Best Anomaly Detection Software - Page 2

Compare the Top Anomaly Detection Software as of July 2025 - Page 2

  • 1
    Subex Fraud Management
    One stop solution to address all types of frauds across Voice, Data and Digital Services. Built on 25 years of domain expertise, Subex Fraud Management provides 360° fraud protection across digital services by leveraging advanced machine learning and signaling intelligence. The solution combines a traditional rules engine with advanced artificial intelligence/machine learning capabilities to provide increased coverage across all your services and minimize fraud run-time in the network with real-time blocking capabilities. At the heart of the Subex Fraud Management solution is a hybrid rule engine that covers detection techniques like thresholds, expressions, and trends. Rule engine comprises of a combination of threshold rules, geographic rules, pattern (sequential) rules, combinatorial rules, ratio/proportion-based rules, negative rules, hotlist-based rules, etc. which enable you to monitor advanced threats in the network.
  • 2
    Analytics Intelligence

    Analytics Intelligence

    Analytics Intelligence

    [AI] Analytics Intelligence is a data analytics and artificial intelligence software development company. We believe that the growth of data, data analysis and artificial intelligence, are significantly changing how organizations, cities and government agencies will be run going into the future and are providing services and products to help clients implement future proof Digital Transformation strategy. [AI] also provides a consultive service providing bespoke data architecture project planning, management and implementation, data science and insight reporting support services to data-driven, forward-thinking organizations in both the private and public sectors. Analytics Intelligence [AI] combines human data scientists and artificial intelligence technologies to help clients improve data analysis, enhance decision making, and optimize digital services. We’ve been researching and developing artificial intelligence agents and chatbot systems for the enterprise market since 2010.
  • 3
    Ingalls MDR

    Ingalls MDR

    Ingalls Information Security

    Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment. We leverage the best of the commercial, open source, and internally-developed tools and methods to provide the highest fidelity of monitoring possible. We have partnered with Cylance to provide the best endpoint threat detection and prevention capability available on the market today, CylancePROTECT(™).
  • 4
    Digitate ignio
    Transform your operations across domains using AI and Automation towards an Autonomous Enterprise for improved resilience, assurance, and superior customer experience. Digitate’s ignio helps resolve your operational woes for an Agile, Resilient and Autonomous Enterprise. Businesses can adapt to changes efficiently, evolve digitally and unleash innovation to sustain and grow. With ignio, transform your IT and business operations’ from reactive to proactive, and take a leap forward to ‘Predict, Prescribe and Prevent.’ Learn how enterprises can elevate their business and IT operation strategy to make headway into an Autonomous Enterprise. Get started on your journey from Traditional to Automated to Autonomous Operations. Powered by AI and Machine Learning, Autonomous Operations allows enterprises to reduce manual efforts, adapt to business or IT changes efficiently with minimal cost and focus on innovation.
  • 5
    Splunk IT Service Intelligence
    Protect business service-level agreements with dashboards to monitor service health, troubleshoot alerts and perform root cause analysis. Reduce MTTR with real-time event correlation, automated incident prioritization and integrations with ITSM and orchestration tools. Use advanced analytics like anomaly detection, adaptive thresholding and predictive health scores to monitor KPI data and prevent issues 30 minutes in advance. Monitor performance the way the business operates with pre-built dashboards that track service health and visually correlate services to underlying infrastructure. Use side-by-side displays of multiple services and correlate metrics over time to identify root causes. Predict future incidents using machine learning algorithms and historical service health scores. Use adaptive thresholding and anomaly detection to automatically update rules based on observed and historical behavior, so your alerts never become stale.
  • 6
    NEMESIS

    NEMESIS

    Aviana

    NEMESIS: Next-generation AI-powered anomaly detection technology designed to recognize fraud and waste. NEMESIS: Next-generation AI-powered anomaly detection technology pinpoints efficiency opportunities in your business management systems. Powered by AI, NEMESIS is an enterprise-ready configurable business solution platform, empowering business analysts to swiftly transform data into actionable insights. Allow the power of AI to solve your problems of overstaffing, medical errors, quality of care, and claims fraud. Benefit from NEMESIS’s uninterrupted process monitoring, unearthing a wide range of risk elements, from predicting quality issues to waste and abuse. Employ machine learning and AI to detect fraud and fraud schemes before they drain your finances. Exercise more robust controls over expenses and budget deviations, through continuous visibility of waste and abuse.
  • 7
    Anomalia

