Introducing G2.ai, the future of software buying.Try now
RaimaDB
Sponsored
RaimaDB
Visit Website
Product Avatar Image
8i

By 8i

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at 8i, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with 8i?

RaimaDB
Sponsored
RaimaDB
Visit Website
It's been two months since this profile received a new review
Leave a Review

8i Reviews & Product Details

Product Avatar Image

Have you used 8i before?

Answer a few questions to help the 8i community

8i Reviews (3)

Reviews

8i Reviews (3)

4.5
3 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Divyansh T.
DT
Senior Business Analyst
Enterprise (> 1000 emp.)
"A real-time, deceptive defence mechanism guarding the digital world"
What do you like best about 8i?

The best I like is the high security measures including deception technology. In today's unsecure digital world it plays a very crucial role in defending against the advanced attacks, more often in real-time. The security mechanism of 8i has a highly sensitive threat alert which warns of potential threats in advance. Review collected by and hosted on G2.com.

What do you dislike about 8i?

The downsides of 8i is that it lacks in providing full and quick customer support. Due to the technical complexities involved the issues couldn't be resolved easily and the overall process delays. It should be technically equipped and advanced to give consistent and regular support to the users. The issue redressal process should be easy and fast for the users to register. The response time of the support team is a little longer. Also, it can guide the users and can have workshops or sessions to get customer feedback. Review collected by and hosted on G2.com.

Chahat V.
CV
Consultant
Enterprise (> 1000 emp.)
"Amazing experience in securely publishing, storing, sharing, and streaming holograms to smartphones"
What do you like best about 8i?

Nicely captures holograms including cameras, computers, and recording software. Review collected by and hosted on G2.com.

What do you dislike about 8i?

Difficult to understand at first. Need someone to understand it. Review collected by and hosted on G2.com.

Abhishek B.
AB
Analytics Advisory
Small-Business (50 or fewer emp.)
"8i Video"
What do you like best about 8i?

8i gives us the platform to to see the content by capturing and transforming real humans hologram for the metaverse Review collected by and hosted on G2.com.

What do you dislike about 8i?

Compatibility issue with devices of 8i is difficult in terms of technology Review collected by and hosted on G2.com.

There are not enough reviews of 8i for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(246)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
2
SentinelOne Singularity Endpoint Logo
SentinelOne Singularity Endpoint
4.7
(193)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
3
Labyrinth Cyber Deception Platform Logo
Labyrinth Cyber Deception Platform
4.9
(16)
Labyrinth creates the illusion of a real infrastructure vulnerability for an attacker. The solution is based on Points, a smart host simulation. Each part of the simulation environment reproduces the services and content of an actual network segment. The system consists of four components that interact with each other. The main components of the Platform are: Admin VM is the main component. All collected information is sent to it for analysis. The console notifies the security team and sends the necessary data to third-party systems. Worker a host/virtual machine for deploying a set of Labyrinth network decoys (Points) on it. It can work in several VLANs simultaneously. Several Worker hosts can be connected to the same management console simultaneously. Points are intelligent hosts that mimic software services, content, routers, devices, etc. Points detect all malicious activities within the corporate network, providing complete coverage of all possible attack vectors. Seeder agents deployed on servers and workstations imitate the most attractive file artifacts for an attacker. By creating various decoy files, the agent directs attackers to network decoys (Points) through their contents. The Platform automatically deploys points (decoys) in the IT/OT network based on information about services and devices in the network environment. In addition, decoys can be deployed manually, providing users with a powerful tool to develop their unique deception platform based on their specific needs and best practices. The Labyrinth provokes an attacker to act and detects suspicious activity. As the attacker passes through the fake target infrastructure, the Platform captures all the details of the enemy. The security team receives information about the sources of threats, the tools used, the vulnerabilities exploited, and the attacker's behavior. At the same time, the entire real infrastructure continues to operate without any negative impact.
4
Tracebit Logo
Tracebit
4.9
(12)
Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.
5
Morphisec Logo
Morphisec
4.6
(12)
Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.
6
LMNTRIX Logo
LMNTRIX
4.9
(10)
LMNTRIX provides a fully managed 24x7x365 Managed Detection & Response platform. The LMNTRIX multi-vector fully managed platform includes advanced network and endpoint threat detection, deceptions everywhere, analytics, full fidelity forensics, automated threat hunting on both the network and endpoints, and real-time threat intelligence technology, combined with deep/dark web monitoring which scales for small, medium, enterprise, cloud or SCADA/Industrial environments. We Prevent, Detect, Investigate, Validate, Contain and Remediate security incidents. The LMNTRIX platform/service includes full incident validation and remote incident response activities without the need for an incident-response-specific retainer; such activities may include malware analysis, identifying IOCs, automated and human-powered threat hunting, granular threat containment at endpoint level and specific guidance on remediation. The outcomes we deliver clients are fully validated incidents aligned to the kill chain and Mitre ATT&CK framework. No dumb alerts. These outcomes contain detailed investigative actions and recommendations that your organization follows to protect against the unknown, insider threat and malicious attacker.
7
Kilpi Honeypot Logo
Kilpi Honeypot
4.9
(5)
Kilpi Honeypot is a fire alarm for your network that instantly alerts you in case of a breach. Honeypots are a common deception tool among cybersecurity experts, but often hard to deploy and maintain. Kilpi Honeypot is designed for IT professionals who handle cybersecurity as a side job allowing anyone to take advantage of this technology. No expertise required – deploy in minutes and protect your business.
8
SentinelOne Singularity Hologram Logo
SentinelOne Singularity Hologram
4.2
(3)
Singularity Hologram™ is a network-based identity threat deception solution that lures both external and insider threat actors into revealing themselves. Hologram detects, misdirects, and isolates attackers that have established footholds in-network using decoys of production OSes, applications, and more. By engaging adversaries, you can block attacks, gain attacker intelligence, and build defenses.
9
Minerva Anti-Evasion Platform Logo
Minerva Anti-Evasion Platform
3.8
(2)
A comprehensive endpoint solution that prevents attacks through trickery and deception.
10
BOTsink Logo
BOTsink
4.0
(2)
The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.