Alternatives to Fasoo RiskView

Compare Fasoo RiskView alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Fasoo RiskView in 2024. Compare features, ratings, user reviews, pricing, and more from Fasoo RiskView competitors and alternatives in order to make an informed decision for your business.

  • 1
    Safetica

    Safetica

    Safetica

    Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
    Leader badge
    Partner badge
    Compare vs. Fasoo RiskView View Software
    Visit Website
  • 2
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Compare vs. Fasoo RiskView View Software
    Visit Website
  • 3
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 4
    ActivTrak

    ActivTrak

    Birch Grove Software

    The ActivTrak platform is a cloud-native workforce productivity and analytics solution that helps companies understand how and what people do at work. Unlike traditional employee monitoring solutions (that only provide a limited technical view of users), ActivTrak’s AI-driven solution identifies unique user behavior insights that connect actions, context, and intent across multiple digital environments. This helps companies maximize productivity, security, and compliance, and make better business decisions rooted in data. A free version of the award-winning solution can be configured in minutes to provide immediate visibility.
    Starting Price: $10/user/month billed annually
  • 5
    StealthDEFEND
    Detect and respond to abnormal behavior and advanced attacks against active directory and file systems with unprecedented accuracy and speed. Authentication-based attacks factored into 4 out of every 5 breaches involving hacking. Every attacker is after the same two things; credentials and data. Once inside, attackers aim to discover your environment, find and compromise privileged credentials, and leverage those credentials to access, exfiltrate, or destroy data. StealthDEFEND is the only real-time threat detection and response solution purpose-built to protect these two common denominators in every breach scenario. Detect and respond to the specific tactics, techniques, and procedures (TTPs) attackers are leveraging when attempting to compromise active directory and file system data. Automatic tagging of privileged users, groups, data, and resources appropriately adjusts risk ratings associated with abnormal or nefarious behaviors.
  • 6
    FortiInsight

    FortiInsight

    Fortinet

    30 percent of data breaches involve organization insiders acting negligently or maliciously. Insiders pose a unique threat to organizations because they have access to proprietary systems and often are able to bypass security measures, creating a security blind spot to the risk and security teams. Fortinet’s User and Entity Behavior Analytics (UEBA) technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight automatically identifies non-compliant, suspicious, or anomalous behavior and rapidly alerts any compromised user accounts. This proactive approach to threat detection delivers an additional layer of protection and visibility, whether users are on or off the corporate network.
  • 7
    Delinea Privileged Behavior Analytics
    Know the warning signs of privileged account abuse. A sudden increase in privileged account access by certain users or systems. Atypical access to the most privileged accounts or secrets. A high number of privileged accounts are accessed at once. Accounts accessed at unusual times of day or locations. Privileged Behavior Analytics can quickly detect anomalous behavior and instantly alert your security team to a cyber attack or insider threat before a breach catastrophe happens. Delinea Privileged Behavior Analytics uses advanced machine learning to analyze activity on privileged accounts in real-time to detect anomalies and provide threat scoring and configurable alerts. Advanced machine learning analyzes all privileged account activity so you can spot problems and measure the extent of a breach. Reducing security risks to your organization by improving security saves your department time, money, and resources and maximizes your current investment.
  • 8
    DNIF

    DNIF

    DNIF

    DNIF provides a high value solution by combining technologies such as the SIEM, UEBA and SOAR into one product at an extremely low total cost of ownership. DNIF's hyper scalable data lake makes it ideal to ingest and store terabytes of data. Detect suspicious activity using statistics and take action before any damage occurs. Orchestrate processes, people and technology initiatives from a single security dashboard. Your SIEM will come built-in with essential dashboards, reports and response workflows. Coverage for threat hunting, compliance, user behavior monitoring and network traffic anomaly. In-depth coverage map with the MITRE ATT&CK and CAPEC framework. Provides comprehensive validation and response workflows for varied threat outbreaks. DNIF has built the fastest real-time data collection, parsing and enrichment technology stack from scratch. While other SIEMs let you scale upwards to 1TB per day – DNIF lets you start at multiple terabytes per day and scale to petabytes a month.
    Starting Price: $84 per month
  • 9
    ObserveIT