    Anomalia

    Scry AI

    Anomalia® uses proprietary AI-Algorithms to identify potential fraud, risk, conflict and non-compliance in financial and legal engagements at transactional level. Anomalia® anomaly detection in ACH Transactions uses customer’s transactional as well as behavioral data to detect anomalies in ACH transactions and prevents fraudulent transactions. Anomalia® anomaly detection in mobile check deposits analyzes authenticity of mobile checks, accounts in which they are deposited and their geo-spatial mobile deposit locations to detect potential fraud in transactions. Anomalia® anomaly detection in wire transactions analyzes originators, beneficiaries and their anomaly scores derived from other wire transactions to detect and prevent potential frauds. Anomalia® anti money laundering performs analyzes on various transactions, entities and their linkages for enhanced due diligence to detect potential money laundering transactions.
  • 8
    Arkestro

    Arkestro

    Arkestro

    No login, no app, no hassle. Seamless one-click sourcing events in your suppliers' inbox, embedded with real-time predictive data. Our flexible data model works for every category of spend. If you can source it in Excel, you can source it using Arkestro. Predictive anomaly detection catches and corrects errors before they reach procurement. Role-based access simplifies project management for sourcing events, enabling any stakeholder to get updates. Sourcing events in Arkestro learn from your supplier's behavior to shorten cycles. A simplified email-based workflow provides you with any set of award scenarios for any size or complexity of sourcing events. Supplier quotes are filled with errors from data entry and copy-paste. Checking on the status of a sourcing process requires a slew of pivot tables. New sourcing cycles don’t learn from supplier quotes in previous cycles. Use our pricing simulator to generate instant suggestions for your suppliers to modify and submit.
  • 9
    Qualytics

    Qualytics

    Qualytics

    Helping enterprises proactively manage their full data quality lifecycle through contextual data quality checks, anomaly detection and remediation. Expose anomalies and metadata to help teams take corrective actions. Automatically trigger remediation workflows to resolve errors quickly and efficiently. Maintain high data quality and prevent errors from affecting business decisions. The SLA chart provides an overview of SLA, including the total number of SLA monitoring that have been performed and any violations that have occurred. This chart can help you identify areas of your data that may require further investigation or improvement.
  • 10
    Lumeus

    Lumeus

    Lumeus

    Automate anomaly detection to meet SLAs. Monitor the entire network. Optimize digital experiences. Modernize network security leveraging your existing infrastructure through an agentless, AI-assisted approach. Enforce access by least privilege. Create identity-based boundaries. Extend to applications, devices, and infrastructure. Instant notifications of escalations. Review all session activity and details from cohesive logs. Enable device fingerprinting and gain network topology insights. Seamlessly connect to your existing infrastructure. Unify connectivity and control from campus to cloud. Organizations can use Lumeus to monitor and detect escalations using AI; segment traffic to prevent lateral movement; and secure user access by extending MFA and zero trust to network infrastructure all with one unified management plane. Lumeus has a cloud management portal that connects to your infrastructure via API.
  • 11
    Acryl Data

    Acryl Data

    Acryl Data

    No more data catalog ghost towns. Acryl Cloud drives fast time-to-value via Shift Left practices for data producers and an intuitive UI for data consumers. Continuously detect data quality incidents in real-time, automate anomaly detection to prevent breakages, and drive fast resolution when they do occur. Acryl Cloud supports both push-based and pull-based metadata ingestion for easy maintenance, ensuring information is trustworthy, up-to-date, and definitive. Data should be operational. Go beyond simple visibility and use automated Metadata Tests to continuously expose data insights and surface new areas for improvement. Reduce confusion and accelerate resolution with clear asset ownership, automatic detection, streamlined alerts, and time-based lineage for tracing root causes.
  • 12
    Quindar

