Best Software for 2025 is now live!
|| products.size

Best Insider Threat Management (ITM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Insider Threat Management (ITM) software is a user activity monitoring software that helps companies prevent internal users from taking malicious or negligent actions within systems, such as accessing, copying, removing, tampering with, or destroying company data or other assets without permission. Companies use ITM software to monitor and record the actions of internal system users on their endpoints, such current and former employees, contractors, business partners, and other permissioned individuals, in order to protect company assets, such as customer data or intellectual property. ITM software is used by IT or security professionals. ITM software provides a critical role in a company's overall security strategy, as security tools that focus on external threats to systems or networks are often not able to detect the nuanced threats of internal, permissioned users.

ITM software often integrates with identity and access managment (IAM) software tools to pull internal user data. ITM tools also often integrate with security information and event mangement (SIEM) software tools and other threat analytics systems to centralize security operations into a single location. Many ITM software soltuions have functionality which overlaps with privileged access management (PAM) software, data loss prevention (DLP) software and user and entity behavior analystics (UEBA) software, however these tools have different uses. PAM is used to monitor the actions of privileged users. DLP tools detect sensitive data leaks. UEBA software uses machine learning to detect anomolies from benchmark useage; this is different from ITM software which utilizes endpoint sensors and contexutal user data to uncover insider threat risks.

To qualify for inclusion in the Insider Threat Management category, a product must:

Monitor user endpoints and trigger alerts when insider threat actions are taken
Detect data movement to external USBs or external drives or uploaded to cloud storage or emails, excessive printer-usage, and copy/cut/paste keystroke usage on user endpoints
Provide session video recording, screen captures, and keystroke logging as evidence of malicious or negligent action

Best Insider Threat Management (ITM) Software At A Glance

Best for Small Businesses:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
41 Listings in Insider Threat Management (ITM) Available
(48)4.3 out of 5
10th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As the leading people-centric Insider Threat Management solution, Proofpoint ITM and Endpoint DLP protects against endpoint-based data loss, malicious acts, and brand damage involving insiders acting

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Information Technology and Services
    Market Segment
    • 69% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Insider Threat Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    6
    Ease of Use
    6
    User Monitoring
    5
    Employee Monitoring
    4
    Security
    4
    Cons
    Limited Features
    4
    Expensive
    2
    False Positives
    2
    Poor Customer Support
    2
    Poor Documentation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Insider Threat Management features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.6
    8.4
    Ease of Admin
    Average: 8.3
    8.1
    Ease of Setup
    Average: 8.2
    8.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    30,844 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,697 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

As the leading people-centric Insider Threat Management solution, Proofpoint ITM and Endpoint DLP protects against endpoint-based data loss, malicious acts, and brand damage involving insiders acting

