Compare Cyberhaven and Cyrisma

At a Glance
Cyberhaven
Cyberhaven
Star Rating
(18)4.5 out of 5
Market Segments
Enterprise (61.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Cyberhaven
Cyrisma
Cyrisma
Star Rating
(59)4.6 out of 5
Market Segments
Small-Business (76.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us 0 Endpoint (Endpoint = Desktop, Laptop or Server. All other IP-connected devices are included at no additional charge)
Free Trial is available
Learn more about Cyrisma

Cyberhaven vs Cyrisma

When assessing the two solutions, reviewers found Cyberhaven easier to use and do business with overall. However, reviewers preferred the ease of set up with Cyrisma, along with administration.

  • Reviewers felt that Cyberhaven meets the needs of their business better than Cyrisma.
  • When comparing quality of ongoing product support, reviewers felt that Cyrisma is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Cyrisma over Cyberhaven.
Pricing
Entry-Level Pricing
Cyberhaven
No pricing available
Cyrisma
Standard
Contact Us
0 Endpoint (Endpoint = Desktop, Laptop or Server. All other IP-connected devices are included at no additional charge)
Learn more about Cyrisma
Free Trial
Cyberhaven
No trial information available
Cyrisma
Free Trial is available
Ratings
Meets Requirements
8.9
17
8.8
53
Ease of Use
8.6
18
8.5
53
Ease of Setup
8.7
18
8.9
51
Ease of Admin
9.0
16
8.8
51
Quality of Support
8.8
17
9.2
50
Has the product been a good partner in doing business?
9.5
16
9.3
50
Product Direction (% positive)
9.3
16
9.6
52
Features by Category
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
9.2
16
Not enough data
Administration
9.3
12
Not enough data
9.8
11
Not enough data
8.8
13
Not enough data
Governance
8.5
13
Not enough data
9.2
14
Not enough data
9.8
14
Not enough data
Security
9.1
11
Not enough data
8.6
12
Not enough data
9.6
15
Not enough data
9.0
14
Not enough data
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Data Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Usability
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.2
44
Performance
Not enough data
8.4
40
Not enough data
8.7
43
Not enough data
7.6
41
Not enough data
8.7
41
Network
Not enough data
8.4
39
Not enough data
8.4
42
Not enough data
7.9
37
|
Verified
Application
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.4
31
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
Not enough data
8.3
40
Risk Analysis
Not enough data
8.8
36
Not enough data
8.2
38
Not enough data
8.6
37
Vulnerability Assesment
Not enough data
9.1
39
Not enough data
8.8
39
Not enough data
8.0
37
Not enough data
8.3
39
Automation
Not enough data
Feature Not Available
Not enough data
7.4
34
Not enough data
Feature Not Available
Not enough data
7.7
33
Sensitive Data DiscoveryHide 14 FeaturesShow 14 Features
9.0
6
8.0
28
Functionality
Not enough data
7.9
21
9.7
5
7.8
22
Not enough data
7.9
20
Not enough data
7.0
19
8.3
5
7.6
24
8.9
6
8.6
25
9.7
6
Feature Not Available
8.6
6
8.5
26
9.3
5
8.4
24
8.7
5
8.3
26
Agentic AI - Sensitive Data Discovery
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.2
19
Functionality
Not enough data
7.7
18
Not enough data
8.1
18
Not enough data
7.2
18
Not enough data
6.3
17
Not enough data
6.9
17
Not enough data
6.4
17
Not enough data
8.4
17
Not enough data
6.9
17
Insider Threat Management (ITM)Hide 9 FeaturesShow 9 Features
8.2
11
Not enough data
Functionality
9.3
10
Not enough data
9.6
9
Not enough data
9.2
11
Not enough data
9.0
10
Not enough data
9.8
10
Not enough data
9.2
10
Not enough data
Monitoring
7.0
9
Not enough data
5.0
9
Not enough data
5.6
9
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
5.9
10
Generative AI - Security Compliance
Not enough data
5.8
10
Not enough data
6.0
10
Categories
Categories
Shared Categories
Cyberhaven
Cyberhaven
Cyrisma
Cyrisma
Cyberhaven and Cyrisma are categorized as Sensitive Data Discovery
Reviews
Reviewers' Company Size
Cyberhaven
Cyberhaven
Small-Business(50 or fewer emp.)
11.1%
Mid-Market(51-1000 emp.)
27.8%
Enterprise(> 1000 emp.)
61.1%
Cyrisma
Cyrisma
Small-Business(50 or fewer emp.)
76.3%
Mid-Market(51-1000 emp.)
22.0%
Enterprise(> 1000 emp.)
1.7%
Reviewers' Industry
Cyberhaven
Cyberhaven
Financial Services
33.3%
Manufacturing
22.2%
Law Practice
11.1%
Venture Capital & Private Equity
5.6%
Marketing and Advertising
5.6%
Other
22.2%
Cyrisma
Cyrisma
Information Technology and Services
40.7%
Computer & Network Security
33.9%
Consulting
3.4%
Financial Services
3.4%
Wholesale
1.7%
Other
16.9%
Alternatives
Cyberhaven
Cyberhaven Alternatives
BetterCloud
BetterCloud
Add BetterCloud
Egnyte
Egnyte
Add Egnyte
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Add Acronis Cyber Protect Cloud
Druva Data Security Cloud
Druva Data Security Cloud
Add Druva Data Security Cloud
Cyrisma
Cyrisma Alternatives
Egnyte
Egnyte
Add Egnyte
LastPass
LastPass
Add LastPass
JumpCloud
JumpCloud
Add JumpCloud
Vanta
Vanta
Add Vanta
Discussions
Cyberhaven
Cyberhaven Discussions
Monty the Mongoose crying
Cyberhaven has no discussions with answers
Cyrisma
Cyrisma Discussions
Monty the Mongoose crying
Cyrisma has no discussions with answers