Introducing G2.ai, the future of software buying.Try now

Best User and Entity Behavior Analytics (UEBA) Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

User and entity behavior analytics (UEBA) software is a family of tools used to develop and model baseline behaviors for people and hardware within a network, with the ultimate goal of identifying abnormalities and alerting security staff. These tools leverage machine learning to identify patterns and monitor user or machine behaviors, notifying stakeholders of abnormal activity, malicious behavior, or performance issues that arise from mistakes or improper operational actions.

Companies use UEBA technology to protect their sensitive information and business critical systems from both external and insider threats. These may be employees or partners that partake in nefarious activities such as stealing data, adjusting privileges, or violating company policies. UEBA solutions can also detect compromised accounts that may have resulted from weak passwords or phishing scams that provide network access to unapproved parties. UEBA can uncover a number of external threat types as well; most notably, brute force attacks and privilege escalation.

UEBA functions on a similar basis as risk-based authentication (RBA) software and zero trust networking software. Both of these tools use machine learning to evaluate risk and identify threat actors, but neither is designed to constantly monitor user behavior within a specific network. RBA takes into account variables such as historic access, location, and IP address to determine risk when authenticating. Zero trust network architectures are designed segment networks and monitor network activity. If threats are detected, a segment of the network or an individual endpoint will be restricted from network access.

To qualify for inclusion in the User and Entity Behavior Analytics (UEBA) category, a product must:

Use machine learning to develop baseline behaviors for individual users and resources within a network
Monitor the users and resources with a network for insider threats and other anomalies
Provide incident details and remediation workflows, or integrate with incident response solutions
Integrate with existing security systems to enforce policies and develop automated incident management processes
Show More
Show Less

Featured User and Entity Behavior Analytics (UEBA) Software At A Glance

Free Plan Available:
ManageEngine ADAudit Plus
Sponsored
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending User and Entity Behavior Analytics (UEBA) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
56 Listings in User and Entity Behavior Analytics (UEBA) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Graboxy offers robust protection against unauthorized access by integrating three different modules: Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Graboxy features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    London, GB
    Twitter
    @cursorinsight
    1,495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Graboxy offers robust protection against unauthorized access by integrating three different modules: Typing and Cursor Movement biometrics: Graboxy monitors how users type and move their cursor in

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Graboxy features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
London, GB
Twitter
@cursorinsight
1,495 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Herd Security is revolutionizing cybersecurity training with our advanced security awareness platform, which equips teams to recognize and respond to sophisticated threats like AI-generated voice and

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Herd Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Herd Security is revolutionizing cybersecurity training with our advanced security awareness platform, which equips teams to recognize and respond to sophisticated threats like AI-generated voice and

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Herd Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2023
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Actuate's AI Intruder Detection software transforms existing security cameras into intelligent monitoring systems, significantly reducing false positives and enhancing operator efficiency. By leveragi

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder Detection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Actuate
    Year Founded
    1993
    HQ Location
    San Mateo, CA
    LinkedIn® Page
    www.linkedin.com
    705 employees on LinkedIn®
    Ownership
    NASDAQ: BIRT
    Phone
    650-645-3000
Product Description
How are these determined?Information
This description is provided by the seller.

Actuate's AI Intruder Detection software transforms existing security cameras into intelligent monitoring systems, significantly reducing false positives and enhancing operator efficiency. By leveragi

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Intruder Detection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Actuate
Year Founded
1993
HQ Location
San Mateo, CA
LinkedIn® Page
www.linkedin.com
705 employees on LinkedIn®
Ownership
NASDAQ: BIRT
Phone
650-645-3000
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kntrol is an endpoint security platform that protects businesses from internal and external threats by monitoring user activity, controlling devices and applications, and providing real-time alerts wi

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kntrol features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kriptone
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kntrol is an endpoint security platform that protects businesses from internal and external threats by monitoring user activity, controlling devices and applications, and providing real-time alerts wi

