2026 Best Software Awards are here!See the list

Best User and Entity Behavior Analytics (UEBA) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes
Show More
Show Less

Featured User and Entity Behavior Analytics (UEBA) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
60 Listings in User and Entity Behavior Analytics (UEBA) Available
(54)4.8 out of 5
Optimized for quick response
8th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Analytics
    1
    Detailed Analysis
    1
    Detailed Explanation
    1
    Ease of Management
    1
    Ease of Use
    1
    Cons
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Ease of Use
    Average: 8.8
    9.1
    Continuous Analysis
    Average: 8.9
    9.4
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    15,901 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,224 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Analytics
1
Detailed Analysis
1
Detailed Explanation
1
Ease of Management
1
Ease of Use
1
Cons
Poor Customer Support
1
Adlumin features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.3
Ease of Use
Average: 8.8
9.1
Continuous Analysis
Average: 8.9
9.4
Anomaly Detection
Average: 8.9
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
15,901 Twitter followers
LinkedIn® Page
www.linkedin.com
2,224 employees on LinkedIn®
Ownership
NYSE: NABL
(40)4.2 out of 5
Optimized for quick response
11th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insi

    Users
    No information available
    Industries
    • Computer Software
    • Higher Education
    Market Segment
    • 43% Enterprise
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Incydr Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Features
    1
    Monitoring
    1
    Cons
    Difficult Setup
    2
    Setup Difficulties
    2
    Complex Configuration
    1
    Expensive
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Incydr features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.1
    9.1
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mimecast
    Company Website
    Year Founded
    2003
    HQ Location
    London
    Twitter
    @Mimecast
    18,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,467 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop insi

Users
No information available
Industries
  • Computer Software
  • Higher Education
Market Segment
  • 43% Enterprise
  • 38% Small-Business
Incydr Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Features
1
Monitoring
1
Cons
Difficult Setup
2
Setup Difficulties
2
Complex Configuration
1
Expensive
1
Pricing Issues
1
Incydr features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.1
9.1
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Mimecast
Company Website
Year Founded
2003
HQ Location
London
Twitter
@Mimecast
18,069 Twitter followers
LinkedIn® Page
www.linkedin.com
2,467 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    guardsix is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). guardsix command center, a

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Log Management
    5
    Customer Support
    4
    Easy Integrations
    4
    Efficiency
    4
    Cons
    Poor Interface Design
    3
    UX Improvement
    3
    Complexity
    2
    Confusing Interface
    2
    Information Deficiency
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    7.9
    Continuous Analysis
    Average: 8.9
    8.1
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    LinkedIn® Page
    www.linkedin.com
    261 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

guardsix is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). guardsix command center, a

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 31% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Log Management
5
Customer Support
4
Easy Integrations
4
Efficiency
4
Cons
Poor Interface Design
3
UX Improvement
3
Complexity
2
Confusing Interface
2
Information Deficiency
2
Logpoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
7.9
Continuous Analysis
Average: 8.9
8.1
Anomaly Detection
Average: 8.9
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
LinkedIn® Page
www.linkedin.com
261 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 65% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato User Activity Monitoring (UAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Activity Monitoring
    3
    Customer Support
    3
    Easy Setup
    3
    Implementation Ease
    3
    Cons
    Limited Features
    2
    Limited Functionality
    2
    Not User-Friendly
    2
    Poor Interface Design
    2
    Software Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    7.7
    Continuous Analysis
    Average: 8.9
    7.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 65% Mid-Market
  • 30% Small-Business
Veriato User Activity Monitoring (UAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Activity Monitoring
3
Customer Support
3
Easy Setup
3
Implementation Ease
3
Cons
Limited Features
2
Limited Functionality
2
Not User-Friendly
2
Poor Interface Design
2
Software Issues
2
Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
7.7
Continuous Analysis
Average: 8.9
7.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,312 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.1
    8.8
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DNIF
    Year Founded
    2002
    HQ Location
    Mountain View, California
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.1
8.8
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
DNIF
Year Founded
2002
HQ Location
Mountain View, California
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca - control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Inste

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Real-time Monitoring
    4
    Setup Ease
    4
    Deployment Ease
    3
    Cons
    Limited Features
    2
    Alert Management
    1
    Compatibility Issues
    1
    Expensive
    1
    Inefficient Alerting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.6
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    9.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    24 Crescent Street Suite 403 Waltham, MA 02453, USA
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca - control privileged access and detect identity threats in one place. Syteca is a PAM platform built from the ground up with identity threat detection and response (ITDR) capabilities. Inste

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 39% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Real-time Monitoring
4
Setup Ease
4
Deployment Ease
3
Cons
Limited Features
2
Alert Management
1
Compatibility Issues
1
Expensive
1
Inefficient Alerting
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.6
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
9.7
Anomaly Detection
Average: 8.9
Seller Details
Company Website
Year Founded
2013
HQ Location
24 Crescent Street Suite 403 Waltham, MA 02453, USA
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Kansas City, Missouri
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

Users
No information available
Industries
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.4
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2012
HQ Location
Kansas City, Missouri
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet's User and Entity Behavior Analytics (UEBA solutions, including FortiInsight and FortiSIEM, leverage advanced machine learning algorithms to monitor and analyze the behavior of users and enti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    7.5
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,547 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,801 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet's User and Entity Behavior Analytics (UEBA solutions, including FortiInsight and FortiSIEM, leverage advanced machine learning algorithms to monitor and analyze the behavior of users and enti

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Small-Business
Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
7.5
Anomaly Detection
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,547 Twitter followers
LinkedIn® Page
www.linkedin.com
15,801 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Saas Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.6
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 35% Small-Business
Prisma Saas Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.6
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,238 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.1
    8.5
    Ease of Use
    Average: 8.8
    9.3
    Continuous Analysis
    Average: 8.9
    9.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,514 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,386 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.1
8.5
Ease of Use
Average: 8.8
9.3
Continuous Analysis
Average: 8.9
9.7
Anomaly Detection
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,514 Twitter followers
LinkedIn® Page
www.linkedin.com
95,386 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Fraud Protection features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.4
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    9,382 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    490 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Group-IB Fraud Protection features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.4
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Group-IB
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
9,382 Twitter followers
LinkedIn® Page
www.linkedin.com
490 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oort Identity Security Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oort
    Year Founded
    2019
    HQ Location
    Boston, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Oort Identity Security Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.1
9.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Oort
Year Founded
2019
HQ Location
Boston, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.1
    6.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    758 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Netwrix Threat Manager features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.1
6.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,914 Twitter followers
LinkedIn® Page
www.linkedin.com
758 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Hawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Security
    1
    Detailed Analysis
    1
    Ease of Use
    1
    Insights
    1
    Monitoring
    1
    Cons
    Network Issues
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Hawk features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    9.0
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,436 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,512 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cyber Hawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Security
1
Detailed Analysis
1
Ease of Use
1
Insights
1
Monitoring
1
Cons
Network Issues
1
Slow Loading
1
Slow Performance
1
Cyber Hawk features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
9.0
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,436 Twitter followers
LinkedIn® Page
www.linkedin.com
5,512 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,946 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,369 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,946 Twitter followers
LinkedIn® Page
www.linkedin.com
1,369 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854