happy with it so far.
How was the initial setup?
The initial deployment of Covalence was super easy. I'm an IT generalist with a certain focus on integration, e-commerce, and SQL. The diagram instructed you to plug the blue cable in next to the blue dot. It was super dumbed-down, which was perfect for me.
As for maintenance, there was one time when they updated the endpoint agent, but it was super easy because everything is monitored. I had to update all the endpoints, and it was pretty easy, but I didn't have to update the hardware.
What about the implementation team?
I did it all by myself, without any help from anyone. It was really simple.
Which other solutions did I evaluate?
When we were searching, it was when cybersecurity was a huge topic and there was an unclear market. It wasn't like if I needed a CRM, Salesforce was absolutely the number one, or if I needed an e-commerce system, Shopify was absolutely the number one.
And most of what was out there was built for enterprises, and they would parse out the different components. You might get one component for one thing, another component for another thing, and a third component for another aspect of cybersecurity. Each one would be about $24,000 a year. That just wasn't affordable for a small to medium business at all.
I got in touch with Arctic Wolf, but they were for the big spender, at $24,000. A lot of other companies were in the same ballpark. It was a barrier to entry, and we couldn't just shop around and try this one this year and another one next year.
What other advice do I have?
When it comes to managing Covalence, it's easy in the sense that all the information is there, but it's not automatic. You can't just plug it in and go to the golf course or take a nap. Someone has to review it and follow up, especially on the endpoints. It's like the weather: things change every day. New emails come in, and that's probably the biggest attack vector. There are always new threat actors. It's not difficult, but you need to monitor it and respond to whatever shows up on your dashboard. You need to keep all your systems up-to-date, patched, and secure. It helps.
For example, Zoom updates their software just about every week. Everyone knows, "Okay, we have to update soon," because Covalence runs a comparison of identified vulnerabilities, and they always show up.
Covalence doesn't cover physical assets, but it covers all the digital resources: networks, endpoints, and the cloud. It is installed and monitoring all the traffic on all of those systems. It is the product that does everything.
If you haven't heard of Field Effect, you should consider it. What sold me is that it is a complete solution that is priced competitively. And I'm not saying that I bought it on price alone, but it ticked all the boxes that I was looking for: endpoint, network, cloud, and it wasn't $24,000 a year. For a small company, that's a sizable amount. There just wasn't an SMB product that could compete with Covalence when I was looking. Maybe there is one out there now, but I have sat in on so many presentations and I didn't see any for small and medium-sized businesses like Covalence. Maybe now that the enterprise market is saturated, Arctic Wolf is coming out with a less feature-rich product priced for small-to-medium-sized businesses. But it's hard to compete with Covalence in that market based on its feature set and cost.
The big takeaway is that we haven't been paralyzed by a cyberattack. I know it's stopping things. I don't know if there was some threat actor who tried to attack us and then said to themselves, "Oh, man, these guys have Covalence." For me, it's a case of job security that we haven't been attacked. If anything happens, they're going to look at me as the VP of IT and say, "It's your fault." But we haven't been attacked, and we see all the vulnerabilities. It's all laid out. It's monitoring every endpoint and every packet. For me, that's peace of mind.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Field Effect MDR Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Managed Detection and Response (MDR)Popular Comparisons
Huntress Managed EDR
CrowdStrike Falcon Complete MDR
Binary Defense MDR
Intercept X Endpoint
Arctic Wolf Managed Detection and Response
Sophos MDR
Adlumin Security Operations
SentinelOne Vigilance
Trend Micro Worry-Free Services Suites
CompassOne by Blackpoint Cyber
Fidelis Elevate
ConnectWise SIEM
Bitdefender MDR
Rapid7 MDR
Trend Micro Managed XDR
Buyer's Guide
Download our free Field Effect MDR Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How do you estimate ROI of a Managed Detection and Response (MDR) solution?
- When evaluating Managed Detection and Response (MDR), what aspect do you think is the most important to look for?
- Which solution do you prefer: Optiv Managed Security Services or eSentire?
- Why is Managed Detection and Response (MDR) important for companies?




















