Best User and Entity Behavior Analytics (UEBA) Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes
Show More
Show Less

Featured User and Entity Behavior Analytics (UEBA) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
61 Listings in User and Entity Behavior Analytics (UEBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
    7.2
    Has the product been a good partner in doing business?
    Average: 9.1
    7.7
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    9.2
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Westport, US
    Twitter
    @InterGuard
    539 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2002, InterGuard develops award winning employee monitoring software lets you track employee activity on their computers, phones and tablets- even when they work from home. Track attendance

Users
No information available
Industries
No information available
Market Segment
  • 83% Small-Business
  • 50% Mid-Market
InterGuard Employee Monitoring Software features and usability ratings that predict user satisfaction
7.2
Has the product been a good partner in doing business?
Average: 9.1
7.7
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
9.2
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2002
HQ Location
Westport, US
Twitter
@InterGuard
539 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RevealSecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Implementation
    1
    Easy Installation
    1
    Threat Detection
    1
    User Behavior Analytics
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RevealSecurity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.3
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 43% Mid-Market
RevealSecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Implementation
1
Easy Installation
1
Threat Detection
1
User Behavior Analytics
1
Cons
Expensive
1
RevealSecurity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.3
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2021
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ustvnow features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    USTVnow
    Year Founded
    2010
    HQ Location
    New York, US
    Twitter
    @ustvnow
    2,928 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ustvnow features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
USTVnow
Year Founded
2010
HQ Location
New York, US
Twitter
@ustvnow
2,928 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protecting Patient Privacy in Electronic Health Records

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FairWarning features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Pasadena, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protecting Patient Privacy in Electronic Health Records

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FairWarning features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Pasadena, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.2
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,322 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iManage Threat Manager helps organizations protect sensitive information from internal and external threat vectors using innovative technology including adaptive behavior modeling and machine learning

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iManage Threat Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iManage
    Year Founded
    2015
    HQ Location
    Chicago, Illinois
    Twitter
    @imanageinc
    2,753 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,256 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iManage Threat Manager helps organizations protect sensitive information from internal and external threat vectors using innovative technology including adaptive behavior modeling and machine learning

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
iManage Threat Manager features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
iManage
Year Founded
2015
HQ Location
Chicago, Illinois
Twitter
@imanageinc
2,753 Twitter followers
LinkedIn® Page
www.linkedin.com
1,256 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • inDefend features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    5.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Noida, IN
    Twitter
    @dataresolve
    270 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
inDefend features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
5.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Noida, IN
Twitter
@dataresolve
270 Twitter followers
LinkedIn® Page
in.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lepide delivers the industry's most effective and affordable data security and governance solution - simple to implement, but powerful in protection. Unlike other vendors, our AI-driven audit reports,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lepide Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Customer Support
    1
    Ease of Implementation
    1
    Ease of Use
    1
    Features
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
    Difficult Setup
    1
    Learning Curve
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lepide Data Security Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lepide
    Year Founded
    2005
    HQ Location
    Flimwell, GB
    LinkedIn® Page
    www.linkedin.com
    193 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lepide delivers the industry's most effective and affordable data security and governance solution - simple to implement, but powerful in protection. Unlike other vendors, our AI-driven audit reports,

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Lepide Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Customer Support
1
Ease of Implementation
1
Ease of Use
1
Features
1
Cons
Complexity
1
Difficult Learning
1
Difficult Setup
1
Learning Curve
1
Poor Interface Design
1
Lepide Data Security Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Lepide
Year Founded
2005
HQ Location
Flimwell, GB
LinkedIn® Page
www.linkedin.com
193 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SearchInform ProfileCenter features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Dubai, AE
    Twitter
    @SearchinformI
    106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    126 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SearchInform ProfileCenter features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.1
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Dubai, AE
Twitter
@SearchinformI
106 Twitter followers
LinkedIn® Page
www.linkedin.com
126 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,474 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,444 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,474 Twitter followers
LinkedIn® Page
www.linkedin.com
10,444 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Mersin, TR
    Twitter
    @cprottr
    200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Mersin, TR
Twitter
@cprottr
200 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cylerian is the Intelligence Engineering Platform for the modern SOC, designed to bridge the gap between Security, Observability, and Operations. Traditional security operations are bogged down by

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cylerian Unified Cybersecurity Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integrations
    1
    Remediation Automation
    1
    Risk Management
    1
    Vulnerability Detection
    1
    Cons
    Learning Curve
    1
    Training Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cylerian Unified Cybersecurity Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    6.7
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cylerian
    Year Founded
    2018
    HQ Location
    Jersey City, US
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cylerian is the Intelligence Engineering Platform for the modern SOC, designed to bridge the gap between Security, Observability, and Operations. Traditional security operations are bogged down by

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Cylerian Unified Cybersecurity Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integrations
1
Remediation Automation
1
Risk Management
1
Vulnerability Detection
1
Cons
Learning Curve
1
Training Issues
1
Cylerian Unified Cybersecurity Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.1
6.7
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Cylerian
Year Founded
2018
HQ Location
Jersey City, US
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DTEX inTERCEPT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Saratoga, California, United States
    LinkedIn® Page
    www.linkedin.com
    183 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DTEX inTERCEPT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Saratoga, California, United States
LinkedIn® Page
www.linkedin.com
183 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • e-Safe Compliance features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Baslow, GB
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
e-Safe Compliance features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Baslow, GB
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New-Scale Analytics uses machine learning to analyze behavior and find credential-based attacks that other tools miss. It automates threat detection for users and devices, monitors AI agent activity,

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exabeam New-Scale Analytics features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exabeam
    Year Founded
    2013
    HQ Location
    Foster City, US
    Twitter
    @exabeam
    5,375 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    819 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New-Scale Analytics uses machine learning to analyze behavior and find credential-based attacks that other tools miss. It automates threat detection for users and devices, monitors AI agent activity,

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Exabeam New-Scale Analytics features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Exabeam
Year Founded
2013
HQ Location
Foster City, US
Twitter
@exabeam
5,375 Twitter followers
LinkedIn® Page
www.linkedin.com
819 employees on LinkedIn®