    ObserveIT

    Proofpoint

    Every organization is mobile now: whether it’s work-from-home employees, third party contractors, or executives and sales teams always on the move. As we all collaborate more on sensitive assets, the risks of security mistakes and malicious insider behavior are equally heightened. Traditional perimeter-based solutions do not provide the visibility or business continuity that security and IT teams need. Protecting intellectual property, and customer and employee information requires more than preventative measures. With a prevention-heavy approach, you’ve got many blindspots even after spending months of data discovery, classification, and policy creation. Invariably, you cannot respond to data loss in real-time and need days or weeks to correlate DLP, application and forensic logs. Your users are the new security perimeter. For security teams, piecing together context around suspicious user and data activity from disparate logs is time-intensive and often impossible.
  • 10
    Ekran System

    Ekran System

    Ekran System

    Protect your assets with our insider risk management platform. Don't let human behavior put your data at risk! Ekran System is a comprehensive insider risk management platform with a rich functionality set. It is designed to monitor, analyze, respond, and prevent cybersecurity risks associated with the activity of legitimate users and privileged accounts. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on the Ekran System! Key solutions and capabilities: - Insider threats management - Privileged Access Management - User activity monitoring - User and entity behavior analytics (UEBA) - Employee activity monitoring - Enhanced Auditing and Reporting
  • 11
    Securonix UEBA

    Securonix UEBA

    Securonix

    Today, many attacks are specifically built to evade traditional signature-based defenses, such as file hash matching and malicious domain lists. They use low and slow tactics, such as dormant or time triggered malware, to infiltrate their targets. The market is flooded with security products that claim to use advanced analytics or machine learning for better detection and response. The truth is that all analytics are not created equal. Securonix UEBA leverages sophisticated machine learning and behavior analytics to analyze and correlate interactions between users, systems, applications, IP addresses, and data. Light, nimble, and quick to deploy, Securonix UEBA detects advanced insider threats, cyber threats, fraud, cloud data compromise, and non-compliance. Built-in automated response playbooks and customizable case management workflows allow your security team to respond to threats quickly, accurately, and efficiently.
  • 12
    Veriato Workforce Behavior Analytics
    Monitor productivity, run investigations, and protect against insider risk with one platform. Our powerful workforce behavior analytics allow you to regain visibility into your remote or hybrid employee activity. Veriato workforce behavior analytics go beyond passive monitoring to proactively analyze productivity, monitor for insider risk and much more. Powerful, easy-to-use tools to keep your remote, hybrid and office teams productive. Veriato’s AI-powered algorithm analyzes user behavior patterns and automatically alerts you to any abnormal or suspicious activity. Assign productivity scores to websites, programs, and applications. Select between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered. Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.
    Starting Price: $25 per user per month
  • 13
    Cynet 360 AutoXDR
    Cynet 360 AutoXDR natively unifies NGAV, EDR, Network Detection Rules, UBA Rules and Deception technologies with completely automated attack investigation and remediation on a single, intuitive platform. Backed by a 24/7 Managed Detection and Response service – at no extra cost – Cynet provides comprehensive protection of the environment for even the smallest security teams. Multilayered protection against malware, ransomware, exploits, and fileless attacks. Protecting against scanning attacks, MITM, lateral movement, and data exfiltration. Decoy files, machines, user accounts, and network connections to lure and detect advanced attackers. Preset behavior rules coupled with dynamic behavior profiling to detect malicious anomalies. A 24/7 complementary MDR service proactively monitors your environment and provides needed advice. Ensure your SaaS applications aren’t introducing security risks.
  • 14
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real-time threat analytics in an age when identities are persistently under attack. Based on a risk score computed by our proprietary AI/ML algorithms, a dynamic level of assurance (LoA) is computed. Our approach automatically finds the optimal policy for each transaction to maximize security while minimizing friction for the user with machine learning and AI analytics. This provides a smoother user experience without sacrificing enterprise security.
  • 15
    LogRhythm UEBA

