
The most robust features are its highly detailed data discovery/classification and the visibility it provides into the exposed or wrongly permissioned data—teams get actionable insight into sensitive files, sharing patterns, and insider risk that would otherwise be unknown. Its analytics, automated alerting, and dashboards assist in prioritizing remediation and complying with regulations, thus security improvements become traceable. Users point out that its threat detection logic is of high quality and the feature that the on-prem and cloud data context can be unified is definitely a differentiation factor. Review collected by and hosted on G2.com.
it is frequently mentioned in negative reviews that the cost of the product is matching major points (sometimes is described as being too high for smaller/mid-market buyers), as well as that the initial complexity of deployment, tuning alerts, and data navigation can make teams overwhelmed with the amount of data before they have fully optimized it. Users also reveal that they suffer from some performance issues (especially with large on-prem datasets), alert noise during tuning, limitations in reporting/customization, and slow ticket response or support turnaround in some cases. Review collected by and hosted on G2.com.
Validated through LinkedIn
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.






