Best Cloud Security Monitoring and Analytics Software - Page 4

LW
Researched and written by Lauren Worth

Cloud security monitoring and analytics solutions are tools used to improve visibility and security monitoring across networks and cloud-based applications. The software can be used to monitor cloud-based applications, virtualized environments, and/or other cloud infrastructure. Furthermore, cloud security and analytics tools are used to identify potential risks and root them out to avoid impacting business-critical functions and prevent compliance violations and fines.

Cloud monitoring and analytics are typically performed by IT and security staff on a continual basis. Monitoring features help companies build an inventory of cloud assets and discover new ones as they are created or connected. Analytics features typically assist with examining risks associated with cloud environments, helping companies prioritize issues in order of impact. Other common features include user monitoring, sensitive data discovery, and security policy enforcement.

There is some overlap between cloud security monitoring and analytics software and user and entity behavioral analysis (UEBA) software. Both tools are designed to discover abnormalities and monitor user behavior, but UEBA solutions may be used either within the cloud or on premises and provide fewer overall security analysis features.

To qualify for inclusion in the Cloud Security Monitoring and Analytics category, a product must:

Monitor files and data for activity and compliance
Report on user activity and cloud security risks
Detect abnormal behavior and/or anomalies to alert security teams

Best Cloud Security Monitoring and Analytics Software At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Most Trending:
Show LessShow More
Best Contender:
Most Niche:
Most Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
75 Listings in Cloud Security Monitoring and Analytics Available
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiCWP features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,964 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,397 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
FortiCWP features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,964 Twitter followers
LinkedIn® Page
www.linkedin.com
14,397 employees on LinkedIn®
Ownership
NASDAQ: FTNT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hillstone CloudView is a cloud-based security management and analytics platform which provides SaaS security services across the Hillstone E-Series Next-Generation Firewalls (NGFW), T-Series Intellige

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hillstone CloudView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Santa Clara, CA
    Twitter
    @Hillstone_Net
    10,272 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    357 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hillstone CloudView is a cloud-based security management and analytics platform which provides SaaS security services across the Hillstone E-Series Next-Generation Firewalls (NGFW), T-Series Intellige

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Hillstone CloudView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2006
HQ Location
Santa Clara, CA
Twitter
@Hillstone_Net
10,272 Twitter followers
LinkedIn® Page
www.linkedin.com
357 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Security Open Data Platform is a continuous security monitoring open data platform that enriches data in real time, ingesting and coordinating data from any source, anywhere, seamlessly. A futur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Security Open Data Platform (SODP) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    7.5
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,879 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,114 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

The Security Open Data Platform is a continuous security monitoring open data platform that enriches data in real time, ingesting and coordinating data from any source, anywhere, seamlessly. A futur

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
OpenText Security Open Data Platform (SODP) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
7.5
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,879 Twitter followers
LinkedIn® Page
www.linkedin.com
22,114 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 76% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Semperis Directory Services Protector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Features
    7
    Alerts
    5
    Customer Support
    5
    Monitoring
    5
    Cons
    Poor Reporting
    3
    Communication Issues
    2
    Complex Setup
    2
    Data Inconsistency
    2
    Deployment Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Directory Services Protector features and usability ratings that predict user satisfaction
    4.2
    Security Integration
    Average: 8.5
    6.7
    Activity Monitoring
    Average: 8.5
    9.7
    Has the product been a good partner in doing business?
    Average: 9.1
    7.5
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Company Website
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,120 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    472 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous reme

Users
No information available
Industries
No information available
Market Segment
  • 76% Enterprise
  • 24% Mid-Market
Semperis Directory Services Protector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Features
7
Alerts
5
Customer Support
5
Monitoring
5
Cons
Poor Reporting
3
Communication Issues
2
Complex Setup
2
Data Inconsistency
2
Deployment Issues
2
Semperis Directory Services Protector features and usability ratings that predict user satisfaction
4.2
Security Integration
Average: 8.5
6.7
Activity Monitoring
Average: 8.5
9.7
Has the product been a good partner in doing business?
Average: 9.1
7.5
Security Automation
Average: 8.6
Seller Details
Seller
Semperis
Company Website
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,120 Twitter followers
LinkedIn® Page
www.linkedin.com
472 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skyhigh Cloud-Native Application Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Cloud Security
    1
    Communication
    1
    Comprehensive Security
    1
    Cost Efficiency
    1
    Cons
    Cloud Dependency
    1
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Complex Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skyhigh Cloud-Native Application Protection Platform features and usability ratings that predict user satisfaction
    9.2
    Security Integration
    Average: 8.5
    7.5
    Activity Monitoring
    Average: 8.5
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    9.2
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, CA
    Twitter
    @skyhighsecurity
    17,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    611 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Skyhigh Cloud Native Application Protection Platform CNAPP is the industry’s first platform to extend Cloud Access Security Broker CASB, bringing application and data context to converge Cloud Securit