    LogRhythm UEBA

    LogRhythm

    LogRhythm UEBA applies self-evolving analytics against long periods of user data to detect anomalies that indicate a potential threat. Join Senior Technical Product Manager and Data Scientist, Melissa Ruzzi, for a breakdown of our user behavior analytics capability. With the shortage of qualified analysts, inefficient manual processes, and complexity of attacks, it’s crucial to have a user and entity behavior analytics solution that provides extra layers of detection to protect the organization against potential threats. LogRhythm enhances your threat detection coverage in addition to existing out-of-the-box AI Engine UEBA rules. LogRhythm UEBA helps detect outliers and automatically sets scores without the need of explicit defined logic. As a cloud-native add-on, LogRhythm UEBA functions as an advanced UEBA log source in the LogRhythm SIEM Platform. You can build customizable dashboards, run and save searches, and leverage AI Engine rules setting alarms and SmartResponse™ automated ac
  • 16
    Forcepoint Behavioral Analytics
    Visibility, analytics, and automated control - converged into a single solution. Eliminate complexity for security analysts with UEBA's automated policy enforcement and comprehensive user risk scoring. Combine DLP with behavioral analytics to gain a 360 degree view of intent and user actions across the enterprise. Leverage out-of-the-box analytics or customize risk models to fit your unique organizational needs. Quickly uncover risk trends in your organization with an at-a-glance view of users ranked by risk. Leverage entire IT ecosystem, including unstructured data sources like chat, for a complete view of users interacting across the enterprise. Understand user intent through deep context driven by big data analytics and machine learning. Unlike traditional UEBA, you can take action on insights to stop breaches ahead of loss. Safeguard your people and your data from insider threats with fast detection and mitigation.
  • 17
    RevealSecurity

    RevealSecurity

    RevealSecurity

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continuously monitor and validate the behavior of human and machine identities to quickly and accurately alert on suspicious activity. Organizations can protect against account takeover attacks, insider threats, and third party/supply chain risk, after the point of login, without the need for creating rules which are noisy, expensive and also require you to know what you are looking for.
  • 18
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 19
    Plurilock AI Cloud

    Plurilock AI Cloud

    Plurilock Security

    Plurilock AI Cloud is a cloud-native single sign-on (SSO), passwordless (FIDO2/webauthn), and cloud access security broker (CASB) platform designed specifically for cloud-centric companies relying on an army of SaaS applications to succeed. With Plurilock AI Cloud, companies enable their employees to sign on once to access all of their applications, and gain extensive, granular control over application and workflow access by device, location, time of day, software versions, groups, and organizational units. Plurilock AI Cloud is part of the Plurilock AI platform, which grows as companies do, with simple expansion paths to full, endpoint-based DLP, and then to true continuous, real-time authentication and user/entity behavior analytics (UEBA) for real-time biometric identity threat detection and response (ITDR). Plurilock AI Cloud is rated top in the industry in customer satisfaction, based on the feedback of actual customers.
    Starting Price: $12/user/year
  • 20
    LinkShadow

    LinkShadow

    LinkShadow

    LinkShadow Network Detection and Response (NDR) ingests network traffic and uses machine learning to detect malicious activity and to understand security risks and exposure. It combines detection for known attack behavior with the ability to recognize what is typical for any given organization, flagging unusual network activity or session that can indicate an attack. Once a malicious activity is detected, LinkShadow NDR responds using third-party integration like firewall, Endpoint Detection and Response (EDR), Network Access Control (NAC) etc. NDR solutions analyze network traffic to detect malicious activity inside the perimeter—otherwise known as the east-west corridor—and support intelligent threat detection, investigation, and response. Using an out-of-band network mirror port, NDR solutions passively capture network communications and apply advanced techniques, including behavioral analytics and machine learning, to identify known and unknown attack patterns.
  • 21
    Oort

    Oort

    Oort

    Oort’s Identity Security Checks discover vulnerabilities across your entire user population (or a segment of it). Trigger notifications related to behavioral anomalies or best practices or policies not being followed. Easily identify inactive, overactive, overprivileged, or unusual behavior to reduce the attack surface and prevent problems before they happen. Drill down into any of your workforce identities and their corresponding activities with a comprehensive view of each user. By compiling data across sources (e.g. IdP, HRIS, etc.), know who the user is, what their existing access policy allows them to do, and their behavior over time using (or not using) that access. Respond to identity threats the right way, by kicking off reviews and remediation in the workflow tools you already use. Open tickets, ask managers, and proactively reach out to users who will be impacted by the response. Delegate IAM hygiene across the business to enforce the least privilege.
  • 22
    BlackFog

