Introducing G2.ai, the future of software buying.Try now

Best User and Entity Behavior Analytics (UEBA) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes

Best User and Entity Behavior Analytics (UEBA) Software At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Show LessShow More
Easiest to Use:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
56 Listings in User and Entity Behavior Analytics (UEBA) Available
(474)4.3 out of 5
11th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.4
    Continuous Analysis
    Average: 8.9
    8.4
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.4
Continuous Analysis
Average: 8.9
8.4
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(297)4.7 out of 5
3rd Easiest To Use in User and Entity Behavior Analytics (UEBA) software
View top Consulting Services for CrowdStrike Falcon Endpoint Protection Platform
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    54
    Ease of Use
    43
    Security
    43
    Threat Detection
    38
    Detection
    36
    Cons
    Missing Features
    14
    Expensive
    11
    Limited Features
    11
    Complexity
    10
    Difficult Navigation
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    8.6
    Continuous Analysis
    Average: 8.9
    8.6
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike’s leading cloud-based Falcon platform protects your systems through a single lightweight sensor — there is no on-premises equipment to be maintained, managed or updated, and no need for fr

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 40% Mid-Market
CrowdStrike Falcon Endpoint Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
54
Ease of Use
43
Security
43
Threat Detection
38
Detection
36
Cons
Missing Features
14
Expensive
11
Limited Features
11
Complexity
10
Difficult Navigation
10
CrowdStrike Falcon Endpoint Protection Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
8.6
Continuous Analysis
Average: 8.9
8.6
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(46)4.5 out of 5
8th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Manufacturing
    Market Segment
    • 83% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    10
    Data Classification
    9
    Ease of Use
    9
    Data Discovery
    8
    Security
    8
    Cons
    Expensive
    4
    Limitations
    4
    Complexity
    3
    Inefficiency
    3
    Management Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Ease of Use
    Average: 8.8
    9.7
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,292 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,510 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Manufacturing
Market Segment
  • 83% Enterprise
  • 28% Mid-Market
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
10
Data Classification
9
Ease of Use
9
Data Discovery
8
Security
8
Cons
Expensive
4
Limitations
4
Complexity
3
Inefficiency
3
Management Issues
3
Varonis Data Security Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
8.6
Ease of Use
Average: 8.8
9.7
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,292 Twitter followers
LinkedIn® Page
www.linkedin.com
2,510 employees on LinkedIn®
(168)4.6 out of 5
Optimized for quick response
1st Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Safetica is a Data Loss Prevention (DLP) software that aims to protect sensitive data, monitor user activities, and prevent potential data leaks.
    • Reviewers frequently mention the software's comprehensive DLP features, user activity monitoring, compliance support, ease of deployment, and good user interface and reporting capabilities.
    • Reviewers noted that the software can consume a lot of resources on client computers, has limited integration in some cases, and can have a performance overhead on endpoints.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Safetica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    28
    Features
    22
    Security
    22
    Data Protection
    18
    Implementation Ease
    16
    Cons
    Slow Performance
    10
    Complexity
    7
    Limited Features
    7
    Integration Issues
    6
    Limitations
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safetica features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.9
    Ease of Use
    Average: 8.8
    9.0
    Continuous Analysis
    Average: 8.9
    8.6
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safetica
    Company Website
    Year Founded
    2007
    HQ Location
    San Jose, California, United States
    Twitter
    @Safetica
    668 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    113 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Safetica is a Data Loss Prevention (DLP) software that aims to protect sensitive data, monitor user activities, and prevent potential data leaks.
  • Reviewers frequently mention the software's comprehensive DLP features, user activity monitoring, compliance support, ease of deployment, and good user interface and reporting capabilities.
  • Reviewers noted that the software can consume a lot of resources on client computers, has limited integration in some cases, and can have a performance overhead on endpoints.
Safetica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
28
Features
22
Security
22
Data Protection
18
Implementation Ease
16
Cons
Slow Performance
10
Complexity
7
Limited Features
7
Integration Issues
6
Limitations
6
Safetica features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.9
Ease of Use
Average: 8.8
9.0
Continuous Analysis
Average: 8.9
8.6
Anomaly Detection
Average: 8.9
Seller Details
Seller
Safetica
Company Website
Year Founded
2007
HQ Location
San Jose, California, United States
Twitter
@Safetica
668 Twitter followers
LinkedIn® Page
www.linkedin.com
113 employees on LinkedIn®
(216)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

