www.cybereason.com Open in urlscan Pro
45.60.64.106  Public Scan

Submitted URL: https://meetings.cybereason.com/api/mailings/click/PMRGSZBCHIZTSMBVG4YDOLBCOVZGYIR2EJUHI5DQOM5C6L3XO53S4Y3ZMJSXEZLBONXW4LTDN5WS6...
Effective URL: https://www.cybereason.com/cybereason-vs-microsoft
Submission: On June 06 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/2d18af45-9c43-467c-a2f9-d2d14ea2a4b2

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/2d18af45-9c43-467c-a2f9-d2d14ea2a4b2" enctype="multipart/form-data"
  id="hsForm_2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" method="POST"
  class="hs-form stacked hs-custom-form hs-form-private hsForm_2d18af45-9c43-467c-a2f9-d2d14ea2a4b2 hs-form-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2 hs-form-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_31c448e4-b6f8-472c-905d-287d2aaee51a"
  data-form-id="2d18af45-9c43-467c-a2f9-d2d14ea2a4b2" data-portal-id="3354902" target="target_iframe_2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1">
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$0">
    <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$email"><label id="label-email-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="" placeholder="Enter your "
        for="email-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1.1:$0.1:$email.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$email.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$email.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$email.$email"><input id="email-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" type="email" name="email" required="" placeholder="Work Email" value="" autocomplete="email"
          data-reactid=".hbspt-forms-1.1:$0.1:$email.$email.0" inputmode="email"></div>
    </div>
    <div class="hs_phone hs-phone hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0.1:$phone"><label id="label-phone-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="" placeholder="Enter your "
        for="phone-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1.1:$0.1:$phone.0"><span data-reactid=".hbspt-forms-1.1:$0.1:$phone.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1:$phone.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$0.1:$phone.$phone"><input id="phone-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" type="tel" name="phone" required="" value="" placeholder="Phone Number" autocomplete="tel"
          data-reactid=".hbspt-forms-1.1:$0.1:$phone.$phone.0" inputmode="tel"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-2" data-reactid=".hbspt-forms-1.1:$1">
    <div class="hs_company hs-company hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$company"><label id="label-company-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="" placeholder="Enter your "
        for="company-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1.1:$1.1:$company.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$company.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$company.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company"><input id="company-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" type="text" name="company" required="" value="" placeholder="Company Name"
          autocomplete="organization" data-reactid=".hbspt-forms-1.1:$1.1:$company.$company.0" inputmode="text"></div>
    </div>
    <div class="hs_jobtitle hs-jobtitle hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle"><label id="label-jobtitle-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="" placeholder="Enter your "
        for="jobtitle-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle.0"><span data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle.$jobtitle"><input id="jobtitle-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" type="text" name="jobtitle" required="" value="" placeholder="Job Title"
          autocomplete="organization-title" data-reactid=".hbspt-forms-1.1:$1.1:$jobtitle.$jobtitle.0" inputmode="text"></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1" data-reactid=".hbspt-forms-1.1:$2">
    <div class="hs_message hs-message hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-1.1:$2.1:$message"><label id="label-message-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="" placeholder="Enter your "
        for="message-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" data-reactid=".hbspt-forms-1.1:$2.1:$message.0"><span data-reactid=".hbspt-forms-1.1:$2.1:$message.0.0"></span></label>
      <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1:$message.1"></legend>
      <div class="input" data-reactid=".hbspt-forms-1.1:$2.1:$message.$message"><textarea id="message-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" name="message" placeholder="How can we help?"
          data-reactid=".hbspt-forms-1.1:$2.1:$message.$message.0"></textarea></div>
    </div>
  </fieldset>
  <fieldset class="form-columns-1" data-reactid=".hbspt-forms-1.2">
    <div class="legal-consent-container" data-reactid=".hbspt-forms-1.2.0">
      <div class="hs-richtext" data-reactid=".hbspt-forms-1.2.0.0">
        <p>By providing my contact information and ticking the box below, I agree to Cybereason’s <a href="https://www.cybereason.com/privacy-policy">Privacy Policy</a> and consent to communications from Cybereason at the contact information