    Quindar

    Quindar

    Monitor, control, and automate spacecraft operations. Operate multiple missions, diverse satellites, 
and various payloads within a unified interface. Control multiple satellite types in a single interface allowing for legacy fleet migration and next-gen payload support. Track spacecraft, reserve contacts, automate tasking, and intelligently respond to ground and space incidents with Quindar Mission Management. Harness the power of advanced analytics and machine learning to turn data into actionable intelligence. Make decisions faster via predictive maintenance, trend analysis, and anomaly detection. Leveraging data-driven insights that propel your mission forward. Built to integrate seamlessly with your existing systems and third-party applications. As your needs evolve, your operations can too without the constraint of vendor lock-in. Analyze flight paths and commands across most C2 systems.
  • 13
    Digna

    Digna

    Digna

    Digna is an AI-powered anomaly detection solution designed to meet the challenges of modern data quality management. It's domain agnostic, meaning it seamlessly adapts to various sectors, from finance to healthcare. Digna prioritizes data privacy, ensuring compliance with stringent data regulations. Moreover, it's built to scale, growing alongside your data infrastructure. With the flexibility to choose cloud-based or on-premises installation, Digna aligns with your organizational needs and security policies. In conclusion, Digna stands at the forefront of modern data quality solutions. Its user-friendly interface, combined with powerful AI-driven analytics, makes it an ideal choice for businesses seeking to improve their data quality. With its seamless integration, real-time monitoring, and adaptability, Digna is not just a tool; it’s a partner in your journey towards impeccable data quality.
  • 14
    Validio

    Validio

    Validio

    See how your data assets are used: popularity, utilization, and schema coverage. Get important insights about your data assets such as popularity, utilization, quality, and schema coverage. Find and filter the data you need based on metadata tags and descriptions. Get important insights about your data assets such as popularity, utilization, quality, and schema coverage. Drive data governance and ownership across your organization. Stream-lake-warehouse lineage to facilitate data ownership and collaboration. Automatically generated field-level lineage map to understand the entire data ecosystem. Anomaly detection learns from your data and seasonality patterns, with automatic backfill from historical data. Machine learning-based thresholds are trained per data segment, trained on actual data instead of metadata only.
  • 15
    Thoras.ai

    Thoras.ai

    Thoras.ai

    Say goodbye to cloud waste while ensuring your critical applications run reliably. Anticipate demand fluctuations, ensuring optimal capacity and uninterrupted performance. Early anomaly detection enables rapid identification and resolution for smooth operations. Reduce under or over-provisioning through intelligent workload rightsizing. Thoras autonomously optimizes, providing engineers with recommendations and visualizing trends.
  • 16
    Bedrock Security

    Bedrock Security

    Bedrock Security

    At Bedrock Security, frictionless data security means freedom to embrace cloud and AI data growth safely, without slowing your business down. Start your data security journey, and confidently move beyond just visibility. Understand your material data with AI reasoning and ensure cloud and GenAI compliance controls are enforced with out-of-the-box compliance frameworks. Your data isn’t static, it’s growing, changing, and moving, making it critical for you to perform security assessments continuously. Efficiently manage remediation and response, integrating behavior-based anomaly detection, SIEM/SOAR integration, policy enforcement, and prioritization based on data context. Mature security programs can frictionlessly enable business operations while effectively managing risk to the brand, revenue, and reputation of the organization. Bedrock’s AIR helps organizations with data minimization, identity and access minimization, and data hardening.
  • 17
    PowerAI

    PowerAI

    Buzz Solutions

    Robust software platform, REST APIs, analytics, and work prioritization to help you efficiently and accurately inspect energy infrastructure with powerful AI capabilities. Optimize your inspection with the highest accuracy. PowerAI makes inspections safer, more cost and time-efficient, and more collaborative than ever before. Embrace the future with AI-based visual data processing and keep your people, assets, and community safe. Our AI-based anomaly detection redefines accuracy and consistency in power infrastructure inspections with the most accurate visual data processing in the industry. This precision leads to 50-70% cost savings on data processing and visual anomaly detections as well as 50-60% time savings. We offer industry-leading accuracy for the detection of 27 different assets and asset anomalies. Our technology, driven by machine learning, redefines accuracy and consistency in power infrastructure inspections.
  • 18
    Supervizor