    Users
    • SOC Analyst
    • Technical Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cynet - All-in-One Cybersecurity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    48
    Security
    39
    Features
    38
    Threat Detection
    38
    Cybersecurity
    28
    Cons
    UX Improvement
    14
    Missing Features
    13
    Slow Performance
    12
    Limited Features
    11
    Alert Issues
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    9.4
    Continuous Analysis
    Average: 8.9
    9.4
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cynet
    Company Website
    Year Founded
    2014
    HQ Location
    Boston, MA
    Twitter
    @Cynet360
    1,106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    287 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cynet is the ultimate All-in-One Managed Cybersecurity Platform that delivers robust and comprehensive protection for small to medium enterprises (SMEs) while maximizing operational efficiency for man

Users
  • SOC Analyst
  • Technical Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 33% Small-Business
Cynet - All-in-One Cybersecurity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
48
Security
39
Features
38
Threat Detection
38
Cybersecurity
28
Cons
UX Improvement
14
Missing Features
13
Slow Performance
12
Limited Features
11
Alert Issues
10
Cynet - All-in-One Cybersecurity Platform features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
9.4
Continuous Analysis
Average: 8.9
9.4
Anomaly Detection
Average: 8.9
Seller Details
Seller
Cynet
Company Website
Year Founded
2014
HQ Location
Boston, MA
Twitter
@Cynet360
1,106 Twitter followers
LinkedIn® Page
www.linkedin.com
287 employees on LinkedIn®
(141)4.6 out of 5
Optimized for quick response
4th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:$15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 56% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teramind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Employee Monitoring
    9
    Productivity Improvement
    8
    Customer Support
    6
    Productivity
    6
    Cons
    Software Issues
    4
    Poor Customer Support
    3
    Expensive
    2
    Software Malfunction
    2
    Update Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teramind features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    9.1
    Continuous Analysis
    Average: 8.9
    8.6
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teramind
    Company Website
    Year Founded
    2014
    HQ Location
    Aventura, FL
    Twitter
    @teramindco
    851 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 56% Small-Business
  • 36% Mid-Market
Teramind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Employee Monitoring
9
Productivity Improvement
8
Customer Support
6
Productivity
6
Cons
Software Issues
4
Poor Customer Support
3
Expensive
2
Software Malfunction
2
Update Issues
2
Teramind features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
9.1
Continuous Analysis
Average: 8.9
8.6
Anomaly Detection
Average: 8.9
Seller Details
Seller
Teramind
Company Website
Year Founded
2014
HQ Location
Aventura, FL
Twitter
@teramindco
851 Twitter followers
LinkedIn® Page
www.linkedin.com
142 employees on LinkedIn®
(293)4.4 out of 5
Optimized for quick response
6th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ActivTrak’s workforce intelligence platform transforms work activity data into actionable insights to optimize performance management and boost business productivity. Unlike traditional employee monit

    Users
    • IT Manager
    • Operations Manager
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 54% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ActivTrak Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    44
    Reporting
    24
    Insights
    23
    Productivity Improvement
    22
    Features
    20
    Cons
    Complexity
    20
    Difficult Navigation
    14
    Learning Difficulty
    14
    Insufficient Detail
    13
    Not User-Friendly
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActivTrak features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Ease of Use
    Average: 8.8
    8.9
    Continuous Analysis
    Average: 8.9
    8.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Austin, TX
    Twitter
    @activtrak
    5,968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    160 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ActivTrak’s workforce intelligence platform transforms work activity data into actionable insights to optimize performance management and boost business productivity. Unlike traditional employee monit

