Introducing G2.ai, the future of software buying.Try now

Best User and Entity Behavior Analytics (UEBA) Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes
Show More
Show Less

Featured User and Entity Behavior Analytics (UEBA) Software At A Glance

Free Plan Available:
ManageEngine ADAudit Plus
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending User and Entity Behavior Analytics (UEBA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
56 Listings in User and Entity Behavior Analytics (UEBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    82,235 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,388 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Imperva Data Risk Analytics uses machine learning and analytics to identify suspicious data access and prioritize threats.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Imperva Data User Behavior Analytics features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
82,235 Twitter followers
LinkedIn® Page
www.linkedin.com
1,388 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RevealSecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Implementation
    1
    Easy Installation
    1
    Threat Detection
    1
    User Behavior Analytics
    1
    Cons
    Expensive
    1
    Insufficient Detail
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RevealSecurity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.3
    Ease of Use
    Average: 8.8
    9.2
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    41 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continu

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 43% Mid-Market
RevealSecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Implementation
1
Easy Installation
1
Threat Detection
1
User Behavior Analytics
1
Cons
Expensive
1
Insufficient Detail
1
RevealSecurity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.3
Ease of Use
Average: 8.8
9.2
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2021
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
41 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Entry Level Price:$3.99
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ustvnow features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    USTVnow
    Year Founded
    2010
    HQ Location
    New York, US
    Twitter
    @ustvnow
    2,949 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

USTVnow site turns a computer, smartphones, tablets, Smart TVs devices into an interactive TV screen, allowing people not only to watch TV in different parts of the house but also empowering travelers

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
ustvnow features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
USTVnow
Year Founded
2010
HQ Location
New York, US
Twitter
@ustvnow
2,949 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protecting Patient Privacy in Electronic Health Records

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FairWarning features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Pasadena, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protecting Patient Privacy in Electronic Health Records

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FairWarning features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2009
HQ Location
Pasadena, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    9.2
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    8.3
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    Year Founded
    2010
    HQ Location
    El Segundo, US
    Twitter
    @Gurucul
    1,323 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
9.2
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
8.3
Anomaly Detection
Average: 8.9
Seller Details
Seller
Gurucul
Year Founded
2010
HQ Location
El Segundo, US
Twitter
@Gurucul
1,323 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iManage Threat Manager helps organizations protect sensitive information from internal and external threat vectors using innovative technology including adaptive behavior modeling and machine learning

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iManage Threat Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    iManage
    Year Founded
    2015
    HQ Location
    Chicago, Illinois
    Twitter
    @imanageinc
    2,747 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iManage Threat Manager helps organizations protect sensitive information from internal and external threat vectors using innovative technology including adaptive behavior modeling and machine learning

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
iManage Threat Manager features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
iManage
Year Founded
2015
HQ Location
Chicago, Illinois
Twitter
@imanageinc
2,747 Twitter followers
LinkedIn® Page
www.linkedin.com
1,224 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • inDefend features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    5.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Noida, IN
    Twitter
    @dataresolve
    275 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

inDefend is a comprehensive solution that helps to detect various types of insider threats and also prevent the leakage of sensitive data through various communication channels on endpoints. This so

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
inDefend features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
5.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Noida, IN
Twitter
@dataresolve
275 Twitter followers
LinkedIn® Page
in.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SearchInform ProfileCenter features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.0
    8.3
    Ease of Use
    Average: 8.8
    8.3
    Continuous Analysis
    Average: 8.9
    10.0
    Anomaly Detection
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Dubai, AE
    Twitter
    @SearchinformI
    106 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    126 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SearchInform ProfileCenter is an automated solution applied in business to disclose fraudulent activity, enhance personnel management techniques, increase sales and assess risks caused by personality

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SearchInform ProfileCenter features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.0
8.3
Ease of Use
Average: 8.8
8.3
Continuous Analysis
Average: 8.9
10.0
Anomaly Detection
Average: 8.9
Seller Details
Year Founded
2005
HQ Location
Dubai, AE
Twitter
@SearchinformI
106 Twitter followers
LinkedIn® Page
www.linkedin.com
126 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1998
    HQ Location
    Cambridge, MA
    Twitter
    @Akamai
    115,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,286 employees on LinkedIn®
    Ownership
    NASDAQ:AKAM
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Threat Protector (ETP) enables security teams to proactively identify, block, and mitigate targeted threats such as malware, ransomware, phishing, and data exfiltration that exploit the Dom

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Akamai Enterprise Threat Protector features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1998
HQ Location
Cambridge, MA
Twitter
@Akamai
115,698 Twitter followers
LinkedIn® Page
www.linkedin.com
10,286 employees on LinkedIn®
Ownership
NASDAQ:AKAM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Application AuditTM enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Compuware Application Audit features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    48,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,064 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

Application AuditTM enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
BMC Compuware Application Audit features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
48,231 Twitter followers
LinkedIn® Page
www.linkedin.com
9,064 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Mersin, TR
    Twitter
    @cprottr
    199 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and money laundering through mobile and web chan

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
C-Prot Fraud Prevention features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Mersin, TR
Twitter
@cprottr
199 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DTEX inTERCEPT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Saratoga, California, United States
    Twitter
    @DtexSystems
    1,543 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    183 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DTEX inTERCEPT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
HQ Location
Saratoga, California, United States
Twitter
@DtexSystems
1,543 Twitter followers
LinkedIn® Page
www.linkedin.com
183 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • e-Safe Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    1
    Compliance Management
    1
    Configuration
    1
    Configuration Ease
    1
    Data Protection
    1
    Cons
    Complexity
    1
    Dashboard Issues
    1
    Learning Curve
    1
    Poor Interface Design
    1
    Software Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • e-Safe Compliance features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    Baslow, GB
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
e-Safe Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
1
Compliance Management
1
Configuration
1
Configuration Ease
1
Data Protection
1
Cons
Complexity
1
Dashboard Issues
1
Learning Curve
1
Poor Interface Design
1
Software Complexity
1
e-Safe Compliance features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
Baslow, GB
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fasoo RiskView (FRV) is a user and entity behavior analytics (UEBA) solution that helps organizations identify, assess, and prioritize security risks related to unstructured data usage. It is designed

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fasoo RiskView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fasoo
    Year Founded
    2000
    HQ Location
    Bethesda, US
    Twitter
    @Fasoocom
    233 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
    Ownership
    150900 (KOSDAQ)
Product Description
How are these determined?Information
This description is provided by the seller.

Fasoo RiskView (FRV) is a user and entity behavior analytics (UEBA) solution that helps organizations identify, assess, and prioritize security risks related to unstructured data usage. It is designed

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fasoo RiskView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fasoo
Year Founded
2000
HQ Location
Bethesda, US
Twitter
@Fasoocom
233 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
Ownership
150900 (KOSDAQ)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detect and Eliminate Threats with User Behavior Analytics

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortscale features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortscale
    Year Founded
    2013
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detect and Eliminate Threats with User Behavior Analytics

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Fortscale features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortscale
Year Founded
2013
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®