    BlackFog

    BlackFog

    Protect your intellectual property and the risks associated with ransomware, industrial espionage and prevent malicious activity from inside your organization. Prevent cyberattacks across all endpoints and monitor data exfiltration from any network to ensure compliance with global privacy and data protection regulations. Prevent data loss and data breaches with BlackFog’s on device data privacy technology. Prevent the unauthorized collection and transmission of user data from every device on and off your network. As the leader in on device ransomware prevention and data privacy, we go beyond managing threats. Rather than focusing on perimeter defense, our preventative approach focuses on blocking data exfiltration from your devices. Our enterprise ransomware prevention and data privacy software stops ransomware from disrupting your organization and dramatically reduces the risk of a data breach. Detailed analytics and impact assessments are available in real time.
    Starting Price: $19.95/year/user
  • 23
    BMC Compuware Application Audit
    BMC Compuware Application Audit enables security and compliance teams to easily capture start-to-finish mainframe user behavior in real time, including all successful logins, session keyboard commands and menu selections, and specific data viewed without making any changes to mainframe applications. Application Audit enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Get deep insight into user behavior including data viewed, by whom, and which applications were used to access it. Deliver the granular intelligence and reporting needed to comply with regulations such as HIPAA, GDPR, the Australian NDB scheme, as well as company security policies. Separate the system administrator’s duties from the responsibilities of auditors with a web UI, so that no single person is in a position to engage in malicious activities without detection.
  • 24
    Dtex Systems

    Dtex Systems

    Dtex Systems

    Take an interactive platform tour to learn how DTEX delivers human behavioral intelligence to enrich SOC workflows and response, augment NGAV with people-centric DLP and forensics, proactively mitigate insider threats and identify operational inefficiencies. Our approach is based on learning from employee behavior, not spying on them. We capture and synthesize hundreds of unique behaviors and automatically zero in on the ones that expose your organization to the greatest risk and inhibit operational excellence. Only DTEX delivers what other solutions promise. DTEX InTERCEPT is a first-of-its-kind Workforce Cyber Security solution that replaces first-generation Insider Threat Management, User Behavior Activity Monitoring, Digital Forensics, Endpoint DLP and Employee Monitoring tools with a lightweight, cloud-native platform that scales to thousands of endpoints and servers in hours with zero impact on user productivity and endpoint performance.
  • 25
    Gurucul

    Gurucul

    Gurucul

    Data science driven security controls to automate advanced threat detection, remediation and response. Gurucul’s Unified Security and Risk Analytics platform answers the question: Is anomalous behavior risky? This is our competitive advantage and why we’re different than everyone else in this space. We don’t waste your time with alerts on anomalous activity that isn’t risky. We use context to determine whether behavior is risky. Context is critical. Telling you what’s happening is not helpful. Telling you when something bad is happening is the Gurucul difference. That’s information you can act on. We put your data to work. We are the only security analytics company that can consume all your data out-of-the-box. We can ingest data from any source – SIEMs, CRMs, electronic medical records, identity and access management systems, end points – you name it, we ingest it into our enterprise risk engine.
  • 26
    Securonix Security Operations and Analytics
    The Securonix Security Operations and Analytics Platform combines log management; user and entity behavior analytics (UEBA); next-generation security information and event management (SIEM); network detection and response (NDR); and security orchestration, automation and response (SOAR) into a complete, end-to-end security operations platform. The Securonix platform delivers unlimited scale, powered by advanced analytics, behavior detection, threat modeling, and machine learning. It increases your security through improved visibility, actionability, and security posture, while reducing management and analyst burden. With native support for thousands of third-party vendors and technology solutions, the Securonix platform simplifies security operations, events, escalations, and remediations. It easily scales from startups to global enterprises while providing the same fast security ROI and ongoing transparent and predictable cost.
  • 27
    OpenText ArcSight Intelligence
    ArcSight Intelligence empowers your security team to preempt elusive attacks. With contextually relevant insights from behavioral analytics, analysts can quickly zoom in on what truly matters in their battles against complex threats such as insider threats and advanced persistent threats (APT). With unsupervised machine learning, ArcSight Intelligence measures “unique normal”—a digital fingerprint of each user or entity in your organization, which can be continuously compared to itself or peers. This approach to behavioral analytics enables your security teams to detect traditionally difficult-to-find threats, such as insider threats and APTs. The more context your team has, the faster they can mitigate a security incident. ArcSight Intelligence provides a contextualized view of the riskiest behaviors in your enterprise with supercharged UEBA and gives your SOC team the right tools to visualize and investigate threats before it’s too late.
  • 28
    Moonsense