Users
  • IT Manager
  • Operations Manager
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 54% Small-Business
  • 41% Mid-Market
ActivTrak Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
44
Reporting
24
Insights
23
Productivity Improvement
22
Features
20
Cons
Complexity
20
Difficult Navigation
14
Learning Difficulty
14
Insufficient Detail
13
Not User-Friendly
12
ActivTrak features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.5
Ease of Use
Average: 8.8
8.9
Continuous Analysis
Average: 8.9
8.2
Anomaly Detection
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Austin, TX
Twitter
@activtrak
5,968 Twitter followers
LinkedIn® Page
www.linkedin.com
160 employees on LinkedIn®
(99)4.3 out of 5
13th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity m

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 36% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender for Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Installation
    1
    Easy Integrations
    1
    Monitoring
    1
    Threat Detection
    1
    User Interface
    1
    Cons
    Complexity
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender for Identity features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.0
    Ease of Use
    Average: 8.8
    8.2
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity m

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 36% Enterprise
  • 31% Small-Business
Microsoft Defender for Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Installation
1
Easy Integrations
1
Monitoring
1
Threat Detection
1
User Interface
1
Cons
Complexity
1
False Positives
1
Microsoft Defender for Identity features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.0
Ease of Use
Average: 8.8
8.2
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(13)4.7 out of 5
5th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Exabeam New-Scale Fusion Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Features
    2
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Information Deficiency
    1
    Insufficient Detail
    1
    Not User-Friendly
    1
    Parsing Issues
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Ease of Use
    Average: 8.8
    9.4
    Continuous Analysis
    Average: 8.9
    9.4
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,344 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    943 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate and respond to cyberattacks in 51 percent less time. Security organizations n

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 31% Mid-Market
Exabeam New-Scale Fusion Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Features
2
Integration Capabilities
1
Integrations
1
Cons
Information Deficiency
1
Insufficient Detail
1
Not User-Friendly
1
Parsing Issues
1
Poor Interface Design
1
Exabeam New-Scale Fusion features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.1
9.2
Ease of Use
Average: 8.8
9.4
Continuous Analysis
Average: 8.9
9.4
Anomaly Detection
Average: 8.9
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,344 Twitter followers
LinkedIn® Page
www.linkedin.com
943 employees on LinkedIn®
(107)4.4 out of 5
9th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Starting at $2.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 48% Enterprise
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberArk Workforce Identity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    8
    Security
    7
    Ease of Use
    6
    Access Management
    5
    Access Control
    4
    Cons
    Timing Issues
    3
    Complexity
    2
    Complex Usability
    2
    Delayed Response
    2
    Difficult Learning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberArk Workforce Identity features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    8.7
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberArk
    Year Founded
    1999
    HQ Location
    Newton, MA
    Twitter
    @CyberArk
    17,416 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,051 employees on LinkedIn®
    Ownership
    NASDAQ:CYBR
Product Description
How are these determined?Information
This description is provided by the seller.

CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 48% Enterprise
  • 48% Mid-Market
CyberArk Workforce Identity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
8
Security
7
Ease of Use
6
Access Management
5
Access Control
4
Cons
Timing Issues
3
Complexity
2
Complex Usability
2
Delayed Response
2
Difficult Learning
2
CyberArk Workforce Identity features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
8.7
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
CyberArk
Year Founded
1999
HQ Location
Newton, MA
Twitter
@CyberArk
17,416 Twitter followers
LinkedIn® Page
www.linkedin.com
4,051 employees on LinkedIn®
Ownership
NASDAQ:CYBR
(69)4.4 out of 5
14th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:$2,156 Per Month
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 67% Mid-Market
    • 30% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightIDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralized Management
    1
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Easy Integrations
    1
    Cons
    Cloud Dependency
    1
    Cost
    1
    Expensive
    1
    High Resource Usage
    1
    Inadequate Monitoring
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightIDR features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.1
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

Rapid7 InsightIDR is a SaaS SIEM for modern threat detection and response. InsightIDR enables security analysts to work more efficiently and effectively, by unifying diverse data sources, providing ea

