+
+

Related Products

  • Safetica
    358 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    424 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    159 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • c/side
    6 Ratings
    Visit Website
  • Hoxhunt
    4,416 Ratings
    Visit Website
  • NINJIO
    390 Ratings
    Visit Website
  • Synchredible
    12 Ratings
    Visit Website
  • Avast Free Antivirus
    30,245 Ratings
    Visit Website

About

Flag suspicious files and user activities that indicate sufficient risk for intervention by business management. This user and entity behavior analytics (UEBA) solution applies sophisticated rule-based modeling to data sources to establish normal patterns of behavior and help determine suspicious activities. Analysis can reduce the possibility of insider threats since they are difficult to detect due to privileged users having specific knowledge of security controls and methods to bypass them. Detect event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive number of sensitive files. Monitor file-based risks, such as unauthorized users’ attempts to decrypt confidential files. Monitor user-based risks, such as decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual.

About

Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies in need of a tool to detect event anomalies, monitor risks, and manage threats

Audience

Companies and enterprises interested in a software solution to secure their data against unknown threats through entity behavior analytics

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fasoo
United States
en.fasoo.com/products/fasoo-riskview/

Company Information

Splunk
Founded: 2003
United States
www.splunk.com/en_us/software/user-behavior-analytics.html

Alternatives

FortiInsight

FortiInsight

Fortinet

Alternatives

FortiInsight

FortiInsight

Fortinet
ObserveIT

ObserveIT

Proofpoint
Securonix UEBA

Securonix UEBA

Securonix

Categories

Categories

Integrations

Amazon
Amazon Augmented AI (A2I)
Amazon Aurora
Amazon Care
Amazon CloudFront
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco ACI
Cisco Evolved Programmable Network (EPN) Manager
Cisco Nexus Dashboard Fabric Controller
Cisco Secure Email Threat Defense
Cisco Spaces
Crewmeister
Eviden MDR Service
MacroView DMF
SAP Agile Data Preparation
Splunk Cloud Platform
Splunk Infrastructure Monitoring
Splunk SOAR

Integrations

Amazon
Amazon Augmented AI (A2I)
Amazon Aurora
Amazon Care
Amazon CloudFront
Amazon S3 Glacier
Amazon SageMaker
Booz Allen MDR
Cisco ACI
Cisco Evolved Programmable Network (EPN) Manager
Cisco Nexus Dashboard Fabric Controller
Cisco Secure Email Threat Defense
Cisco Spaces
Crewmeister
Eviden MDR Service
MacroView DMF
SAP Agile Data Preparation
Splunk Cloud Platform
Splunk Infrastructure Monitoring
Splunk SOAR
Claim Fasoo RiskView and update features and information
Claim Fasoo RiskView and update features and information
Claim Splunk User Behavior Analytics and update features and information
Claim Splunk User Behavior Analytics and update features and information