          provided.</p>
      </div>
      <div data-reactid=".hbspt-forms-1.2.0.1:0">
        <div class="hs-dependent-field" data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578">
          <div class="hs_LEGAL_CONSENT.subscription_type_3958578 hs-LEGAL_CONSENT.subscription_type_3958578 hs-fieldtype-booleancheckbox field hs-form-field"
            data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578">
            <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.1"></legend>
            <div class="input" data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578">
              <ul class="inputs-list" data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0">
                <li class="hs-form-booleancheckbox" data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0"><label
                    for="LEGAL_CONSENT.subscription_type_3958578-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-form-booleancheckbox-display"
                    data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0"><input
                      id="LEGAL_CONSENT.subscription_type_3958578-2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_3958578" value="true"
                      data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0.0" placeholder=""><span
                      data-reactid=".hbspt-forms-1.2.0.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0.1"><span>I agree to receive other communications from
                        Cybereason.</span></span></label></li>
              </ul>
            </div>
          </div>
        </div>
        <legend class="hs-field-desc checkbox-desc" style="display:none;" data-reactid=".hbspt-forms-1.2.0.1:0.1"></legend>
      </div>
    </div>
  </fieldset>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-1.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-1.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-1.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-1.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:2156.199996948242,&quot;rumServiceResponseTime&quot;:2666.3999938964844,&quot;rumFormRenderTime&quot;:2.20001220703125,&quot;rumTotalRenderTime&quot;:2724.5,&quot;rumTotalRequestTime&quot;:507.6999969482422,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:3958578,\&quot;label\&quot;:\&quot;<span>I agree to receive other communications from Cybereason.</span>\&quot;,\&quot;required\&quot;:false}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;<p>By providing my contact information and ticking the box below, I agree to Cybereason’s <a href=\\\&quot;https://www.cybereason.com/privacy-policy\\\&quot;>Privacy Policy</a> and consent to communications from Cybereason at the contact information provided.</p>\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;isLegitimateInterest\&quot;:false}&quot;,&quot;embedAtTimestamp&quot;:&quot;1654531344959&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1644438605189&quot;,&quot;pageUrl&quot;:&quot;https://www.cybereason.com/cybereason-vs-microsoft&quot;,&quot;pageTitle&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;source&quot;:&quot;FormsNext-static-5.502&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.502&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;502&quot;,&quot;timestamp&quot;:1654531344961,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.61 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;3354902&quot;,&quot;formId&quot;:&quot;2d18af45-9c43-467c-a2f9-d2d14ea2a4b2&quot;,&quot;formInstanceId&quot;:&quot;7212&quot;,&quot;pageId&quot;:&quot;57071996455&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;pageName&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;redirectUrl&quot;:&quot;https://www.cybereason.com/thank-you-demo-request&quot;,&quot;target&quot;:&quot;#hs_form_target_form_548102786&quot;,&quot;sfdcCampaignId&quot;:&quot;701f1000001abaKAAQ&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms/&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;}},&quot;canonicalUrl&quot;:&quot;https://www.cybereason.com/cybereason-vs-microsoft&quot;,&quot;pageId&quot;:&quot;57071996455&quot;,&quot;pageName&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;boolCheckBoxFields&quot;:&quot;LEGAL_CONSENT.subscription_type_3958578&quot;,&quot;redirectUrl&quot;:&quot;https://www.cybereason.com/thank-you-demo-request&quot;,&quot;formInstanceId&quot;:&quot;7212&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;phone&quot;,&quot;company&quot;,&quot;jobtitle&quot;,&quot;message&quot;,&quot;LEGAL_CONSENT.subscription_type_3958578&quot;],&quot;formTarget&quot;:&quot;#hs_form_target_form_548102786&quot;,&quot;sfdcCampaignId&quot;:&quot;701f1000001abaKAAQ&quot;,&quot;correlationId&quot;:&quot;230434e6-a56d-458a-9247-147f6f30310f&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;hutk&quot;:&quot;624924cea5b4586b179fe7b672502c6a&quot;,&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isHostedOnHubspot&quot;:true}"
    data-reactid=".hbspt-forms-1.7"><iframe name="target_iframe_2d18af45-9c43-467c-a2f9-d2d14ea2a4b2_7212" style="display:none;" data-reactid=".hbspt-forms-1.8"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/fe9d9356-4cbc-4939-b209-58f7f2a3f869