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 67% Mid-Market
  • 30% Enterprise
InsightIDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralized Management
1
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Easy Integrations
1
Cons
Cloud Dependency
1
Cost
1
Expensive
1
High Resource Usage
1
Inadequate Monitoring
1
InsightIDR features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.1
Anomaly Detection
Average: 8.9
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securonix is working to radically transform all areas of data security with actionable security intelligence.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Securonix Security Operations and Analytics Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Customization
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Detection Accuracy
    1
    Ease of Understanding
    1
    Cons
    Alerting Issues
    1
    Complex Querying
    1
    Inefficient Alerting
    1
    Logging Issues
    1
    Log Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
    7.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    9.4
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securonix
    Year Founded
    2008
    HQ Location
    Addison, US
    Twitter
    @Securonix
    4,228 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securonix is working to radically transform all areas of data security with actionable security intelligence.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 31% Small-Business
Securonix Security Operations and Analytics Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Customization
1
Dashboard Design
1
Dashboard Usability
1
Detection Accuracy
1
Ease of Understanding
1
Cons
Alerting Issues
1
Complex Querying
1
Inefficient Alerting
1
Logging Issues
1
Log Management
1
Securonix Security Operations and Analytics Platform features and usability ratings that predict user satisfaction
7.7
Has the product been a good partner in doing business?
Average: 9.1
8.5
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
9.4
Anomaly Detection
Average: 8.9
Seller Details
Seller
Securonix
Year Founded
2008
HQ Location
Addison, US
Twitter
@Securonix
4,228 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Learning
    1
    Ease of Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Information Deficiency
    1
    Lack of Features
    1
    Limited Accessibility
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.1
    Ease of Use
    Average: 8.8
    7.9
    Continuous Analysis
    Average: 8.9
    8.1
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    996 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 29% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Learning
1
Ease of Management
1
Ease of Use
1
Easy Integrations
1
Implementation Ease
1
Cons
Expensive
1
Information Deficiency
1
Lack of Features
1
Limited Accessibility
1
Limited Features
1
Logpoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.1
8.1
Ease of Use
Average: 8.8
7.9
Continuous Analysis
Average: 8.9
8.1
Anomaly Detection
Average: 8.9
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
996 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
(26)4.5 out of 5
7th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Starting at $595.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
    8.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Ease of Use
    Average: 8.8
    7.5
    Continuous Analysis
    Average: 8.9
    7.9
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compl

Users
No information available
Industries
No information available
Market Segment
  • 54% Enterprise
  • 38% Mid-Market
ManageEngine ADAudit Plus features and usability ratings that predict user satisfaction
8.4
Has the product been a good partner in doing business?
Average: 9.1
8.5
Ease of Use
Average: 8.8
7.5
Continuous Analysis
Average: 8.9
7.9
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetWitness Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Investigation
    1
    Threat Detection
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetWitness Platform features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.1
    7.5
    Ease of Use
    Average: 8.8
    8.6
    Continuous Analysis
    Average: 8.9
    9.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Bedford, MA
    Twitter
    @Netwitness
    1,639 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetWitness is a comprehensive threat detection, investigation and response platform that combines visibility, analytics, insight, and automation into a single solution. It collects and analyzes data a

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
NetWitness Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Investigation
1
Threat Detection
1
Cons
Integration Issues
1
NetWitness Platform features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.1
7.5
Ease of Use
Average: 8.8
8.6
Continuous Analysis
Average: 8.9
9.2
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
1997
HQ Location
Bedford, MA
Twitter
@Netwitness
1,639 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
(38)4.2 out of 5
10th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop inside

    Users
    No information available
    Industries
    • Computer Software
    • Higher Education
    Market Segment
    • 45% Enterprise
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Incydr features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Code42
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @code42
    5,691 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    141 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop inside

Users
No information available
Industries
  • Computer Software
  • Higher Education
Market Segment
  • 45% Enterprise
  • 39% Small-Business
Incydr features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Code42
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@code42
5,691 Twitter followers
LinkedIn® Page
www.linkedin.com
141 employees on LinkedIn®
(30)4.5 out of 5
12th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Grow and monetize API products with a powerful analytics and billing platform