    Supervizor

    Supervizor

    With unparalleled anomaly detection, Supervizor’s continuous quality assurance helps error-proof your accounting and curb fraud. We are on a mission to help corporations produce reliable financial data. Supervizor provides corporations with unique anomaly detection capabilities to identify several types of errors (including accounting ones) and fraud attempts. Processes and people systematically produce errors, and organizations encounter a growing number of fraud schemes. Connect your ERP and let Supervizor consolidate journal entries using our library of millions of accounting patterns. Continuously run ready-to-use checks across multiple areas. Collaborate between teams to oversee financial data quality across subsidiaries, systems, departments, and geographies. Automatically extracts and prepares your data to avoid spending time gathering, scrubbing, and formatting manually. Identifies and prioritizes your riskiest findings to investigate, intelligently minimizing false positives.
  • 19
    VictoriaMetrics Anomaly Detection
    VictoriaMetrics Anomaly Detection is a service that continuously scans time series stored in VictoriaMetrics and detects unexpected changes within data patterns in real time. It does so by utilizing user-configurable machine learning models. In the dynamic and complex world of system monitoring, VictoriaMetrics Anomaly Detection, a part of our Enterprise offering, is a pivotal tool for achieving advanced observability. It empowers SREs and DevOps teams by automating the intricate task of identifying abnormal behavior in time-series data. It goes beyond traditional threshold-based alerting, utilizing machine learning techniques to detect anomalies and minimize false positives, thus reducing alert fatigue. Providing simplified alerting mechanisms atop unified anomaly scores enables teams to spot and address potential issues faster, ensuring system reliability and operational efficiency.
  • 20
    InfraSonar

    InfraSonar

    InfraSonar

    InfraSonar is an infrastructure monitoring solution that offers real-time performance monitoring, anomaly detection, and operations optimization. It is designed to be easy to use and adaptable to an organization's unique needs. Its modular setup allows for the easy addition of custom data collectors. InfraSonar also has an extensive API for integration with BI platforms for reporting purposes and supports various notification methods including SMS, WhatsApp, email, and voice calls. InfraSonar is a comprehensive multi-tenant solution designed to scale effortlessly to meet the diverse needs of any Managed Service Provider (MSP) or customer. Our platform offers an extensive set of industry best practices to get you started quickly and efficiently. However, we understand that every business has unique requirements, which is why InfraSonar allows you the flexibility to define your own conditions, views, and reports.
  • 21
    Wraith

    Wraith

    NetCentrics

    Rapid cloud adoption coupled with the complexities of multi-cloud environments and siloed security teams creates a critical visibility gap for many organizations. Wraith addresses this challenge by offering unparalleled visibility and threat-hunting capabilities across on-premise, hybrid, and multi-cloud architectures. These capabilities are enhanced by AI-enabled anomaly detection, making Wraith an essential tool for neutralizing hidden threats to secure and defend cloud environments. Wraith provides comprehensive multi-terrain visibility, allowing security teams to monitor assets and activities across different Cloud Service Providers (CSPs) with a single tool set. This ensures a unified security posture and faster threat response across diverse and complex cloud environments.
  • 22
    Nazar

    Nazar

    Nazar

    Nazar was created from our own needs to manage multiple databases in multi-cloud or hybrid environments. It is production ready for the main database engines and completely eliminates the need for using multiple tools. It saves one a lot of time by making a standard and easy way to setup new servers in the platform. Get a normalized view of your database's behavior on a single dashboard without having to use multiple tools with completely different views and metrics from one another. Setting up, tracing and investigating logs and querying data dictionaries every time is not where the race is won. Nazar uses the resources already available in the DBMS for monitoring and does not need to rely on agents. NAZAR automates anomaly detection and root-cause analysis, reducing mean time to resolution (MTTR) and detecting issues to avoid incidents for peak application and business performance.
  • 23
    LogicLadder