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/3354902/fe9d9356-4cbc-4939-b209-58f7f2a3f869" enctype="multipart/form-data"
  id="hsForm_fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" method="POST"
  class="hs-form stacked hs-custom-form hs-form-private hsForm_fe9d9356-4cbc-4939-b209-58f7f2a3f869 hs-form-fe9d9356-4cbc-4939-b209-58f7f2a3f869 hs-form-fe9d9356-4cbc-4939-b209-58f7f2a3f869_2ed689e4-e0b6-4d04-b788-16538551a344"
  data-form-id="fe9d9356-4cbc-4939-b209-58f7f2a3f869" data-portal-id="3354902" target="target_iframe_fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" data-reactid=".hbspt-forms-0">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" class="" placeholder="Enter your "
      for="email-fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0"></span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" class="hs-input" type="email" name="email" required="" placeholder="Work Email" value="" autocomplete="email"
        data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
  </div>
  <div class="legal-consent-container" data-reactid=".hbspt-forms-0.2">
    <div class="hs-richtext" data-reactid=".hbspt-forms-0.2.0">
      <p></p>
    </div>
    <div data-reactid=".hbspt-forms-0.2.1:0">
      <div class="hs-dependent-field" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578">
        <div class="hs_LEGAL_CONSENT.subscription_type_3958578 hs-LEGAL_CONSENT.subscription_type_3958578 hs-fieldtype-booleancheckbox field hs-form-field"
          data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578">
          <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.1"></legend>
          <div class="input" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578">
            <ul class="inputs-list" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0">
              <li class="hs-form-booleancheckbox" data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0"><label
                  for="LEGAL_CONSENT.subscription_type_3958578-fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" class="hs-form-booleancheckbox-display"
                  data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0"><input
                    id="LEGAL_CONSENT.subscription_type_3958578-fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_3958578" value="true"
                    data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0.0" placeholder=""><span
                    data-reactid=".hbspt-forms-0.2.1:0.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.$LEGAL_CONSENT=1subscription_type_3958578.0.0.0.1">I agree to receive other communications from
                    Cybereason.</span></label></li>
            </ul>
          </div>
        </div>
      </div>
      <legend class="hs-field-desc checkbox-desc" style="display:none;" data-reactid=".hbspt-forms-0.2.1:0.1"></legend>
    </div>
    <div class="hs-richtext" data-reactid=".hbspt-forms-0.2.2">
      <p></p>
    </div>
    <div class="hs-richtext" data-reactid=".hbspt-forms-0.2.3">
      <p>By clicking submit above, you consent to allow Cybereason to store and process the personal information submitted above to provide you the content requested.</p>
    </div>