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Moesif Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Easy Setup
    11
    Customer Support
    9
    Easy Integrations
    8
    Analytics
    7
    Cons
    Access Limitations
    5
    Poor UI
    5
    Expensive
    4
    UX Improvement
    4
    API Management
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Moesif features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Ease of Use
    Average: 8.8
    9.3
    Continuous Analysis
    Average: 8.9
    9.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Moesif
    Year Founded
    2017
    HQ Location
    San Francisco, California
    Twitter
    @MoesifHQ
    521 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Grow and monetize API products with a powerful analytics and billing platform

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
Moesif Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Easy Setup
11
Customer Support
9
Easy Integrations
8
Analytics
7
Cons
Access Limitations
5
Poor UI
5
Expensive
4
UX Improvement
4
API Management
3
Moesif features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
8.6
Ease of Use
Average: 8.8
9.3
Continuous Analysis
Average: 8.9
9.2
Anomaly Detection
Average: 8.9
Seller Details
Seller
Moesif
Year Founded
2017
HQ Location
San Francisco, California
Twitter
@MoesifHQ
521 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
15th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Ease of Use
    14
    Features
    14
    Visibility
    10
    Cybersecurity
    9
    Cons
    False Positives
    4
    Inefficient Alerting
    3
    Inefficient Alert System
    3
    Information Management
    3
    Insufficient Detail
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Ease of Use
    Average: 8.8
    8.7
    Continuous Analysis
    Average: 8.9
    8.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Ease of Use
14
Features
14
Visibility
10
Cybersecurity
9
Cons
False Positives
4
Inefficient Alerting
3
Inefficient Alert System
3
Information Management
3
Insufficient Detail
3
Adlumin features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
9.2
Ease of Use
Average: 8.8
8.7
Continuous Analysis
Average: 8.9
8.7
Anomaly Detection
Average: 8.9
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(38)4.3 out of 5
16th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Starting at $15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 63% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Monitoring
    11
    Customer Support
    8
    Employee Monitoring
    8
    Activity Monitoring
    7
    Cons
    Setup Difficulties
    9
    Difficult Setup
    8
    Technical Issues
    8
    Complex Setup
    6
    Software Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.1
    Continuous Analysis
    Average: 8.9
    7.8
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 63% Mid-Market
  • 29% Small-Business
Veriato Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Monitoring
11
Customer Support
8
Employee Monitoring
8
Activity Monitoring
7
Cons
Setup Difficulties
9
Difficult Setup
8
Technical Issues
8
Complex Setup
6
Software Issues
5
Veriato features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.1
Continuous Analysis
Average: 8.9
7.8
Anomaly Detection
Average: 8.9
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,337 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DNIF HYPERCLOUD Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Ease of Use
    1
    Easy Implementation
    1
    Features
    1
    Implementation Ease
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Limited Compatibility
    1
    Limited Integration
    1
    Limited Third-Party Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DNIF
    Year Founded
    2002
    HQ Location
    Mountain View, California
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DNIF HYPERCLOUD Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Ease of Use
1
Easy Implementation
1
Features
1
Implementation Ease
1
Cons
Expensive
1
Integration Issues
1
Limited Compatibility
1
Limited Integration
1
Limited Third-Party Integration
1
DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.8
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
DNIF
Year Founded
2002
HQ Location
Mountain View, California
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Haystax
    Year Founded
    2012
    HQ Location
    Kansas City, Missouri
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