Users
No information available
Industries
  • Hospital & Health Care
  • Information Technology and Services
Market Segment
  • 69% Enterprise
  • 29% Mid-Market
Proofpoint Insider Threat Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
6
Ease of Use
6
User Monitoring
5
Employee Monitoring
4
Security
4
Cons
Limited Features
4
Expensive
2
False Positives
2
Poor Customer Support
2
Poor Documentation
2
Proofpoint Insider Threat Management features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.6
8.4
Ease of Admin
Average: 8.3
8.1
Ease of Setup
Average: 8.2
8.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
30,844 Twitter followers
LinkedIn® Page
www.linkedin.com
4,697 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(153)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Safetica is a data loss prevention (DLP) solution that helps protect sensitive data, monitor user activities, and prevent data leaks.
    • Reviewers like the intuitive interface, wide range of functions, effective protection against data leakage, user behavior monitoring, immediate response to dangerous incidents, and very readable reports.
    • Reviewers experienced difficulties with complex setup for larger organizations, occasional performance impact on endpoint devices, time-consuming fine-tuning policies, lack of full compatibility with some new Microsoft applications, and disturbances from notifications to the end user.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Safetica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    27
    Security
    23
    Data Protection
    21
    Features
    19
    Implementation Ease
    14
    Cons
    Lack of Linux Support
    10
    Limited Compatibility
    9
    Limited Features
    8
    Limited OS Support
    7
    Compatibility Issues
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safetica features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.6
    8.7
    Ease of Admin
    Average: 8.3
    8.7
    Ease of Setup
    Average: 8.2
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safetica
    Company Website
    Year Founded
    2007
    HQ Location
    San Jose, California, United States
    Twitter
    @Safetica
    669 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Safetica is a data loss prevention (DLP) solution that helps protect sensitive data, monitor user activities, and prevent data leaks.
  • Reviewers like the intuitive interface, wide range of functions, effective protection against data leakage, user behavior monitoring, immediate response to dangerous incidents, and very readable reports.
  • Reviewers experienced difficulties with complex setup for larger organizations, occasional performance impact on endpoint devices, time-consuming fine-tuning policies, lack of full compatibility with some new Microsoft applications, and disturbances from notifications to the end user.
Safetica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
27
Security
23
Data Protection
21
Features
19
Implementation Ease
14
Cons
Lack of Linux Support
10
Limited Compatibility
9
Limited Features
8
Limited OS Support
7
Compatibility Issues
6
Safetica features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.6
8.7
Ease of Admin
Average: 8.3
8.7
Ease of Setup
Average: 8.2
9.0
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Safetica
Company Website
Year Founded
2007
HQ Location
San Jose, California, United States
Twitter
@Safetica
669 Twitter followers
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(137)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:$15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 58% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teramind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Employee Monitoring
    18
    Monitoring
    18
    Ease of Use
    17
    Productivity Management
    13
    Productivity Improvement
    11
    Cons
    Software Issues
    8
    Expensive
    5
    Software Malfunction
    5
    Poor Customer Support
    4
    Connectivity Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teramind features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.6
    8.8
    Ease of Admin
    Average: 8.3
    8.9
    Ease of Setup
    Average: 8.2
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teramind
    Company Website
    Year Founded
    2014
    HQ Location
    Aventura, FL
    Twitter
    @teramindco
    818 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    142 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 58% Small-Business
  • 35% Mid-Market
Teramind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Employee Monitoring
18
Monitoring
18
Ease of Use
17
Productivity Management
13
Productivity Improvement
11
Cons
Software Issues
8
Expensive
5
Software Malfunction
5
Poor Customer Support
4
Connectivity Issues
3
Teramind features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.6
8.8
Ease of Admin
Average: 8.3
8.9
Ease of Setup
Average: 8.2
8.9
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Teramind
Company Website
Year Founded
2014
HQ Location
Aventura, FL
Twitter
@teramindco
818 Twitter followers
LinkedIn® Page
www.linkedin.com
142 employees on LinkedIn®
(41)4.5 out of 5
9th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 85% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    10
    Data Classification
    9
    Ease of Use
    9
    Data Discovery
    8
    Security
    8
    Cons
    Expensive
    4
    Limitations
    4
    Complexity
    3
    Inefficiency
    3
    Management Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.6
    8.3
    Ease of Admin
    Average: 8.3
    7.7
    Ease of Setup
    Average: 8.2
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,289 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,435 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
Market Segment
  • 85% Enterprise
  • 27% Mid-Market
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
10
Data Classification
9
Ease of Use
9
Data Discovery
8
Security
8
Cons
Expensive
4
Limitations
4
Complexity
3
Inefficiency
3
Management Issues
3
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.6
8.3
Ease of Admin
Average: 8.3
7.7
Ease of Setup
Average: 8.2
9.3
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,289 Twitter followers
LinkedIn® Page
www.linkedin.com
2,435 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Purview Insider Risk Management utilizes more than 100 ready-to-use indicators and machine learning models to effectively detect critical security risks originating from insiders, including

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Purview Insider Risk Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Alerts
    3
    Easy Integrations
    3
    Compliance Management
    2
    Data Protection
    2
    Cons
    Expensive
    3
    Complexity
    2
    Setup Difficulties
    2
    False Positives
    1
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Purview Insider Risk Management features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.6
    8.1
    Ease of Admin
    Average: 8.3
    8.1
    Ease of Setup
    Average: 8.2
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Purview Insider Risk Management utilizes more than 100 ready-to-use indicators and machine learning models to effectively detect critical security risks originating from insiders, including

Users
No information available
Industries
No information available
Market Segment
  • 42% Mid-Market
  • 26% Enterprise
Microsoft Purview Insider Risk Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Alerts
3
Easy Integrations
3
Compliance Management
2
Data Protection
2
Cons
Expensive
3
Complexity
2
Setup Difficulties
2
False Positives
1
Inaccuracy
1
Microsoft Purview Insider Risk Management features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.6
8.1
Ease of Admin
Average: 8.3
8.1
Ease of Setup
Average: 8.2
8.8
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(204)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Starting at $3.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 56% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
    • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
    • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Security
    43
    Customer Support
    41
    Easy Setup
    31
    Protection
    30
    Cons
    Performance Issues
    19
    Improvements Needed
    11
    False Positives
    10
    Missing Features
    10
    Limited Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 8.6
    9.5
    Ease of Admin
    Average: 8.3
    9.7
    Ease of Setup
    Average: 8.2
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,944 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    407 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is a new breed of cybersecurity platform. A single platform that secures your entire company. When you use Coro, you protect email, data, endpoint devices, cloud apps, and even user activity.