    Moonsense

    Moonsense

    Moonsense helps customers detect the most sophisticated fraud schemes by providing immediate access to actionable signals and underlying granular source data for enhancing fraud detection without creating additional user friction. User behavior and user network intelligence are the building blocks required to reveal the user's unique digital body language, similar to an individual's fingerprint. In a world where data breaches are common, the user's digital body language is uniquely capable of detecting the most challenging fraud typologies without adding user friction. Identity theft is one of the most common fraud types. During account creation, there is an expected pattern of behavior. By analyzing the user's digital body language, you can flag accounts that are different from what's normal. Moonsense is on a mission to level the playing field in the fight against online fraud. One integration unlocks access to both user behavior and user network intelligence.
  • 29
    Falcon Identity Threat Detection
    Falcon Identity Threat Detection lets you see all Service and Privileged accounts on your network and cloud with full credential profiles and weak authentication discovery across every domain. Analyze every domain in your organization for potential vulnerability from stale credentials, and weak or stale passwords, see all service connections and weak authentication protocols in use. Falcon Identity Threat Detection monitors the domain controllers on-premises or in the cloud (via API) to see all authentication traffic. It creates a baseline for all entities and compares behavior against unusual lateral movement, Golden Ticket attacks, Mimikatz traffic patterns and other related threats. It can help you see Escalation of Privilege and anomalous Service Account activity. Falcon Identity Threat Detection reduces the time to detect by viewing live authentication traffic, which expedites finding and resolving incidents.
  • 30
    Rapid7 InsightIDR
    With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.
  • 31
    SecureIdentity IRAD
    The SecureIdentity Platform allows organizations to provide verifiable trust in every activity they perform. By providing the identity of the user, the device and the data they are working on you can prove exactly who is doing what at any time. SecurEnvoy partners with leading technology platforms and companies to deliver the highest level of security and peace of mind. We have numerous pre-built integrations with many popular business applications and solutions. Read more about specific integrations or contact our technical team to discuss your specific needs. Built upon artificial intelligence, SecureIdentity IRAD evaluates the user as an ongoing process and will detect any unusual activity or interaction in the user’s actions. This provides real time detailed analysis of the user interaction and allows risks.
  • 32
    XTN Cognitive Security Platform
    The Cognitive Security Platform® (CSP) is a threat and omnichannel fraud protection solution designed to defend digital businesses, to minimize the risks associated with the provision of digital financial services (home banking and digital payments), and avoid any impact on user experience. We provide a fully packaged, out-of-the-box solution that is digital-ready and can be deployed at lightning-fast speed. Cognitive Security Platform®’s modularity lets you personally activate the functions you need to make your digital business safer. AI proprietary algorithms combined with behavioral biometrics and behavioral analysis provide a frictionless end-user experience while guaranteeing the highest level of security. We also allow you to implement anti-fraud strategies by protecting different channels. The omnichannel view lets you manage all fraud that could affect separate channels from a single console, avoiding vertical management.
  • 33
    Digital Resolve

    Digital Resolve

    Digital Resolve

    Online Security and Fraud Protection through Real-time Identity Intelligence, Authentication, and Access Control. Proactively secure online accounts, information, transactions and interactions from login to logout. The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment. The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.
  • 34
    BlackBerry Persona
    BlackBerry® Persona uses machine learning (ML) and predictive artificial intelligence (AI) to dynamically adapt security policy based on user location, device type and other factors to protect against human error and well-intentioned workarounds. Continuous authentication leverages passive biometrics and other usage-based patterns to unobtrusively verify user identity. Malicious users are automatically blocked from accessing apps when they exhibit anomalous behavior. Relaxes security policies when an end user is in a trusted location and dynamically adjusts when they travel to a higher-risk location. Adapts device security to local regulatory requirements as an employee travels from one country to another. Streamlined access to apps and services without having to re-authenticate when in trusted locations.
  • 35
    Moesif