Users
No information available
Industries
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.4
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Haystax
Year Founded
2012
HQ Location
Kansas City, Missouri
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    6
    Ease of Use
    5
    Features
    5
    Implementation Ease
    5
    Real-time Monitoring
    5
    Cons
    Limited Features
    3
    Insufficient Detail
    2
    Limited Customization
    2
    Slow Performance
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Ease of Use
    Average: 8.8
    9.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Needham, MA
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 36% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
6
Ease of Use
5
Features
5
Implementation Ease
5
Real-time Monitoring
5
Cons
Limited Features
3
Insufficient Detail
2
Limited Customization
2
Slow Performance
2
Alert Management
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.6
Ease of Use
Average: 8.8
9.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Company Website
Year Founded
2013
HQ Location
Needham, MA
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk User Behavior Analytics Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Machine Learning
    4
    User Behavior Analytics
    4
    AI Technology
    3
    Detection Efficiency
    3
    Ease of Use
    3
    Cons
    Complex Implementation
    3
    Complexity
    3
    Setup Difficulties
    3
    Complex Setup
    2
    High Resource Usage
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Ease of Use
    Average: 8.8
    9.3
    Continuous Analysis
    Average: 8.9
    9.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Splunk User Behavior Analytics Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Machine Learning
4
User Behavior Analytics
4
AI Technology
3
Detection Efficiency
3
Ease of Use
3
Cons
Complex Implementation
3
Complexity
3
Setup Difficulties
3
Complex Setup
2
High Resource Usage
2
Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.1
8.5
Ease of Use
Average: 8.8
9.3
Continuous Analysis
Average: 8.9
9.7
Anomaly Detection
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.1
    7.8
    Ease of Use
    Average: 8.8
    8.9
    Continuous Analysis
    Average: 8.9
    8.9
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.1
7.8
Ease of Use
Average: 8.8
8.9
Continuous Analysis
Average: 8.9
8.9
Anomaly Detection
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Group-IB Fraud Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Fraud Prevention
    2
    Fraud Protection
    2
    Analytics
    1
    Cons
    Inaccuracy
    1
    Inadequate Reporting
    1
    Inconvenience
    1
    Insufficient Detail
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Fraud Protection features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Company Website
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Group-IB Fraud Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Fraud Prevention
2
Fraud Protection
2
Analytics
1
Cons
Inaccuracy
1
Inadequate Reporting
1
Inconvenience
1
Insufficient Detail
1
Limited Customization
1
Group-IB Fraud Protection features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.4
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Group-IB
Company Website
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,853 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oort Identity Security Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oort
    Year Founded
    2019
    HQ Location
    Boston, MA
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Oort Identity Security Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Oort
Year Founded
2019
HQ Location
Boston, MA
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Saas Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Protection
    2
    Insights
    2
    Cons
    Expensive
    2
    Limited Compatibility
    2
    Pricing Issues
    2
    Access Control
    1
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Saas Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 29% Enterprise
Prisma Saas Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Threat Detection
3
Cybersecurity
2
Data Protection
2
Insights
2
Cons
Expensive
2
Limited Compatibility
2
Pricing Issues
2
Access Control
1
Access Issues
1
Prisma Saas Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.6
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 9.1
    7.7
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    9.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Westport, US
    Twitter
    @InterGuard
    540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

Users
No information available
Industries
No information available
Market Segment
  • 71% Small-Business
  • 43% Mid-Market
InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 9.1
7.7
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
9.2
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Westport, US
Twitter
@InterGuard
540 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    6.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,905 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    796 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Small-Business
Netwrix Threat Manager features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
6.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,905 Twitter followers
LinkedIn® Page
www.linkedin.com
796 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Hawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Ease of Use
    2
    Monitoring
    2
    Threat Detection
    2
    Cloud Security
    1
    Cons
    Expensive
    2
    Pricing Issues
    2
    Slow Performance
    2
    High Resource Usage
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Hawk features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cyber Hawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Ease of Use
2
Monitoring
2
Threat Detection
2
Cloud Security
1
Cons
Expensive
2
Pricing Issues
2
Slow Performance
2
High Resource Usage
1
Network Issues
1
Cyber Hawk features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,590 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,590 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RevealSecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    4
    User Behavior Analytics
    3
    Monitoring
    2
    Activity Monitoring
    1
    Alerts
    1
    Cons
    Expensive
    1
    Insufficient Detail
    1
    Integration Issues
    1
    Limited Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RevealSecurity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Radebeul, Saxony
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 43% Mid-Market
RevealSecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
4
User Behavior Analytics
3
Monitoring
2
Activity Monitoring
1
Alerts
1
Cons
Expensive
1
Insufficient Detail
1
Integration Issues
1
Limited Automation
1
RevealSecurity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.3
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2021
HQ Location
Radebeul, Saxony
LinkedIn® Page
www.linkedin.com
Entry Level Price:$3.99
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ustvnow features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    USTVnow
    Year Founded
    2010
    HQ Location
    New York, New York
    Twitter
    @ustvnow
    2,992 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ustvnow features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
USTVnow
Year Founded
2010
HQ Location
New York, New York
Twitter
@ustvnow
2,992 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protecting Patient Privacy in Electronic Health Records