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Skyhigh Cloud-Native Application Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Cloud Security
1
Communication
1
Comprehensive Security
1
Cost Efficiency
1
Cons
Cloud Dependency
1
Complex Configuration
1
Complexity
1
Complex Setup
1
Complex Usability
1
Skyhigh Cloud-Native Application Protection Platform features and usability ratings that predict user satisfaction
9.2
Security Integration
Average: 8.5
7.5
Activity Monitoring
Average: 8.5
10.0
Has the product been a good partner in doing business?
Average: 9.1
9.2
Security Automation
Average: 8.6
Seller Details
HQ Location
San Jose, CA
Twitter
@skyhighsecurity
17,998 Twitter followers
LinkedIn® Page
www.linkedin.com
611 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Identity Exposure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Detection Efficiency
    1
    Ease of Use
    1
    Incident Management
    1
    Monitoring Efficiency
    1
    Cons
    Expensive
    1
    Poor Interface
    1
    Poor UI Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Identity Exposure features and usability ratings that predict user satisfaction
    10.0
    Security Integration
    Average: 8.5
    8.3
    Activity Monitoring
    Average: 8.5
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,127 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Tenable Identity Exposure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Detection Efficiency
1
Ease of Use
1
Incident Management
1
Monitoring Efficiency
1
Cons
Expensive
1
Poor Interface
1
Poor UI Design
1
Tenable Identity Exposure features and usability ratings that predict user satisfaction
10.0
Security Integration
Average: 8.5
8.3
Activity Monitoring
Average: 8.5
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Security Automation
Average: 8.6
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,127 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatKey Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Time-saving
    2
    Automation
    1
    Compliance Support
    1
    Deployment Ease
    1
    Detection Efficiency
    1
    Cons
    Alert Issues
    1
    Improvement Needed
    1
    Inadequate Reporting
    1
    Inadequate Security
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatKey features and usability ratings that predict user satisfaction
    7.5
    Security Integration
    Average: 8.5
    10.0
    Activity Monitoring
    Average: 8.5
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    7.5
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatKey
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatKey Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Time-saving
2
Automation
1
Compliance Support
1
Deployment Ease
1
Detection Efficiency
1
Cons
Alert Issues
1
Improvement Needed
1
Inadequate Reporting
1
Inadequate Security
1
Ineffective Alerts
1
ThreatKey features and usability ratings that predict user satisfaction
7.5
Security Integration
Average: 8.5
10.0
Activity Monitoring
Average: 8.5
8.3
Has the product been a good partner in doing business?
Average: 9.1
7.5
Security Automation
Average: 8.6
Seller Details
Seller
ThreatKey
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Atmosec takes a holistic approach to securing your ever evolving SaaS ecosystem. Focusing not only on individual services or specific users, Atmosec also understands how different services communica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Atmosec Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Security
    1
    Security Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Atmosec features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atmosec
    Twitter
    @Atmosec_
    61 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Atmosec takes a holistic approach to securing your ever evolving SaaS ecosystem. Focusing not only on individual services or specific users, Atmosec also understands how different services communica

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Atmosec Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Security
1
Security Features
1
Cons
This product has not yet received any negative sentiments.
Atmosec features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Atmosec
Twitter
@Atmosec_
61 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Secure Endpoint Private Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Implementation
    1
    Ease of Use
    1
    Features
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Secure Endpoint Private Cloud features and usability ratings that predict user satisfaction
    8.3
    Security Integration
    Average: 8.5
    10.0
    Activity Monitoring
    Average: 8.5
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    10.0
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    732,001 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Adaptive Wireless Intrusion Prevention System (IPS) offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks. Fu

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Cisco Secure Endpoint Private Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Implementation
1
Ease of Use
1
Features
1
Cons
This product has not yet received any negative sentiments.
Cisco Secure Endpoint Private Cloud features and usability ratings that predict user satisfaction
8.3
Security Integration
Average: 8.5
10.0
Activity Monitoring
Average: 8.5
8.3
Has the product been a good partner in doing business?
Average: 9.1
10.0
Security Automation
Average: 8.6
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
732,001 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
    10.0
    Security Integration
    Average: 8.5
    8.3
    Activity Monitoring
    Average: 8.5
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    8.3
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    15,075 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,049 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

IT solution providers are the first—and often only—line of defense for every kind of business in every part of the world. Whether managing mom-and-pop businesses or high-profile clients, providing pre