    Moesif

    Moesif

    Powerful user behavior API analytics to help you understand customer API usage and create great experiences. Debug issues quickly with high-cardinality API logs. Drill down by API parameters, body fields, customer attributes, and more. Deeply understand who is using your APIs, how they are used, and payloads their sending. Pinpoint where customers drop off in your funnel and see how to optimize your product strategy. Automatically email customers approaching rate limits, using deprecated APIs, and more based on behavior. Understand how developers adopt your APIs. Measure and improve funnel metrics like activation rate and Time to First Hello World (TTFHW). Segment developers by demographic info, marketing attribution SDK used, and more to discover what best improve your north star metrics metrics and focus on the activities that matter.
    Starting Price: $85 per month
  • 36
    Haystax

    Haystax

    Haystax Technology

    Our platform analytically monitors threats and prioritizes risk — enabling leaders and operators to act with confidence when it matters most. Instead of starting with a massive pool of data and then mining it for usable threat intelligence, we first build a system for transforming human expertise into models that can evaluate complex security problems. With further analytics we can then automatically score the highest-priority threat signals and rapidly deliver them to the right people at the right time. We have also built a tightly integrated ‘ecosystem’ of web and mobile apps to enable our users to manage their critical assets and incident responses. The result is our on-premises or cloud-based Haystax Analytics Platform for early threat detection, situational awareness and information sharing. Read on to learn more!
  • 37
    ARCON | UBA
    The ARCON | UBA self-learning solution builds baseline behavioral profiles for your end users and triggers real-time alerts if it detects anomalous behavior, reducing insider threats exponentially. The ARCON | UBA tool creates a ring fence around all the endpoints of your IT infrastructure and helps you monitor it from a single command center, making sure that no end user is left unattended at any point. The AI-powered solution creates baseline profiles for each of your users and alerts you every time an end user deviates from their normal behavioral patterns, helping you thwart insider threats in time. Implement controlled and secure access to business-critical applications.
  • 38
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 39
    SearchInform ProfileCenter
    ProfileCenter is the tool that helps to highlight employees' strengths, detect criminal propensity and manage the team more efficiently. The tool discloses fraudulent activity, enhance personnel management techniques, helps to increase productivity and assess risks caused by personality traits that can harm colleagues or a company.
  • 40
    Cysiv

    Cysiv

    Cysiv

    Cysiv’s next-gen, co-managed SIEM addresses the limitations and frustrations associated with traditional SIEMs and other products used in a SOC. Our cloud-native platform automates and improves critical processes for truly effective threat detection, hunting, investigation and response. Cysiv Command combines essential technologies for a modern SOC into a comprehensive, unified, cloud-native platform and is the foundation for SOC-as-a-Service. Most telemetry can be pulled from APIs or sent securely to Cysiv Command over the internet. For older sources, such as logs over Syslog UDP, Cysiv Connector provides an encrypted conduit for passing all required telemetry from your environment to the Cysiv platform. Cysiv’s threat detection engine applies a blend of detection techniques that leverage signatures, threat intelligence, user behavior, statistics, and machine learning to automatically identify potential threats and ensures analysts focus on the most critical detections first.
  • 41
    Exabeam

    Exabeam

    Exabeam

    Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products. Out-of-the-box use case coverage repeatedly delivers successful outcomes. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find.
  • 42
    Prisma SaaS

    Prisma SaaS

    Palo Alto Networks

    Tomorrow's enterprise runs on data and applications. Unsanctioned SaaS apps can expose sensitive data and propagate malware, and even sanctioned SaaS adoption can increase the risk of data exposure, breaches and noncompliance. By offering advanced data protection and consistency across applications, Prisma SaaS reins in the risks. It addresses your cloud access security broker needs and provides advanced capabilities in risk discovery, data loss prevention, compliance assurance, data governance, user behavior monitoring and advanced threat prevention. Prisma SaaS provides unparalleled visibility and precise control of SaaS applications using an extensive library of application signatures. Easy-to-navigate dashboards and detailed reporting rein in shadow IT risk.
  • 43
    Rezonate

