Fasoo RiskViewFasoo
|
||||||
Related Products
|
||||||
About
Flag suspicious files and user activities that indicate sufficient risk for intervention by business management. This user and entity behavior analytics (UEBA) solution applies sophisticated rule-based modeling to data sources to establish normal patterns of behavior and help determine suspicious activities. Analysis can reduce the possibility of insider threats since they are difficult to detect due to privileged users having specific knowledge of security controls and methods to bypass them. Detect event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive number of sensitive files. Monitor file-based risks, such as unauthorized users’ attempts to decrypt confidential files. Monitor user-based risks, such as decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual.
|
About
Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Companies in need of a tool to detect event anomalies, monitor risks, and manage threats
|
Audience
Companies and enterprises interested in a software solution to secure their data against unknown threats through entity behavior analytics
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationFasoo
United States
en.fasoo.com/products/fasoo-riskview/
|
Company InformationSplunk
Founded: 2003
United States
www.splunk.com/en_us/software/user-behavior-analytics.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
||||||
|
|
|||||
Categories |
Categories |
|||||
Integrations
Amazon
Amazon Augmented AI (A2I)
Amazon Aurora
Amazon Care
Amazon CloudFront
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco ACI
Cisco Evolved Programmable Network (EPN) Manager
|
Integrations
Amazon
Amazon Augmented AI (A2I)
Amazon Aurora
Amazon Care
Amazon CloudFront
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco ACI
Cisco Evolved Programmable Network (EPN) Manager
|
|||||
|
|