    LogicLadder

    LogicLadder

    Achieve your net zero vision with a single platform. IoT Gateways and Edge Gateways help you acquire real time data on energy, water and emission directly from sensors or automation systems. Automated workflows and data scheduling to collect data accurately and with speed. Acquire data across your value chain. Acquire all your sustainability data into single repository with our powerful third party integrations and API. Full auditable record of data generation, change request and correction. Automated data checks and anomaly detection for keeping your data clean and disclosure grade. Setup permissions, workflows and validation rules for automated and manual data correction.
  • 24
    Lepide Data Security Platform
    Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
  • 25
    Logtail

    Logtail

    Logtail

    Logtail lets you query your logs the same way you query a database. Experience radically better SQL-compatible log management at an unbeatable price. Store your logs in a structured format and search them easily with SQL. Create actionable dashboards with hosted Grafana. Archive log fragments, collaborate with colleagues, and get automatic anomaly detection alerts.
  • 26
    Revelock

    Revelock

    Revelock

    We build a digital fingerprint for each user based on biometric, behavioral, device, IP and network data, then continuously verify users across the user journey. In addition to detection, we empower you to configure policies that automatically respond to malware, phishing, and RATs with Revelock Active Defense. We build the BionicID™ from thousands of parameters collected from behavioral biometrics, behavioral analytics, device, network and threat data. The BionicID™ is trained and ready to verify users in just two interactions, reducing false positives and false negatives that trip up users and flood your call center. No matter what type of attack - malware, RATs or phishing, IDTheft, ID impersonation or ID manipulation - the BionicID™ changes the game. Our anomaly detection and classification engine delivers a continual risk assessment that protects your users and stops fraud.
  • 27
    Sensai

    Sensai

    Sensai

    Sensai provides AI based anomaly detection, root cause analysis and prediction tool, enabling real time resolution of issues. Sensai AI solution significantly improves uptime & time to root cause. Empowers IT leaders to manage SLAs for improved performance and profitability. Streamlines & automates anomaly detection, prediction, root cause analysis (RCA) & resolution. Holistic view & integrated analytics through integration w/3rd party tools. Pre-trained algorithms & models from day one.
  • 28
    Infrascale Cloud Backup
    Infrascale offers an enterprise cloud backup solution which includes Anomaly Detection, to alert you when the number of “new” or “changed” files dramatically changes from established benchmark levels. The Anomaly Detection feature provides an important early warning system to quickly isolate a ransomware infection and allow you to recover important data before the entire network is frozen. Infrascale understands that backup and recovery of mission-critical data is of utmost importance. This includes the flexibility to perform backups on any endpoint device, and to deliver fast and effortless restores – as well as making it easy to use for the end user. Infrascale Cloud Backup provides unlimited retention and version history, with support for an unlimited number of endpoint devices. Endpoint backup data is always available! With built-in local backup for rapid restore and redundancy, and Live Protect to monitor and capture data changes real-time.
  • 29
    Sightness

    Sightness

    Sightness

    Overcome complexity. Better decide. The SaaS solution for detection of transport anomalies by AI. Smart vision for transport Smart transport vision is global visibility, intelligent anomaly detection and a powerful ally for optimal decision-making. Thanks to its AI (Artificial Intelligence) technology, Sightness frees decision-makers from the complexity of freight transport: it standardizes heterogeneous data, offers a synoptic and microscopic view of the activity and identifies anomalies. This set makes it possible to set up the right action plans. Sightness is available in modules corresponding to the three key components of transport: costs, customer promise and environmental impact. Its functionalities make it possible to meet the business challenges of both shippers and carriers. Fully integrate transport into your CSR policy. Calculate your emissions, simulate your action plans and check their correct functioning.
  • 30
    Shield34

    Shield34

    Shield34

    Shield34 is the ONLY web automation framework that: Is 100% Selenium compatible! Continue working with your existing Selenium scripts. Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests are a huge pain! Shield34 adds defense-and-recovery AI algorithms to every Selenium command, including dynamic element locator, eliminating false positive results, driving self-healing and maintenance-free testing. Get Real-time Root Cause Analysis Using AI algorithms, Shield34 is automatically pinpointing the root cause of every test failure – reducing the overhead of debugging and reproducing failed tests. Enjoy a ‘Smarter Selenium’. Integrate automatically with your