Introducing G2.ai, the future of software buying.Try now

Best User and Entity Behavior Analytics (UEBA) Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes
Show More
Show Less

Featured User and Entity Behavior Analytics (UEBA) Software At A Glance

Free Plan Available:
ManageEngine ADAudit Plus
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending User and Entity Behavior Analytics (UEBA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
56 Listings in User and Entity Behavior Analytics (UEBA) Available
(38)4.2 out of 5
Optimized for quick response
9th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop inside

    Users
    No information available
    Industries
    • Computer Software
    • Higher Education
    Market Segment
    • 45% Enterprise
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Incydr features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Code42
    Company Website
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @code42
    5,623 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    111 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Code42 insider risk detection and response for the collaborative and remote enterprise. Code42 speeds the time it takes to detect and respond to data risk from insider threats. We help to stop inside

Users
No information available
Industries
  • Computer Software
  • Higher Education
Market Segment
  • 45% Enterprise
  • 39% Small-Business
Incydr features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.0
9.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Code42
Company Website
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@code42
5,623 Twitter followers
LinkedIn® Page
www.linkedin.com
111 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Logpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Log Management
    4
    Pricing
    4
    Affordable
    3
    Customer Support
    3
    Cons
    Poor Interface Design
    3
    UX Improvement
    3
    Complexity
    2
    Confusing Interface
    2
    Information Deficiency
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Logpoint features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Ease of Use
    Average: 8.8
    7.9
    Continuous Analysis
    Average: 8.9
    8.1
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Logpoint
    Company Website
    Year Founded
    2001
    HQ Location
    Copenhagen, Capital Region
    Twitter
    @LogPointSIEM
    994 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    247 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Logpoint is a comprehensive cybersecurity solution designed specifically for Managed Security Service Providers (MSSPs) and Critical National Infrastructure Providers (CNI). This platform enables orga

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 31% Small-Business
Logpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Log Management
4
Pricing
4
Affordable
3
Customer Support
3
Cons
Poor Interface Design
3
UX Improvement
3
Complexity
2
Confusing Interface
2
Information Deficiency
2
Logpoint features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.0
8.3
Ease of Use
Average: 8.8
7.9
Continuous Analysis
Average: 8.9
8.1
Anomaly Detection
Average: 8.9
Seller Details
Seller
Logpoint
Company Website
Year Founded
2001
HQ Location
Copenhagen, Capital Region
Twitter
@LogPointSIEM
994 Twitter followers
LinkedIn® Page
www.linkedin.com
247 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(54)4.7 out of 5
Optimized for quick response
14th Easiest To Use in User and Entity Behavior Analytics (UEBA) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Customer Support
    6
    Integrations
    5
    Visibility
    5
    Detection
    4
    Cons
    Missing Features
    3
    Lack of Features
    2
    Poor Customer Support
    2
    Slow Performance
    2
    Billing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Ease of Use
    Average: 8.8
    8.7
    Continuous Analysis
    Average: 8.9
    8.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    15,943 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,149 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Customer Support
6
Integrations
5
Visibility
5
Detection
4
Cons
Missing Features
3
Lack of Features
2
Poor Customer Support
2
Slow Performance
2
Billing Issues
1
Adlumin features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
9.2
Ease of Use
Average: 8.8
8.7
Continuous Analysis
Average: 8.9
8.7
Anomaly Detection
Average: 8.9
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
15,943 Twitter followers
LinkedIn® Page
www.linkedin.com
2,149 employees on LinkedIn®
Ownership
NYSE: NABL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 63% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato User Activity Monitoring (UAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Employee Monitoring
    6
    Monitoring
    6
    Activity Monitoring
    5
    Productivity
    5
    Cons
    Poor Interface Design
    4
    Limited Features
    3
    Not User-Friendly
    3
    Setup Difficulties
    3
    Software Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Ease of Use
    Average: 8.8
    8.1
    Continuous Analysis
    Average: 8.9
    7.8
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,324 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 63% Mid-Market
  • 29% Small-Business
Veriato User Activity Monitoring (UAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Employee Monitoring
6
Monitoring
6
Activity Monitoring
5
Productivity
5
Cons
Poor Interface Design
4
Limited Features
3
Not User-Friendly
3
Setup Difficulties
3
Software Issues
3
Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.0
8.3
Ease of Use
Average: 8.8
8.1
Continuous Analysis
Average: 8.9
7.8
Anomaly Detection
Average: 8.9
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,324 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.0
    8.8
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DNIF
    Year Founded
    2002
    HQ Location
    Mountain View, California
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DNIF HYPERCLOUD is a cloud native platform that brings the functionality of SIEM, UEBA and SOAR into a single continuous workflow to solve cybersecurity challenges at scale. DNIF HYPERCLOUD is the fla

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
DNIF HYPERCLOUD features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.0
8.8
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
DNIF
Year Founded
2002
HQ Location
Mountain View, California
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    5
    Ease of Use
    5
    Features
    5
    Real-time Monitoring
    5
    Implementation Ease
    4
    Cons
    Limited Features
    3
    Insufficient Detail
    2
    Limited Customization
    2
    Slow Performance
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.6
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    9.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    24 Crescent Street Suite 403 Waltham, MA 02453, USA
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Mid-Market
  • 39% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
5
Ease of Use
5
Features
5
Real-time Monitoring
5
Implementation Ease
4
Cons
Limited Features
3
Insufficient Detail
2
Limited Customization
2
Slow Performance
2
Alert Management
1
Syteca features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.6
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
9.7
Anomaly Detection
Average: 8.9
Seller Details
Company Website
Year Founded
2013
HQ Location
24 Crescent Street Suite 403 Waltham, MA 02453, USA
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Kansas City, Missouri
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provi

