Introducing G2.ai, the future of software buying.Try now
Safetica
Sponsored
Safetica
Visit Website
Product Avatar Image
Netwrix Threat Manager

By Netwrix

4.4 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Netwrix Threat Manager?

Safetica
Sponsored
Safetica
Visit Website
It's been two months since this profile received a new review
Leave a Review

Netwrix Threat Manager Reviews & Product Details

Profile Status

This profile is currently managed by Netwrix Threat Manager but has limited features.

Are you part of the Netwrix Threat Manager team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Netwrix Threat Manager Media

Netwrix Threat Manager Demo - StealthDEFEND Dashboard Reporting
StealthDEFEND’s interactive visualizations, incident detection response workflow, real-time alerting, and seamless sensitive data integration make it a powerful and highly effective component of your data security strategy.
Netwrix Threat Manager Demo - StealthDEFEND Overview
Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data.
Netwrix Threat Manager Demo - StealthDEFEND Cybersecurity Playbooks
Balancing security with usability is the greatest challenge to rapid containment threat responses. Disabling user accounts for false positives or lower level security events creates additional work for support teams and frustrates users, often leading to security controls being removed. StealthDE...
Product Avatar Image

Have you used Netwrix Threat Manager before?

Answer a few questions to help the Netwrix Threat Manager community

Netwrix Threat Manager Reviews (4)

Reviews

Netwrix Threat Manager Reviews (4)

4.4
4 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
MD
Systems Administrator
Small-Business (50 or fewer emp.)
"StealthDefend is like boarder security - keeps harmful stuff out"
What do you like best about Netwrix Threat Manager?

This program is really ingenious, it is constantly analysing and checking current patterns to ensure that no malicious occurrences are occurring. If it detects something is not right it has several ways to alert you. It is always looking at trends from now and right back to when it was installed. You also have the benefit of running different set of tasks i,e disable the account, shutdown a server, run custom scripts, etc. This program helps us keep one step ahead of the bad guys and keep our data safe and sound. Review collected by and hosted on G2.com.

What do you dislike about Netwrix Threat Manager?

There is no automatic update function, instead you have to go to their website and keep checking for new improvements or bug fixes. Review collected by and hosted on G2.com.

Verified User in Environmental Services
AE
Mid-Market (51-1000 emp.)
"Powerful insights into data and systems."
What do you like best about Netwrix Threat Manager?

The reports are easily consumable, and actionable. The alerts allow for prompt response and resolution of issues. The pre-configured reports and alerts cover some of the most critical cases. The report and dashboard interfaces provide a quick and easy way to review the status of the environment. Review collected by and hosted on G2.com.

What do you dislike about Netwrix Threat Manager?

The system is quite complex and requires significant understanding to utilize fully. The menus are a bit hard to navigate, and the overall feel of the system is not intuitive. The setup process has had a few roadbumps as well due to recent releases having some incompatibilities with our environment. Review collected by and hosted on G2.com.

Verified User in Electrical/Electronic Manufacturing
UE
Mid-Market (51-1000 emp.)
"Insights I didn't even know I needed"
What do you like best about Netwrix Threat Manager?

I love the alerts for abnormal behavior. We've been able to find some process that were causing small issues here and there but were unable to track down in the past. Review collected by and hosted on G2.com.

What do you dislike about Netwrix Threat Manager?

The software does so much that configuration can be daunting Review collected by and hosted on G2.com.

Verified User in Government Administration
EG
Enterprise (> 1000 emp.)
"Implementing and happy so far"
What do you like best about Netwrix Threat Manager?

I like the deep functionality and configurability of the product. Review collected by and hosted on G2.com.

What do you dislike about Netwrix Threat Manager?

UI is a little busy and intuitive compared to competitor. Review collected by and hosted on G2.com.

There are not enough reviews of Netwrix Threat Manager for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
2
Dynatrace Logo
Dynatrace
4.5
(1,345)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
3
Datadog Logo
Datadog
4.4
(684)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
4
KnowBe4 PhishER/PhishER Plus Logo
KnowBe4 PhishER/PhishER Plus
4.5
(547)
KnowBe4 PhishER is the key ingredient of an essential security workstream. It's your lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate your threat response and manage the high volume of potentially malicious email messages reported by your users. And, with automatic prioritization of emails, PhishER helps your InfoSec and Security Operations team cut through the inbox noise and respond to the most dangerous threats more quickly.
5
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(512)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
6
BetterCloud Logo
BetterCloud
4.4
(480)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
7
IBM Instana Logo
IBM Instana
4.4
(435)
Instana automatically discovers, maps, and monitors all services and infrastructure components across on-prem and cloud, providing AI-driven application context, issue remediation to enhance IT operations. Instana’s zero-configuration dashboards help reduce toil for SRE and DevOps teams, helping them spend more innovating than troubleshooting. Its automated playbooks seamlessly address common issues and precise ML-driven alerts help manage rapid change, thereby enhancing infrastructure availability. These capabilities in help in predicting and managing IT budgets to support increase in demand during peak cycles.​
8
Cisco Duo Logo
Cisco Duo
4.5
(429)
Duo is a cloud-based access security platform built to protect access to any application, from any device. Duo’s passwordless authentication, single sign-on (SSO) and user-friendly multi-factor authentication make secure logins easy for users, reducing friction to their workflow.
9
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(391)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
10
CyberSentriq Logo
CyberSentriq
4.6
(381)
Cybersentriq provides Integrated Cybersecurity & Data Protection for Businesses and Managed Service Providers. Our unified AI-powered platform offers all in one email phishing and spam protection, DNS filtering, security awareness training, email archiving, M365 backup and recovery - enabling users to ensure compliance, easily store and retrieve data, and protect against online threats such as phishing and ransomware
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Netwrix Threat Manager
View Alternatives