Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at NDR by Bricata, reclaim access to make changes.
Product Avatar Image
NDR by Bricata

By Bricata

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at NDR by Bricata, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with NDR by Bricata?

It's been two months since this profile received a new review
Leave a Review

NDR by Bricata Reviews & Product Details

Pricing

Pricing provided by NDR by Bricata.

Bricata Subscription Licensing

$9,999
Per Gbps average throughput

NDR by Bricata Media

NDR by Bricata Demo - 360 Degree Detection
Investigating alerts within the Bricata GUI
NDR by Bricata Demo - Powerful SOC and IR Dashboards
Empower the analyst with customizable dashboards providing detailed network insights and enable proactive hunting for threats
NDR by Bricata Demo - The network is a powerful tool in finding Malware threats
Leverage Bricata's ML engines extract, analyze and convict files from network flows in real time
NDR by Bricata Demo - Eliminate Network Blindspots
Bricata gives your team quick and effective access to all network traffic at scale and in an instant
Product Avatar Image

Have you used NDR by Bricata before?

Answer a few questions to help the NDR by Bricata community

NDR by Bricata Reviews (1)

Reviews

NDR by Bricata Reviews (1)

4.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Valbona X.
VX
Information Systems Analyst
Hospital & Health Care
Enterprise (> 1000 emp.)
"Efficient software with new detection capabilities "
What do you like best about NDR by Bricata?

This system has upgraded recently and with it came new features. The upgraded Central Management Console which I use for viewing alerts and forwarding logs. This software offers a better combat dynamic which changes in the threat environment. It does a great job for identifying, detecting, blocking, reporting and removing threats, intrusions, malware and malicious attacks on computers. Review collected by and hosted on G2.com.

What do you dislike about NDR by Bricata?

There isn’t much that I don’t like about this security system. The platform could be better but they keep improving it. It works as well as other well-known network intrusion prevention security systems. Their perimeter defense is good but can work on being great. Review collected by and hosted on G2.com.

There are not enough reviews of NDR by Bricata for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SolarWinds Observability Logo
SolarWinds Observability
4.3
(802)
SolarWinds® Hybrid Cloud Observability is a full-stack observability solution designed to integrate data from across IT on-premise and multi-cloud environments. The solution includes built-in intelligence designed to help customers optimize performance, ensure availability, and reduce remediation time across IT infrastructures. It is intended for all organizations and industries. Hybrid Cloud Observability is designed to: - Help users resolve issues quicker with better visibility of the environment - Deliver value across the organization with increased efficiency accruing from proactive responsiveness
2
Datadog Logo
Datadog
4.4
(690)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
3
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(567)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
4
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
5
Progress WhatsUp Gold Logo
Progress WhatsUp Gold
4.4
(392)
WhatsUp Gold is unified infrastructure and application monitoring software that gives modern IT teams the ability to monitor their increasingly complex IT environment with a single product.
6
Coralogix Logo
Coralogix
4.6
(345)
Coralogix is a stateful streaming data platform that provides real-time insights and long-term trend analysis with no reliance on storage or indexing, solving the monitoring challenges of data growth in large scale systems.
7
Trend Vision One Logo
Trend Vision One
4.7
(227)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
8
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
9
Palo Alto Networks Next-Generation Firewalls Logo
Palo Alto Networks Next-Generation Firewalls
4.5
(157)
Our next-generation firewall classifies all traffic, including encrypted traffic, based on application, application function, user and content. You can create comprehensive, precise security policies, resulting in safe enablement of applications. This lets only authorized users run sanctioned applications, greatly reducing the surface area of cyber attacks across the organization.
10
Wireshark Logo
Wireshark
4.7
(147)
Wireshark is a open-source network protocol analyzer that enables users to capture and interactively examine the traffic traversing a computer network. It provides deep insights into network communications, making it an essential tool for network troubleshooting, analysis, software and protocol development, and educational purposes. Wireshark is cross-platform, running on Windows, macOS, Linux, and various UNIX systems. Key Features and Functionality: - Comprehensive Protocol Support: Wireshark offers deep inspection of hundreds of protocols, with new ones continually being added. - Live Capture and Offline Analysis: Users can capture live network data or analyze previously saved capture files. - Multi-Platform Compatibility: The software operates on multiple platforms, including Windows, Linux, macOS, FreeBSD, and NetBSD. - Advanced Display Filters: Wireshark provides powerful display filters, allowing users to focus on specific traffic patterns. - Rich VoIP Analysis: It includes tools for analyzing Voice over IP (VoIP) communications. - Support for Various Capture File Formats: Wireshark can read and write numerous capture file formats, such as tcpdump (libpcap), Pcap NG, and others. - Decryption Capabilities: The tool supports decryption for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2. - Customizable Coloring Rules: Users can apply coloring rules to the packet list for quick, intuitive analysis. Primary Value and Problem Solving: Wireshark addresses the critical need for in-depth network analysis by providing a detailed view of network traffic at a microscopic level. This capability is invaluable for network professionals, security experts, developers, and educators who require precise insights into network behavior. By facilitating the identification and resolution of network issues, Wireshark enhances network performance, security, and reliability. Its open-source nature ensures continuous improvement and adaptability to emerging networking technologies and protocols.
Show More

Pricing Options

Pricing provided by NDR by Bricata.

Bricata Subscription Licensing

$9,999
Per Gbps average throughput
Product Avatar Image
NDR by Bricata
View Alternatives