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Kntrol features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kriptone
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In the world of cyber security, security teams are trending away from using prevention-only approaches, according to a 2018 Gartner report called Market Guide for User and Entity Behavior Analytics. A

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LTS Secure UEBA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2012
    HQ Location
    Pune, IN
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In the world of cyber security, security teams are trending away from using prevention-only approaches, according to a 2018 Gartner report called Market Guide for User and Entity Behavior Analytics. A

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
LTS Secure UEBA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2012
HQ Location
Pune, IN
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mandiant Breach Analytics for Chronicle is a SaaS-based solution that integrates Mandiant's frontline threat intelligence with Google Cloud's Chronicle Security Operations suite. This integration enab

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mandiant Breach Analytics for Chronicle features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,497,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Mandiant Breach Analytics for Chronicle is a SaaS-based solution that integrates Mandiant's frontline threat intelligence with Google Cloud's Chronicle Security Operations suite. This integration enab

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Mandiant Breach Analytics for Chronicle features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,497,617 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maro builds a cognitive security platform that provides a lightweight, fast-to-deploy browser extension, enabling real-time behavioral controls without relying solely on training or detection.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maro
Product Description
How are these determined?Information
This description is provided by the seller.

Maro builds a cognitive security platform that provides a lightweight, fast-to-deploy browser extension, enabling real-time behavioral controls without relying solely on training or detection.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Maro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Maro
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Risk Fabric enables stakeholders across the business to prioritize their remediation activities and direct their limited resources at the risks that matter most.

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Risk Fabric features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    61,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    56,584 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

Risk Fabric enables stakeholders across the business to prioritize their remediation activities and direct their limited resources at the risks that matter most.

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Risk Fabric features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
61,454 Twitter followers
LinkedIn® Page
www.linkedin.com
56,584 employees on LinkedIn®
Ownership
NASDAQ: CA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time deta

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureIdentity IRAD features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2003
    HQ Location
    London, GB
    Twitter
    @securenvoy
    655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
    Phone
    44 (0) 845 2600010
Product Description
How are these determined?Information
This description is provided by the seller.

Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time deta

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SecureIdentity IRAD features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2003
HQ Location
London, GB
Twitter
@securenvoy
655 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
Phone
44 (0) 845 2600010
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    All-in-One Solution for Insider Threat Management and Employee Monitoring. Staffcop is a groundbreaking solution that integrates Insider Threat Management with robust employee monitoring and remote ad

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 133% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Staffcop Enterprise Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    4
    Activity Monitoring
    3
    Employee Monitoring
    3
    Helpful
    2
    Security
    2
    Cons
    Inaccuracy
    2
    Inadequate Monitoring
    2
    Clocking Issues
    1
    Employee Dissatisfaction
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Staffcop Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.9
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Staffcop
    Year Founded
    2012
    HQ Location
    Tashkent, UZ
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

All-in-One Solution for Insider Threat Management and Employee Monitoring. Staffcop is a groundbreaking solution that integrates Insider Threat Management with robust employee monitoring and remote ad

Users
No information available
Industries
No information available
Market Segment
  • 133% Mid-Market
Staffcop Enterprise Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
4
Activity Monitoring
3
Employee Monitoring
3
Helpful
2
Security
2
Cons
Inaccuracy
2
Inadequate Monitoring
2
Clocking Issues
1
Employee Dissatisfaction
1
False Positives
1
Staffcop Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
8.9
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
Staffcop
Year Founded
2012
HQ Location
Tashkent, UZ
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Submotion gives you an easy overview of who has access to which systems. The central view in Submotion gives you a spreadsheet-like view of your team and services. This makes it quick and easy to see

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • submotion features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.0
    10.0
    Ease of Use
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    submotion
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Submotion gives you an easy overview of who has access to which systems. The central view in Submotion gives you a spreadsheet-like view of your team and services. This makes it quick and easy to see

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
submotion features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.0
10.0
Ease of Use
Average: 8.8
0.0
No information available
0.0
No information available
Seller Details
Seller
submotion
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®