Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Unomaly

Unomaly is a solution for automating analysis of data produced by IT systems, applications and software no matter what it is or where it resides. Unomaly continuously learns what's normal through repetitions in data and universally and automatically detects any incident by the new and changing data it creates.

Work for Unomaly?

Learning about Unomaly?

We can help you find the solution that fits you best.

Unomaly Reviews

Ask Unomaly a Question
Write a Review
Filter Reviews
Showing 0 Unomaly reviews
LinkedIn Connections

What Security Information and Event Management (SIEM) solution do you use?

Thanks for letting us know!

There are not enough reviews of Unomaly for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Splunk Enterprise Security Logo
Splunk Enterprise Security
4.0
(95)
Splunk Enterprise Security (ES) is a SIEM software that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information to enables security teams to quickly detect and respond to internal and external attacks to simplify threat management while minimizing risk and safeguarding business
2
AlienVault USM (from AT&T Cybersecurity) Logo
AlienVault USM (from AT&T Cybersecurity)
4.4
(89)
AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.
3
SolarWinds Log & Event Manager Logo
SolarWinds Log & Event Manager
4.2
(33)
Log & Event Manager is an affordable, easy-to-use SIEM solution that helps you detect and respond to security threats and demonstrate compliance.
4
OSSIM (Open Source) Logo
OSSIM (Open Source)
4.0
(26)
Alienvault OSSIM is an open source SIEM tool that contribute and receive real-time information about malicious hosts to help user increase security visibility and control in network.
5
LogRhythm Logo
LogRhythm
3.6
(21)
LogRhythm is a security intelligence and analytics software that empowers organizations to rapidly detect, respond to and neutralize damaging cyber threats.
6
Trustwave Logo
Trustwave
4.2
(19)
Trustwave is a global leader in cloud-based compliance and information security.
7
Cisco Security Manager Logo
Cisco Security Manager
4.3
(19)
Advanced Security Manager is a computer security software that secures information from unwanted intruders in a computer.
8
Solarwinds SIEM Logo
Solarwinds SIEM
3.6
(17)
SolarWinds SIEM is a Log & Event Manager software that Eliminate threats faster with instantaneous detection of suspicious activity and automated responses for mitigation and compliance.
9
IBM QRadar Logo
IBM QRadar
4.1
(19)
IBM QRadar
10
Netsurion EventTracker Logo
Netsurion EventTracker
4.6
(15)
Netsurion EventTracker is powerful, scalable software application that installed on premise or in the cloud to address a broad range of cyber security challenges for organizations with 50 to 10,000* network nodes, it identifies malware, unusual behavior and suspicious network traffic and lets user know when it been compromised.
Show more
Kate from G2

Learning about Unomaly?

I can help.
* We monitor all Unomaly reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.