  </div>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Submit" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:2156.199996948242,&quot;rumServiceResponseTime&quot;:2665.8999938964844,&quot;rumFormRenderTime&quot;:4,&quot;rumTotalRenderTime&quot;:2671.2999877929688,&quot;rumTotalRequestTime&quot;:498.6999969482422,&quot;lang&quot;:&quot;en&quot;,&quot;legalConsentOptions&quot;:&quot;{\&quot;communicationConsentCheckboxes\&quot;:[{\&quot;communicationTypeId\&quot;:3958578,\&quot;label\&quot;:\&quot;I agree to receive other communications from Cybereason.\&quot;,\&quot;required\&quot;:false}],\&quot;legitimateInterestLegalBasis\&quot;:\&quot;LEGITIMATE_INTEREST_PQL\&quot;,\&quot;communicationConsentText\&quot;:\&quot;<p></p>\&quot;,\&quot;processingConsentType\&quot;:\&quot;IMPLICIT\&quot;,\&quot;processingConsentText\&quot;:\&quot;<p>By clicking submit above, you consent to allow Cybereason to store and process the personal information submitted above to provide you the content requested.</p>\&quot;,\&quot;processingConsentCheckboxLabel\&quot;:\&quot;I agree to allow Cybereason to store and process my personal data.\&quot;,\&quot;privacyPolicyText\&quot;:\&quot;<p></p>\&quot;,\&quot;isLegitimateInterest\&quot;:false}&quot;,&quot;embedAtTimestamp&quot;:&quot;1654531344935&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1644964350663&quot;,&quot;pageUrl&quot;:&quot;https://www.cybereason.com/cybereason-vs-microsoft&quot;,&quot;pageTitle&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;source&quot;:&quot;FormsNext-static-5.502&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.502&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;502&quot;,&quot;timestamp&quot;:1654531344938,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.61 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;3354902&quot;,&quot;formId&quot;:&quot;fe9d9356-4cbc-4939-b209-58f7f2a3f869&quot;,&quot;formInstanceId&quot;:&quot;4076&quot;,&quot;pageId&quot;:&quot;57071996455&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;pageName&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;inlineMessage&quot;:true,&quot;rawInlineMessage&quot;:&quot;<p>Thanks for getting in touch! A Cybereason Defender will be in touch shortly.</p>&quot;,&quot;hsFormKey&quot;:&quot;72b110b24849fc38814a7297eabe4068&quot;,&quot;target&quot;:&quot;#hs_form_target_form_949533998&quot;,&quot;sfdcCampaignId&quot;:&quot;7013Z000002hPJqQAM&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms/&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked hs-custom-form&quot;}},&quot;canonicalUrl&quot;:&quot;https://www.cybereason.com/cybereason-vs-microsoft&quot;,&quot;pageId&quot;:&quot;57071996455&quot;,&quot;pageName&quot;:&quot;Cybereason vs. Microsoft | Security Software Comparison&quot;,&quot;boolCheckBoxFields&quot;:&quot;LEGAL_CONSENT.subscription_type_3958578&quot;,&quot;formInstanceId&quot;:&quot;4076&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;LEGAL_CONSENT.subscription_type_3958578&quot;],&quot;rawInlineMessage&quot;:&quot;<p>Thanks for getting in touch! A Cybereason Defender will be in touch shortly.</p>&quot;,&quot;hsFormKey&quot;:&quot;72b110b24849fc38814a7297eabe4068&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_form_949533998&quot;,&quot;sfdcCampaignId&quot;:&quot;7013Z000002hPJqQAM&quot;,&quot;correlationId&quot;:&quot;6a9185dd-df33-4b16-8e9a-d8702e42ef42&quot;,&quot;contentType&quot;:&quot;landing-page&quot;,&quot;hutk&quot;:&quot;624924cea5b4586b179fe7b672502c6a&quot;,&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isHostedOnHubspot&quot;:true}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_fe9d9356-4cbc-4939-b209-58f7f2a3f869_4076" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

