+
+

Related Products

  • Cynet All-in-One Cybersecurity Platform
    374 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    430 Ratings
    Visit Website
  • Blumira
    131 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    162 Ratings
    Visit Website
  • Safetica
    358 Ratings
    Visit Website
  • ConnectWise SIEM
    188 Ratings
    Visit Website
  • ManageEngine Log360
    96 Ratings
    Visit Website
  • PathSolutions TotalView
    42 Ratings
    Visit Website
  • Auvik
    659 Ratings
    Visit Website
  • Site24x7
    750 Ratings
    Visit Website

About

With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.

About

Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams

Audience

Companies and enterprises interested in a software solution to secure their data against unknown threats through entity behavior analytics

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Rapid7
Founded: 2000
United States
www.rapid7.com

Company Information

Splunk
Founded: 2003
United States
www.splunk.com/en_us/software/user-behavior-analytics.html

Alternatives

Alternatives

FortiInsight

FortiInsight

Fortinet
Alert Logic

Alert Logic

Fortra
Arctic Wolf

Arctic Wolf

Arctic Wolf Networks

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

Amazon
Amazon Chime
Amazon S3
Amazon Simple Notification Service (SNS)
Carbon Black EDR
Cisco AnyConnect
Cisco Cloudlock
Cisco Nexus Dashboard Fabric Controller
CnSight
Eviden MDR Service
Google Cloud Platform
Hurricane for AutoCAD
PassiveTotal
Proofpoint Adaptive Email Security
SAP Ariba Strategic Sourcing
SAP Ariba Supply Chain Collaboration
Squadcast
The Respond Analyst

Integrations

Amazon
Amazon Chime
Amazon S3
Amazon Simple Notification Service (SNS)
Carbon Black EDR
Cisco AnyConnect
Cisco Cloudlock
Cisco Nexus Dashboard Fabric Controller
CnSight
Eviden MDR Service
Google Cloud Platform
Hurricane for AutoCAD
PassiveTotal
Proofpoint Adaptive Email Security
SAP Ariba Strategic Sourcing
SAP Ariba Supply Chain Collaboration
Squadcast
The Respond Analyst
Claim Rapid7 InsightIDR and update features and information
Claim Rapid7 InsightIDR and update features and information
Claim Splunk User Behavior Analytics and update features and information
Claim Splunk User Behavior Analytics and update features and information