Users
No information available
Industries
  • Computer Software
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
Haystax Enterprise Security Solution features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.4
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2012
HQ Location
Kansas City, Missouri
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortinet's User and Entity Behavior Analytics (UEBA solutions, including FortiInsight and FortiSIEM, leverage advanced machine learning algorithms to monitor and analyze the behavior of users and enti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    7.5
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,444 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15,738 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

Fortinet's User and Entity Behavior Analytics (UEBA solutions, including FortiInsight and FortiSIEM, leverage advanced machine learning algorithms to monitor and analyze the behavior of users and enti

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 20% Small-Business
Fortinet User and Entity Behavior Analytics (UEBA) features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 9.0
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
7.5
Anomaly Detection
Average: 8.9
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,444 Twitter followers
LinkedIn® Page
www.linkedin.com
15,738 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 35% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prisma Saas Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Threat Detection
    3
    Cybersecurity
    2
    Data Protection
    2
    Insights
    2
    Cons
    Expensive
    2
    Limited Compatibility
    2
    Pricing Issues
    2
    Access Control
    1
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prisma Saas Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.6
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 35% Mid-Market
  • 35% Small-Business
Prisma Saas Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Threat Detection
3
Cybersecurity
2
Data Protection
2
Insights
2
Cons
Expensive
2
Limited Compatibility
2
Pricing Issues
2
Access Control
1
Access Issues
1
Prisma Saas Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.6
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,223 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk User Behavior Analytics Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    User Behavior Analytics
    4
    AI Technology
    3
    Detection Efficiency
    3
    Integrations
    3
    Machine Learning
    3
    Cons
    Complexity
    3
    Setup Difficulties
    3
    Complex Implementation
    2
    Complex Setup
    2
    High Resource Usage
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.0
    8.5
    Ease of Use
    Average: 8.8
    9.3
    Continuous Analysis
    Average: 8.9
    9.7
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk UBA provides advanced and insider threat detection using unsupervised machine learning helping organizations find unknown threats and anomalous user behavior across devices and applications. Sp

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Splunk User Behavior Analytics Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
User Behavior Analytics
4
AI Technology
3
Detection Efficiency
3
Integrations
3
Machine Learning
3
Cons
Complexity
3
Setup Difficulties
3
Complex Implementation
2
Complex Setup
2
High Resource Usage
2
Splunk User Behavior Analytics features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.0
8.5
Ease of Use
Average: 8.8
9.3
Continuous Analysis
Average: 8.9
9.7
Anomaly Detection
Average: 8.9
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,900 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Fraud Protection features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.4
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    9,198 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    423 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Group-IB Fraud Protection is a solution that combines device fingerprinting, fraud intelligence, and behavioral analysis. It already protects more than 500 million users of web and mobile apps for ban

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Group-IB Fraud Protection features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.4
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Group-IB
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
9,198 Twitter followers
LinkedIn® Page
www.linkedin.com
423 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oort Identity Security Platform features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oort
    Year Founded
    2019
    HQ Location
    Boston, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Oort is an identity threat detection and response platform for enterprise security. Oort enables IAM, SOC, and GRC professionals to find users quickly and easily, to conduct deep and thorough identity

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Oort Identity Security Platform features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.0
9.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Oort
Year Founded
2019
HQ Location
Boston, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 9.0
    7.7
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    9.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Westport, US
    Twitter
    @InterGuard
    539 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

Users
No information available
Industries
No information available
Market Segment
  • 71% Small-Business
  • 43% Mid-Market
InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 9.0
7.7
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
9.2
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Westport, US
Twitter
@InterGuard
539 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Netwrix Threat Manager features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.0
    6.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Netwrix
    HQ Location
    Irvine, CA
    Twitter
    @Netwrix
    2,926 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    708 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Netwrix Threat Manager (formerly StealthDEFEND) detects and responds in real-time to advanced cyberattacks, providing an additional layer of security around your identities and data. Leveraging unsupe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Enterprise
Netwrix Threat Manager features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.0
6.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Netwrix
HQ Location
Irvine, CA
Twitter
@Netwrix
2,926 Twitter followers
LinkedIn® Page
www.linkedin.com
708 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyber Hawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Alerts
    1
    Cloud Security
    1
    Customer Support
    1
    Detailed Analysis
    1
    Cons
    Expensive
    1
    Network Issues
    1
    Pricing Issues
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Hawk features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    9.0
    Ease of Use
    Average: 8.8
    10.0
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,498 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,388 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Hawk detects the critical changes inside the networks you manage that create risk. Whether caused by hackers, internal bad actors, or honest mistakes, Cyber Hawk will sound the alarm on hard-to-

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Mid-Market
  • 33% Enterprise
Cyber Hawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Alerts
1
Cloud Security
1
Customer Support
1
Detailed Analysis
1
Cons
Expensive
1
Network Issues
1
Pricing Issues
1
Slow Loading
1
Slow Performance
1
Cyber Hawk features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
9.0
Ease of Use
Average: 8.8
10.0
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Kaseya
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,498 Twitter followers
LinkedIn® Page
www.linkedin.com
5,388 employees on LinkedIn®