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FairWarning features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Pasadena, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protecting Patient Privacy in Electronic Health Records

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FairWarning features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Pasadena, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,314 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.2
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,314 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • inDefend features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    5.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Noida, IN
    Twitter
    @dataresolve
    276 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    89 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
inDefend features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
5.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Noida, IN
Twitter
@dataresolve
276 Twitter followers
LinkedIn® Page
www.linkedin.com
89 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SearchInform ProfileCenter features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Dubai, AE
    Twitter
    @SearchinformI
    97 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SearchInform ProfileCenter features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Dubai, AE
Twitter
@SearchinformI
97 Twitter followers
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    118,566 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,006 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
118,566 Twitter followers
LinkedIn® Page
www.linkedin.com
10,006 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anomali features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANOMALI
    Year Founded
    2013
    HQ Location
    Redwood City, CA
    Twitter
    @Anomali
    8,805 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Anomali features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ANOMALI
Year Founded
2013
HQ Location
Redwood City, CA
Twitter
@Anomali
8,805 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protex AI's Behavioral Safety solution leverages advanced artificial intelligence to enhance workplace safety by autonomously monitoring and analyzing worker behaviors within indoor environments. By i

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Behavioural Safety features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Protex AI
    Year Founded
    2021
    HQ Location
    Dublin, IE
    Twitter
    @ProtexAI
    154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protex AI's Behavioral Safety solution leverages advanced artificial intelligence to enhance workplace safety by autonomously monitoring and analyzing worker behaviors within indoor environments. By i

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Behavioural Safety features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Protex AI
Year Founded
2021
HQ Location
Dublin, IE
Twitter
@ProtexAI
154 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application AuditTM enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Compuware Application Audit features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,760 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

Application AuditTM enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BMC Compuware Application Audit features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,477 Twitter followers
LinkedIn® Page
www.linkedin.com
9,760 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @cprottr
    182 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@cprottr
182 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DTEX inTERCEPT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Saratoga, California
    Twitter
    @DtexSystems
    1,521 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DTEX inTERCEPT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
HQ Location
Saratoga, California
Twitter
@DtexSystems
1,521 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • e-Safe Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    1
    Compliance Management
    1
    Configuration
    1
    Configuration Ease
    1
    Data Protection
    1
    Cons
    Complexity
    1
    Dashboard Issues
    1
    Learning Curve
    1
    Poor Interface Design
    1
    Software Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • e-Safe Compliance features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
e-Safe Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
1
Compliance Management
1
Configuration
1
Configuration Ease
1
Data Protection
1
Cons
Complexity
1
Dashboard Issues
1
Learning Curve
1
Poor Interface Design
1
Software Complexity
1
e-Safe Compliance features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fasoo RiskView is a user behavior analytics based risk management solution that applies sophisticated rule-based modeling to data sources to establish normal patterns of behavior and flag suspicious a

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fasoo RiskView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fasoo
    Year Founded
    2000
    HQ Location
    Bethesda, US
    Twitter
    @Fasoocom
    234 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
    Ownership
    150900 (KOSDAQ)
Product Description
How are these determined?Information
This description is provided by the seller.

Fasoo RiskView is a user behavior analytics based risk management solution that applies sophisticated rule-based modeling to data sources to establish normal patterns of behavior and flag suspicious a

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fasoo RiskView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fasoo
Year Founded
2000
HQ Location
Bethesda, US
Twitter
@Fasoocom
234 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
Ownership
150900 (KOSDAQ)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and Eliminate Threats with User Behavior Analytics

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortscale features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortscale
    Year Founded
    2013
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and Eliminate Threats with User Behavior Analytics

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fortscale features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortscale
Year Founded
2013
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Graboxy offers robust protection against unauthorized access by integrating three different modules: Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Graboxy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    London, United Kingdom
    Twitter
    @cursorinsight
    1,497 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Graboxy offers robust protection against unauthorized access by integrating three different modules: Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Graboxy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
London, United Kingdom
Twitter
@cursorinsight
1,497 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Actuate's AI Intruder Detection software transforms existing security cameras into intelligent monitoring systems, significantly reducing false positives and enhancing operator efficiency. By leveragi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder Detection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Actuate
    Year Founded
    1993
    HQ Location
    San Mateo, CA
    Ownership
    NASDAQ: BIRT
    Phone
    650-645-3000
Product Description
How are these determined?Information
This description is provided by the seller.

