Comprehensive post-delivery protection against targeted email attacks, powered by machine learning and automated response capabilities.

Work for GreatHorn?

Learning about GreatHorn?

We can help you find the solution that fits you best.

Find the Right Product

GreatHorn Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
Company Size
User Role
Showing 1 GreatHorn review
LinkedIn Connections
GreatHorn review by Lisa K.
Lisa K.
Validated Reviewer
Review Source

"A Great Barrier For Attackers"

What do you like best?

GreatHorn is the best cyber-security service which can help us to protect against email phishers for your system and also from any malwares which might be attacking your web service.I think this platform has helped us in preventing various attacks and also protected the privacy of the data of our clients which is of utmost importance.So in this way I like greathorn

What do you dislike?

I have nothing in person to dislike about GreatHorn

Recommendations to others considering the product

My recommendation to others is that you should start using GreatHorn because you can literally prevent the attackers and phishers by 90% and make sure your application can remain protected.The protection of your application is necessary as the data privacy is very important so my recommendation for you is to start using greathorn.

What business problems are you solving with the product? What benefits have you realized?

I have used greathorn for many times in past projects for setting up firewalls and other security services for our web applications and corresponding email servers.I am also using this for a current project to prevent its platform from being attacked by any outsider and making it a safe application.

Sign in to G2 Crowd to see what your connections have to say about GreatHorn

What Incident Response solution do you use?

Thanks for letting us know!

There are not enough reviews of GreatHorn for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

D3 Security Logo
D3 Security
D3 Security provides a proven incident management platform that empowers security operations with a full-lifecycle remediation solution and a single tool to determine the root cause of and corrective action for any threat- be it cyber, physical, financial, IP or reputational.
InsightIDR Logo
InsightIDR is designed to reduce risk of breach, detect and respond to attacks, and build effective cybersecurity programs.
Cb Response Logo
Cb Response
Cb Response is a next-generation endpoint threat prevention solution to deliver a portfolio of protection policies, real-time visibility across environments, and comprehensive compliance rule sets in a single platform.
Swimlane Logo
Swimlane is a security platform designed to prioritize alerts, remediate threats and improve operational performances.
Siemplify Logo
Siemplify is a comprehensive security operations platform for the analyst to navigate management, automation, and investigation through a single pane of glass.
Symantec Emergency Response Logo
Symantec Emergency Response
With experience in every industry, Symantec's Incident Response team can get your organization back to normal operations.
TheHive Logo
TheHive is a scalable, open source and free security incident response solution.
Resilient Incident Response Platform (IRP) Logo
Resilient Incident Response Platform (IRP)
The Resilient Incident Response Platform (IRP) is a platform for orchestrating and automating incident response processes.
CylanceOPTICS Logo
CylanceOPTICS uses machine learning (ML) and artificial intelligence (AI) to identify and prevent widespread security incidents, providing consistent visibility, targeted threat hunting, and fast incident response.
Cyber Triage Logo
Cyber Triage
Cyber Triage is an automated incident response software any company can use to investigate their alerts.
Show more
Kate from G2 Crowd

Learning about GreatHorn?

I can help.
* We monitor all GreatHorn reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.