Text Content

This website uses cookies to ensure you get the best experience on our website.
By continuing on our website, you consent to our use of cookies. To find our
more about how we use cookies, please see our Privacy Policy.

I ACCEPT
 * Experiencing a Breach?
 * Contact
 * Blog
   
   
   
   
 * Sign In

Platform


THE CYBEREASON DEFENSE PLATFORM

 * Tour the Platform Unified Defense Solutions
 * The MalOp™ Operation-Centric Security
 * Plans and Features


ENDPOINT SECURITY

 * Cybereason Professional Prevention Focused Protection
 * Cybereason Business Prevent, Detect, and Respond to Cyber Attacks
 * Cybereason Enterprise The Critical Tools Your SOC Needs to Uncover the
   Stealthiest Attackers
 * Cybereason Ultimate Comprehensive protection backed by a $1 Million Breach
   Protection Warranty


PLATFORM MODULES

 * Ransomware Protection Detection and Prevention
 * NGAV Multi-Layered Prevention
 * Endpoint Controls Securely Manage Endpoints
 * EDR End Advanced Threats
 * XDR Extended Detection and Response
 * CWP Cloud Workload Protection
 * Threat Hunting Proactive Mitigation
 * DFIR Uncover Advanced Adversaries
 * Mobile Mobile Threat Defense
 * Threat Intelligence Actionable Intelligence
 * Zero Trust Full Visibility

Services


EXPERIENCING A BREACH?

Cybereason Incident Response will detect and fully remediate all instances of an
attack, getting you back to business fast.

Speak with a Defender now


CYBEREASON MANAGED

 * MDR Accelerate Your Security Program
 * Cybereason MDR Core Monitor the Entire Network
 * Cybereason MDR Essentials Managed Detection and Response
 * Cybereason MDR Complete Premium MDR Services
 * Cybereason MDR Mobile Managed Mobile Defense


CYBEREASON IR & PROFESSIONAL SERVICES

 * Incident Response Detect and remediate an attack
 * Cybereason Cyber Posture Assessment Eliminate Security Gaps
 * Security Validation Assess your cyber attack resiliency
 * Cybereason Compromise Assessment Identify Advanced Threats
 * Security Risk Assessment Improve your security posture
 * Threat Intelligence Actionable intelligence and insight

Why Cybereason


WHY CYBEREASON

The Cybereason Defense Platform moves beyond endless alerting to instead
recognize, expose, and end malicious operations before they take hold.

See the Cybereason Difference


THE CYBEREASON DIFFERENCE

 * Our Difference End Malicious Operations
 * Industry Validation Recognition and Testing
 * Our Customers Dedicated to Defenders
 * Nocturnus Uncovering Malicious Actors


HOW CYBEREASON COMPARES

 * Cybereason VS Crowdstrike Stop chasing alerts
 * Cybereason VS SentinelOne Don’t assume defeat
 * Cybereason VS Microsoft Passable security isn’t enough
 * Cybereason VS Carbon Black Never go it alone