Actuate's AI Intruder Detection software transforms existing security cameras into intelligent monitoring systems, significantly reducing false positives and enhancing operator efficiency. By leveragi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Intruder Detection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Actuate
Year Founded
1993
HQ Location
San Mateo, CA
Ownership
NASDAQ: BIRT
Phone
650-645-3000
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kntrol provides cutting-edge behavior pattern tracking and endpoint monitoring to shield businesses from insider threats. Our solutions ensure regulatory compliance, boost organizational visibility an

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kntrol features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kriptone
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kntrol provides cutting-edge behavior pattern tracking and endpoint monitoring to shield businesses from insider threats. Our solutions ensure regulatory compliance, boost organizational visibility an

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kntrol features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kriptone
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In the world of cyber security, security teams are trending away from using prevention-only approaches, according to a 2018 Gartner report called Market Guide for User and Entity Behavior Analytics. A

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure UEBA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In the world of cyber security, security teams are trending away from using prevention-only approaches, according to a 2018 Gartner report called Market Guide for User and Entity Behavior Analytics. A

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure UEBA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mandiant Breach Analytics for Chronicle features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Mandiant Breach Analytics for Chronicle features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Micro Focus Real User Monitor (RUM) is an end user monitoring designed to give users visibility into user behavior for fast, targeted problem resolution.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Real User Monitoring (RUM) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

Micro Focus Real User Monitor (RUM) is an end user monitoring designed to give users visibility into user behavior for fast, targeted problem resolution.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
OpenText Real User Monitoring (RUM) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Risk Fabric enables stakeholders across the business to prioritize their remediation activities and direct their limited resources at the risks that matter most.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Risk Fabric features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Risk Fabric enables stakeholders across the business to prioritize their remediation activities and direct their limited resources at the risks that matter most.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Risk Fabric features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time deta

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureIdentity IRAD features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2003
    HQ Location
    Theale, Berkshire, United Kingdom
    Twitter
    @securenvoy
    667 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
    Phone
    44 (0) 845 2600010
Product Description
How are these determined?Information
This description is provided by the seller.

Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time deta

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SecureIdentity IRAD features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2003
HQ Location
Theale, Berkshire, United Kingdom
Twitter
@securenvoy
667 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
Phone
44 (0) 845 2600010
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    All-in-One Solution for Insider Threat Management and Employee Monitoring. Staffcop is a groundbreaking solution that integrates Insider Threat Management with robust employee monitoring and remote ad

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Staffcop Enterprise Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    4
    Activity Monitoring
    3
    Employee Monitoring
    3
    Helpful
    2
    Security
    2
    Cons
    Inaccuracy
    2
    Inadequate Monitoring
    2
    Clocking Issues
    1
    Employee Dissatisfaction
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Staffcop Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.8
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Staffcop
    Year Founded
    2012
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

All-in-One Solution for Insider Threat Management and Employee Monitoring. Staffcop is a groundbreaking solution that integrates Insider Threat Management with robust employee monitoring and remote ad

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Staffcop Enterprise Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
4
Activity Monitoring
3
Employee Monitoring
3
Helpful
2
Security
2
Cons
Inaccuracy
2
Inadequate Monitoring
2
Clocking Issues
1
Employee Dissatisfaction
1
False Positives
1
Staffcop Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
8.8
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Staffcop
Year Founded
2012
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Submotion gives you an easy overview of who has access to which systems. The central view in Submotion gives you a spreadsheet-like view of your team and services. This makes it quick and easy to see

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • submotion features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    submotion
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Submotion gives you an easy overview of who has access to which systems. The central view in Submotion gives you a spreadsheet-like view of your team and services. This makes it quick and easy to see

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
submotion features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
submotion
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®