    Rezonate

    Rezonate

    Rezonate detects and auto-remediates access configurations, risky activities, and weak security practices from build time to real-time, across your identity providers and IaaS for a complete identity risk reduction. Rezonate continuously synthesizes the data all your cloud applications, resources as well as your human and machine identities. The single, identity storyline it provides gives you a panoramic view of all your identity and access risk. Rezonate’s Identity Storyline goes beyond traditional overloaded graph views to tell you the story behind each identity, exposure and threat, so you can confidently pinpoint, prioritize and act to eliminate access risks. For every risk detected, exposure or an active threat, Identity Storyline tells how it came to be and what havoc it might wreak. Go beyond periodic configuration scans and unlock real-time view of every change and every activity across your cloud identity attack surface.
  • 44
    e-Safe Compliance

    e-Safe Compliance

    e-Safe Systems

    We offer a quick, yet comprehensive assessment to identify and measure risky user actions and offer suggestions on how they can be plugged before they cause damage. e-Safe Compliance is a purpose-built compliance solution that covers all the criteria of major regulations to make sure that your company is completely safe. Traditional DLP relies rigid blocking schemes, which hinder productivity. e-Safe’s People-Centric DLP implements a protection regime based on education, trust, and verification, while ensuring key information remains secure using multi-level encryption. Malicious user actions are detected using machine learning user behaviour analytics, and detection time is greatly reduced by empowering the information owners themselves to be part of the monitoring process. It has been shown time and time again that the biggest threat to the security of sensitive data is human error.
  • 45
    Appgate

    Appgate

    Appgate

    Bringing together a set of differentiated cloud- and hybrid-ready security and analytics products and services. Today, Appgate secures more than 1,000 organizations across 40 countries. A Focused Approach to Zero Trust. Distributed, on-demand IT created a security problem. With more assets to defend and more complexity to overcome, security leaders are stuck solving today’s problems with yesterday’s solutions. Become a smaller target, making resources invisible and resilient to threat actors. Adopt an identity-centric, Zero Trust mindset that factors in context before granting access. Proactively detect and remove internal and external threats targeting your organization. Global enterprises and government agencies trust our industry-leading, proven secure access solutions. Strengthen and simplify network security with the most comprehensive, feature-rich ZTNA solution available. Reduce risk while providing consumers with seamless, secure network access to your digital services.
  • 46
    IBM Security QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 47
    Microsoft Defender for Identity
    Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. Helps eliminate on-premises vulnerabilities to prevent attacks before they happen. Helps Security Operations teams use their time effectively by understanding the greatest threats. Helps Security Operations by prioritizing information so they focus on real threats, not false signals. Get cloud-powered insights and intelligence in each stage of the attack lifecycle with Microsoft Defender for Identity. Help Security Operations identify configuration vulnerabilities and get recommendations for resolving them with Microsoft Defender for Identity. Identity security posture management assessments are integrated directly with Secure Score for visibility. Prioritize the riskiest users in your organization using a user investigation priority score based on observed risky behavior and number of prior incidents.
  • 48
    Cyber Hawk

    Cyber Hawk

    RapidFire Tool

    Security is top of mind for just about everyone today. But offering sophisticated security solutions usually requires a substantial investment in additional technologies and headcount. So most MSPs settle for the same basic security offerings — firewall, anti-virus, spam filter. What if you could offer a security service that lets you stand out from the pack, is easy to deploy, and makes you money too? Cyber Hawk is your enabling technology for offering high value cybersecurity services. A Cyber Hawk subscription gets you an unlimited-use license to deploy Cyber Hawk at all of your client sites for one, low, fixed cost per year (see license terms for details). Once deployed, Cyber Hawk scans a network, detects security threats, and alerts various stakeholders. Cyber Hawk will help you identify new security projects, differentiate your services from the competition, and create “stickiness”.
  • 49
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • 50
    cux.io

    cux.io

    cux.io

    CUX is a Digital Experience Analytics tool, helping companies save up to 5x time on analytics and drawing valuable conclusions. We eliminate data overload with a laser focus on user problems, frustrations, and all bottlenecks that can prevent them from using online channels to buy product and services. CUX is a comprehensive, user-focused analytics tool that provides instant behavioral insights. ✔ Goal-oriented Analytics: CUX automatically selects ONLY the data that is relevant to individual business goals. ✔ Qualitative and Quantitative Assessments provided by one tool. ✔ Knowledge: We support users with trainings, onboarding, mentoring, audits and monthly recommendations. ✔ AIocado: our very own AI-analytics concierge will show you precisely the reasons for your conversion drops, places of users' frustration, recommendations and more. We cooperate with the Innovation, Marketing, Product, and E-com departments within the companies.
    Starting Price: €79 per month