Partners
Resale Partners Managed Service Providers Incident Response Partners Technology
Partners Register a Deal Partner Nest Login
Company
Who We Are Leadership Careers Cybereason Government Global Financial Services
Cyber Defenders Council Newsroom
Resources
All Resources Cybersecurity 101 Analyst Reports Case Studies Data Sheets Threat
Alerts Webinars White Papers Podcasts Nocturnus Research
Get a Demo
 * Book a Demo
 * Platform
   * Platform
   * The Cybereason Defense Platform
     * The Cybereason Defense Platform
     * Tour the Platform Unified Defense Solutions
     * The MalOp Operation-Centric Security
     * Plans and Features
   * Endpoint Security
     * Endpoint Security
     * Platform Bundles Overview Unified Protection for All Endpoints
     * Cybereason Professional Prevention Focused Protection
     * Cybereason Business Prevent, Detect, and Respond to Cyber Attacks
     * Cybereason Enterprise The Critical Tools Your SOC needs to Uncover the
       Stealthiest Attackers
     * Cybereason Ultimate Comprehensive Protection Backed by a $1 Million
       Breach Protection Warranty
   * Platform Modules
     * Platform Modules
     * Ransomware Protection Detection and Prevention
     * NGAV Multi-Layered Prevention
     * Endpoint Controls Securely Manage Endpoints
     * EDR End Advanced Threats
     * XDR Extended Detection and Response
     * CWP Cloud Workload Protection
     * Threat Hunting Proactive Mitigation
     * DFIR Uncover Advanced Adversaries
     * Mobile Mobile Threat Defense
     * Threat Intelligence Actionable Intelligence
     * Zero Trust Full Visibility
 * Services
   * Services
   * Cybereason Managed
     * Cybereason Managed
     * Cybereason Managed Overview Proactive Protection Managed by Our Experts
       and Backed by $1 Million Breach Warranty
     * MDR Accelerate Your Security Program
     * Cybereason MDR Core Monitor the Entire Network
     * Cybereason MDR Essentials Managed Detection and Response
     * Cybereason MDR Complete Premium MDR Services
     * Cybereason MDR Mobile Managed Mobile Defense
   * Cybereason IR & Professional Services
     * Cybereason IR & Professional Services
     * Professional Services
     * Incident Response
     * Posture Assessment
     * Security Validation
     * Compromise Assessment
     * Security Risk Assessment
     * Threat Intelligence
 * Why Cybereason
   * Why Cybereason
   * The Cybereason Difference
     * The Cybereason Difference
     * Our Difference End Malicious Operations
     * Industry Validation Recognition and Testing
     * Our Customers Dedicated to Defenders
     * Nocturnus Uncovering Malicious Actors
   * How Cybereason Compares
     * How Cybereason Compares
     * Cybereason VS Crowdstrike Stop chasing alerts
     * Cybereason VS SentinelOne Don’t assume defeat
     * Cybereason VS Microsoft Passable security isn’t enough
 * Partners
   * Partners
   * Partner Home
   * Resale Partners
   * Managed Service Providers
   * Incident Response Partners
   * Technology Partners
   * Register a Deal
   * Partner Nest Login
 * Company
   * Company
   * Who We Are
   * Leadership
   * Careers
   * Newsroom
   * Cyber Defenders Council
   * Cybereason Government
   * Global Financial Services
   * Blog
 * Resources
   * Resources
   * All Resources
   * Analyst Reports
   * Case Studies
   * Data Sheets
   * Threat Alerts
   * Webinars
   * White Papers
   * Podcasts
   * Nocturnus Research
 * Experiencing a Breach?
 * Contact
 * Blog
 * Sign In to the Nest


DEMO THE CYBEREASON DEFENSE PLATFORM

FUTURE-READY CYBERSECURITY PROTECTION

See how Cybereason allows defenders to detect earlier and remediate faster with
one lightweight agent and an array of deployment options.

By providing my contact information and ticking the box below, I agree to
Cybereason’s Privacy Policy and consent to communications from Cybereason at the
contact information provided.

 * I agree to receive other communications from Cybereason.




CYBEREASON VS. MICROSOFT

Microsoft solutions may pass for security, but they are regularly bypassed by
attackers. With stakes this high, “good enough security” just isn’t good enough.


WHY COMPANIES CHOOSE CYBEREASON

Microsoft


NEVER BE HELD TO RANSOM

Microsoft

UNDEFEATED IN THE FIGHT AGAINST RANSOMWARE

Cybereason deception technology and lightning-fast threat analysis has been
protecting customers from every major attack, making us undefeated in the fight
against ransomware.

PASSABLE PROTECTION ISN'T ENOUGH

Microsoft security offerings often leave customers susceptible to data
encryption and double extortion from ransomware attacks. Exploitation of
Microsoft products are responsible for more than half of all ransomware attacks.


NEVER GO IT ALONE

ELITE EXPERTS AND AROUND THE CLOCK PROTECTION

Managed services provide a needed reprieve for overburdened security teams or
organizations that don't have resources. Cybereason has the industry-renowned
experts necessary to provide exceptional services including MDR and IR.

LACK THE EXPERTISE FOR MANAGED SERVICES

If you go with Microsoft, you’re going it alone. Microsoft hasn’t hired the
talent to provide an MDR service and you'll need yet another vendor to provide
IR services in the event you need support recovering from an incident.