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectWise Cybersecurity Management – Network features and usability ratings that predict user satisfaction
10.0
Security Integration
Average: 8.5
8.3
Activity Monitoring
Average: 8.5
10.0
Has the product been a good partner in doing business?
Average: 9.1
8.3
Security Automation
Average: 8.6
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
15,075 Twitter followers
LinkedIn® Page
www.linkedin.com
3,049 employees on LinkedIn®
Phone
800-671-6898
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gauntlet mitigates risks like security breaches, data theft, and compliance violations with Generative AI (GenAI), enhancing efficiency by accelerating time-to-fix by 60%. Its core pillars include Clo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gauntlet Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Success
    1
    Remediation Guidance
    1
    Reporting
    1
    Cons
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gauntlet features and usability ratings that predict user satisfaction
    8.3
    Security Integration
    Average: 8.5
    5.0
    Activity Monitoring
    Average: 8.5
    0.0
    No information available
    8.3
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
Product Description
How are these determined?Information
This description is provided by the seller.

Gauntlet mitigates risks like security breaches, data theft, and compliance violations with Generative AI (GenAI), enhancing efficiency by accelerating time-to-fix by 60%. Its core pillars include Clo

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Gauntlet Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Success
1
Remediation Guidance
1
Reporting
1
Cons
Inefficient Alert System
1
Gauntlet features and usability ratings that predict user satisfaction
8.3
Security Integration
Average: 8.5
5.0
Activity Monitoring
Average: 8.5
0.0
No information available
8.3
Security Automation
Average: 8.6
Seller Details
HQ Location
N/A
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Gurucul Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    Alerts
    1
    Dashboard Design
    1
    Dashboard Usability
    1
    Data Protection
    1
    Cons
    Alert Management
    1
    Cloud Dependency
    1
    Complex Parsing
    1
    Deployment Difficulties
    1
    Ineffective Alerts
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Gurucul features and usability ratings that predict user satisfaction
    5.0
    Security Integration
    Average: 8.5
    6.7
    Activity Monitoring
    Average: 8.5
    10.0
    Has the product been a good partner in doing business?
    Average: 9.1
    6.7
    Security Automation
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Gurucul
    HQ Location
    El Segundo, CA
    Twitter
    @Gurucul
    1,309 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Gurucul Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
Alerts
1
Dashboard Design
1
Dashboard Usability
1
Data Protection
1
Cons
Alert Management
1
Cloud Dependency
1
Complex Parsing
1
Deployment Difficulties
1
Ineffective Alerts
1
Gurucul features and usability ratings that predict user satisfaction
5.0
Security Integration
Average: 8.5
6.7
Activity Monitoring
Average: 8.5
10.0
Has the product been a good partner in doing business?
Average: 9.1
6.7
Security Automation
Average: 8.6
Seller Details
Seller
Gurucul
HQ Location
El Segundo, CA
Twitter
@Gurucul
1,309 Twitter followers
(12)4.3 out of 5
View top Consulting Services for Microsoft Security Copilot
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Security Copilot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    5
    Security Protection
    5
    Threat Detection
    5
    Automation
    4
    Cons
    Complexity
    3
    Expensive
    3
    Difficult Learning Curve
    2
    False Positives
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Security Copilot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    7.2
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,060,258 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your defenders to detect hidden patterns, harden defenses, and respond to incidents faster with generative AI

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 17% Mid-Market
Microsoft Security Copilot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
5
Security Protection
5
Threat Detection
5
Automation
4
Cons
Complexity
3
Expensive
3
Difficult Learning Curve
2
False Positives
2
Access Control
1
Microsoft Security Copilot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
7.2
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,060,258 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fully automated security marketplace to help digital businesses protect against cyber threats and data loss. Companies are now highly dependent on their digital environment for critical business func

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saasment SaaS Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Has the product been a good partner in doing business?
    Average: 9.1
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Saasment
Product Description
How are these determined?Information
This description is provided by the seller.

Fully automated security marketplace to help digital businesses protect against cyber threats and data loss. Companies are now highly dependent on their digital environment for critical business func

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Saasment SaaS Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Has the product been a good partner in doing business?
Average: 9.1
0.0
No information available
Seller Details
Seller
Saasment
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anomali features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANOMALI
    Year Founded
    2013
    HQ Location
    Redwood City, CA
    Twitter
    @Anomali
    8,867 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Anomali aggregates threat intelligence under one platform, providing an integrated set of tools to support fast, efficient investigations, and delivering “operationalized” threat intelligence into sec

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Anomali features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ANOMALI
Year Founded
2013
HQ Location
Redwood City, CA
Twitter
@Anomali
8,867 Twitter followers
LinkedIn® Page
www.linkedin.com
317 employees on LinkedIn®