G2 Crowd builds the world's largest business commerce platform fueled by $100M in funding šŸš€

BlackBox

3.0
(1)

The Predictive Abuse-Prevention Solution for Email Service Providers

Work for BlackBox?

Learning about BlackBox?

We can help you find the solution that fits you best.

BlackBox Reviews

Ask BlackBox a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
For Category
Industry
Showing 1 BlackBox review
LinkedIn Connections
BlackBox review by User in Medical Devices
User in Medical Devices
Validated Reviewer
Review Source

"Not Frequently Used, but Important None the Less"

What do you like best?

It definitely does its job efficiently and simplistically. It is simple enough that even with sporadic use you can understand at least the key features to optimally use the program.

What do you dislike?

There is not much I disliked. Although, I do not use this program quite as often as some others.

Recommendations to others considering the product

I have only limited used of this program but I would suggest that if you want to consider using Black Box, first consider if there are other programs available with more specific intended use for your company. This is based on my experience and may not apply depending on what industry your in.

What business problems are you solving with the product? What benefits have you realized?

Confidentiality and management of information. It allows for ease of use as well as efficiency of its intended use.

Sign in to G2 Crowd to see what your connections have to say about BlackBox

What Other IT Security solution do you use?

Thanks for letting us know!

There are not enough reviews of BlackBox for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Google Cloud Resource Manager Logo
Google Cloud Resource Manager
4.0
(27)
Google Cloud Platform provides resource containers such as organizations, folders, and projects, that allow users to group and hierarchically organize other Cloud Platform resources.
2
Open DNS Personal Internet Security Logo
Open DNS Personal Internet Security
4.5
(22)
The easiest way to make your Internet safer, faster and more reliable.
3
Apple Support Number Logo
Apple Support Number
4.3
(12)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
4
Palo Alto Networks GlobalProtect Logo
Palo Alto Networks GlobalProtect
4.4
(12)
GlobalProtect delivers the protection of next-generation security platform to the mobile workforce in order to stop targeted cyberattacks, evasive application traffic, phishing, malicious websites, command-and-control traffic, and known and unknown threats.
5
Esker on Demand Logo
Esker on Demand
4.6
(11)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
6
Qihoo 360 Logo
Qihoo 360
3.9
(8)
360 Total Security offers your PC complete protection from Viruses, Trojans and other emerging threats. Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized.
7
Webroot DNS Logo
Webroot DNS
4.1
(6)
Webroot SecureAnywhere DNS Protection offers a quick, straightforward, and highly effective way to secure the DNS protocol connection against compromise. With advanced reporting and 82 URL categories, admins gain greater visibility than ever, reduce risk, and can tailor usage policies to their organization's unique needs.
8
Outlook Password Recovery Logo
Outlook Password Recovery
3.4
(5)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
9
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.9
(5)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
10
Palo Alto Networks Wildfire Logo
Palo Alto Networks Wildfire
4.1
(5)
WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.
Show more
Kate from G2 Crowd

Learning about BlackBox?

I can help.
* We monitor all BlackBox reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.