STILL IN PRODUCTION BECAUSE IT'S CRITICAL

BROAD LEGACY SYSTEMS COVERAGE AND DEPLOYMENT OPTIONS

Critical legacy systems are unavoidable. On-premises systems are a reality for
modern organizations. Cybereason includes coverage for legacy systems at no
additional charge and deployment options from air-gapped to the cloud.

EXPENSIVE OR IMPOSSIBLE TO SECURE DATACENTER AND LEGACY SYSTEMS

Microsoft is forcing server workloads to Azure and demands the latest Windows
version on endpoints. Server security is an add-on license, legacy systems are
unsupported or impose an upcharge, and on-premises deployment is impossible.


CONSOLE FATIGUE LEADS TO LOWER PRODUCTIVITY

REDUCE TIME TO DETECT AND RESPOND BY 93%

Increase efficiency and productivity with simplified platform management and
accelerated triage. Companies that switched to Cybereason reduced management
tasks by 75% and time spent on detection and response by 93%.

CUMBERSOME CONSOLES WASTE YOUR TIME

Correlating the details of an attack is manual and requires switching between
multiple consoles. Microsoft requires constant tuning; in MITRE ATT&CK tests
configuration changes were required for detection in 19% of the tests.


NOISE MEANS MISSED THREATS

AN OPERATION-CENTRIC APPROACH LEAVES ATTACKERS NOWHERE TO HIDE

The Cybereason operation-centric approach is enriched with intuitive historical
threat hunting to form a holistic view of an attack; cutting the noise,
providing actionable insights, and uncovering today’s most sophisticated
attackers.

MICROSOFT MISSES SUBTLE SIGNALS AND QUIET MALICIOUS ACTIVITY

Microsoft requires manual correlation of events across multiple consoles to form
the complete picture of an attack. Attackers hide in the noise created by the
deluge of unactionable alerts resulting from this piecemeal approach.


EFFECTIVE SECURITY REQUIRES FOCUS

DEDICATED TO YOU, THE DEFENDERS

Reversing the advantage that adversaries have in cyber security is the sole
focus of Cybereason. Led by the world renowned research organization Nocturnus,
every aspect of the company drives to the future where the defenders rein.

TOO BIG TO SUCCEED

A surge of adversaries running rampant through vulnerabilities native to the
Microsoft ecosystem is a direct result of a lack of focus, with countless
attacks attributed to Microsoft’s laissez-faire attitude towards security.

See The Difference Schedule Your Demo


NEVER BE HELD TO RANSOM

UNDEFEATED IN THE FIGHT AGAINST RANSOMWARE

Cybereason deception technology and lightning-fast threat analysis has been
protecting customers from every major attack, making us undefeated in the fight
against ransomware.

Microsoft

PASSABLE PROTECTION ISN'T ENOUGH

Microsoft security offerings often leave customers susceptible to data
encryption and double extortion from ransomware attacks. Exploitation of
Microsoft products are responsible for more than half of all ransomware attacks.


NEVER GO IT ALONE

ELITE EXPERTS AND AROUND THE CLOCK PROTECTION

Managed services provide a needed reprieve for overburdened security teams or
organizations that don't have resources. Cybereason has the industry-renowned
experts necessary to provide exceptional services including MDR and IR.

Microsoft

LACK THE EXPERTISE FOR MANAGED SERVICES

If you go with Microsoft, you’re going it alone. Microsoft hasn’t hired the
talent to provide an MDR service and you'll need yet another vendor to provide
IR services in the event you need support recovering from an incident.


STILL IN PRODUCTION BECAUSE IT'S CRITICAL

BROAD LEGACY SYSTEMS COVERAGE AND DEPLOYMENT OPTIONS

Critical legacy systems are unavoidable. On-premises systems are a reality for
modern organizations. Cybereason includes coverage for legacy systems at no
additional charge and deployment options from air-gapped to the cloud.

Microsoft

EXPENSIVE OR IMPOSSIBLE TO SECURE DATACENTER AND LEGACY SYSTEMS

Microsoft is forcing server workloads to Azure and demands the latest Windows
version on endpoints. Server security is an add-on license, legacy systems are
unsupported or impose an upcharge, and on-premises deployment is impossible.


