This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
It’s less about managing “big data” and more about giving security teams their time back, while still making sure nothing nasty is hiding in the shadows. Review collected by and hosted on G2.com.
Because it relies heavily on behavioral baselines, you may experience a tuning period in which the system generates some noise before it fully learns your environment. Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.





