+
+

Related Products

  • Safetica
    358 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    430 Ratings
    Visit Website
  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    162 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • c/side
    14 Ratings
    Visit Website
  • Hoxhunt
    4,474 Ratings
    Visit Website
  • NINJIO
    390 Ratings
    Visit Website
  • Synchredible
    12 Ratings
    Visit Website
  • ManageEngine Log360
    96 Ratings
    Visit Website

About

Flag suspicious files and user activities that indicate sufficient risk for intervention by business management. This user and entity behavior analytics (UEBA) solution applies sophisticated rule-based modeling to data sources to establish normal patterns of behavior and help determine suspicious activities. Analysis can reduce the possibility of insider threats since they are difficult to detect due to privileged users having specific knowledge of security controls and methods to bypass them. Detect event anomalies, such as logins with user IDs of former employees, a given user logging in from multiple locations simultaneously, or unauthorized users retaining an excessive number of sensitive files. Monitor file-based risks, such as unauthorized users’ attempts to decrypt confidential files. Monitor user-based risks, such as decrypting files more frequently than usual, printing more files than usual after regular business hours, or sending files to external recipients more than usual.

About

Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies in need of a tool to detect event anomalies, monitor risks, and manage threats

Audience

Companies and enterprises interested in a software solution to secure their data against unknown threats through entity behavior analytics

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Fasoo
United States
en.fasoo.com/products/fasoo-riskview/

Company Information

Splunk
Founded: 2003
United States
www.splunk.com/en_us/software/user-behavior-analytics.html

Alternatives

FortiInsight

FortiInsight

Fortinet

Alternatives

FortiInsight

FortiInsight

Fortinet
ObserveIT

ObserveIT

Proofpoint

Categories

Categories

Integrations

Accenture Cloud Trade Promotion Management
Amazon
Amazon Athena
Amazon Attribution
Amazon Augmented AI (A2I)
Amazon SageMaker
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Cisco Spaces
Eviden MDR Service
Hurricane for AutoCAD
Infigo
Peromnes
SAP Access Control
SAP Ariba
SAP Ariba Spend Analysis
Splunk On-Call

Integrations

Accenture Cloud Trade Promotion Management
Amazon
Amazon Athena
Amazon Attribution
Amazon Augmented AI (A2I)
Amazon SageMaker
Amazon Simple Notification Service (SNS)
Amazon Web Services (AWS)
Cisco Spaces
Eviden MDR Service
Hurricane for AutoCAD
Infigo
Peromnes
SAP Access Control
SAP Ariba
SAP Ariba Spend Analysis
Splunk On-Call
Claim Fasoo RiskView and update features and information
Claim Fasoo RiskView and update features and information
Claim Splunk User Behavior Analytics and update features and information
Claim Splunk User Behavior Analytics and update features and information