CONSOLE FATIGUE LEADS TO LOWER PRODUCTIVITY

REDUCE TIME TO DETECT AND RESPOND BY 93%

Increase efficiency and productivity with simplified platform management and
accelerated triage. Companies that switched to Cybereason reduced management
tasks by 75% and time spent on detection and response by 93%.

Microsoft

CUMBERSOME CONSOLES WASTE YOUR TIME

Correlating the details of an attack is manual and requires switching between
multiple consoles. Microsoft requires constant tuning; in MITRE ATT&CK tests
configuration changes were required for detection in 19% of the tests.


NOISE MEANS MISSED THREATS

AN OPERATION-CENTRIC APPROACH LEAVES ATTACKERS NOWHERE TO HIDE

The Cybereason operation-centric approach is enriched with intuitive historical
threat hunting to form a holistic view of an attack; cutting the noise,
providing actionable insights, and uncovering today’s most sophisticated
attackers.

Microsoft

MICROSOFT MISSES SUBTLE SIGNALS AND QUIET MALICIOUS ACTIVITY

Microsoft requires manual correlation of events across multiple consoles to form
the complete picture of an attack. Attackers hide in the noise created by the
deluge of unactionable alerts resulting from this piecemeal approach.


EFFECTIVE SECURITY REQUIRES FOCUS

DEDICATED TO YOU, THE DEFENDERS

Reversing the advantage that adversaries have in cyber security is the sole
focus of Cybereason. Led by the world renowned research organization Nocturnus,
every aspect of the company drives to the future where the defenders rein.

Microsoft

TOO BIG TO SUCCEED

A surge of adversaries running rampant through vulnerabilities native to the
Microsoft ecosystem is a direct result of a lack of focus, with countless
attacks attributed to Microsoft’s laissez-faire attitude towards security.

See The Difference Schedule Your Demo


THE MALOP™ DIFFERENCE

Cybereason is operation-centric instead of alert-centric. We instantly deliver
fully contextualized and correlated insights into any MalOp, detailing the full
attack story from root cause to impacted users and devices, significantly
reducing investigation/remediation periods.

2:25











WHAT INDUSTRY ANALYSTS ARE SAYING

Analyst Report

CYBEREASON NAMED VISIONARY

See why Gartner named Cybereason a Visionary with the "most completeness of
vision" in the 2021 Gartner Magic Quadrant for Endpoint Protection Platform.

Learn Why
Analyst Report

CYBEREASON POSTS BEST RESULTS IN HISTORY OF MITRE ATT&CK EVALUATIONS

Cybereason detected all 19 attack steps tested during the evaluation
demonstrating the ability to see the full picture of the malicious operation.

Learn More
Analyst Report

MAKING BIG EDR WAVES

Find out why Forrester stated in the 2020 Endpoint Detection & Response Wave
that, "Cybereason futureproofed their EDR product by architecting it with the
vision of combining the detection analytics synonymous with the EDR Market."

Read the Report


THE BEST DEFEND THE BEST


 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 


CYBEREASON VS. THE COMPETITION

Defenders choose Cybereason solutions time and time again. Check out how we
stack up against some of the other tools out there today.

SENTINELONE'S PROTECTION HOLDS YOU BACK

SentinelOne’s ransomware “rollback” approach relies on remediation after your
data has been stolen and the damage or ransomware is done.

CYBEREASON VS. CROWDSTRIKE

Automatically end malicious operations using artificial intelligence versus
chasing alerts that require manual triage.


COMPARE CYBEREASON TO MICROSOFT


SCHEDULE YOUR DEMO TO SEE THE CYBEREASON DIFFERENCE

 * I agree to receive other communications from Cybereason.



By clicking submit above, you consent to allow Cybereason to store and process
the personal information submitted above to provide you the content requested.