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 56% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product designed to meet security requirements and monitor network activity.
  • Reviewers appreciate the product's user-friendly interface, efficient management processes, and the dedicated customer success team that provides ongoing support.
  • Reviewers experienced issues with email features not working after moving to a secure platform, slow response on data downloads, lack of features in newer modules, and difficulty in removing some viruses.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Security
43
Customer Support
41
Easy Setup
31
Protection
30
Cons
Performance Issues
19
Improvements Needed
11
False Positives
10
Missing Features
10
Limited Features
9
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 8.6
9.5
Ease of Admin
Average: 8.3
9.7
Ease of Setup
Average: 8.2
9.6
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,944 Twitter followers
LinkedIn® Page
www.linkedin.com
407 employees on LinkedIn®
(15)4.8 out of 5
6th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberhaven Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Data Protection
    9
    Features
    9
    Security
    9
    Deployment Ease
    6
    Cons
    Complexity
    5
    Setup Difficulties
    5
    Improvement Needed
    3
    Policy Limitations
    3
    Unclear Guidance
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberhaven features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.6
    8.8
    Ease of Admin
    Average: 8.3
    8.9
    Ease of Setup
    Average: 8.2
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Palo Alto
    Twitter
    @CyberhavenInc
    683 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    181 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

Users
No information available
Industries
  • Financial Services
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Cyberhaven Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Data Protection
9
Features
9
Security
9
Deployment Ease
6
Cons
Complexity
5
Setup Difficulties
5
Improvement Needed
3
Policy Limitations
3
Unclear Guidance
3
Cyberhaven features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.6
8.8
Ease of Admin
Average: 8.3
8.9
Ease of Setup
Average: 8.2
9.4
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Palo Alto
Twitter
@CyberhavenInc
683 Twitter followers
LinkedIn® Page
www.linkedin.com
181 employees on LinkedIn®
(21)4.9 out of 5
1st Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DataPatrol is a type of data security software solution designed to help organizations prevent internal data leaks by implementing visible watermarks on screens. This innovative approach ensures that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DataPatrol Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Easy Installation
    5
    Data Protection
    4
    Implementation Ease
    3
    Security
    3
    Cons
    Setup Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DataPatrol features and usability ratings that predict user satisfaction
    9.8
    Ease of Use
    Average: 8.6
    9.7
    Ease of Admin
    Average: 8.3
    9.7
    Ease of Setup
    Average: 8.2
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DataPatrol is a type of data security software solution designed to help organizations prevent internal data leaks by implementing visible watermarks on screens. This innovative approach ensures that

Users
No information available
Industries
No information available
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
DataPatrol Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Easy Installation
5
Data Protection
4
Implementation Ease
3
Security
3
Cons
Setup Difficulties
1
DataPatrol features and usability ratings that predict user satisfaction
9.8
Ease of Use
Average: 8.6
9.7
Ease of Admin
Average: 8.3
9.7
Ease of Setup
Average: 8.2
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
(455)4.4 out of 5
Optimized for quick response
7th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes,

    Users
    • IT Manager
    • IT Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is a SaaS management platform designed to automate critical processes such as onboarding and offboarding, and to integrate with various apps and systems.
    • Reviewers frequently mention the ease of use, the ability to automate tasks, and the time saved through the use of BetterCloud's workflows and automations, particularly in the context of onboarding and offboarding.
    • Users mentioned issues with the interface being confusing at times, the need for more app integrations, limitations on bulk actions, and the lack of granular access controls.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    23
    Ease of Use
    19
    Onboarding
    17
    Time-saving
    16
    Features
    14
    Cons
    Limited Features
    13
    Integration Issues
    9
    Missing Features
    9
    Limited Integrations
    7
    Workflow Limitations
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.6
    8.9
    Ease of Admin
    Average: 8.3
    8.6
    Ease of Setup
    Average: 8.2
    9.1
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,425 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes,

Users
  • IT Manager
  • IT Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is a SaaS management platform designed to automate critical processes such as onboarding and offboarding, and to integrate with various apps and systems.
  • Reviewers frequently mention the ease of use, the ability to automate tasks, and the time saved through the use of BetterCloud's workflows and automations, particularly in the context of onboarding and offboarding.
  • Users mentioned issues with the interface being confusing at times, the need for more app integrations, limitations on bulk actions, and the lack of granular access controls.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
23
Ease of Use
19
Onboarding
17
Time-saving
16
Features
14
Cons
Limited Features
13
Integration Issues
9
Missing Features
9
Limited Integrations
7
Workflow Limitations
6
BetterCloud features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.6
8.9
Ease of Admin
Average: 8.3
8.6
Ease of Setup
Average: 8.2
9.1
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,425 Twitter followers
LinkedIn® Page
www.linkedin.com
199 employees on LinkedIn®
(21)4.7 out of 5
3rd Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Tracking
    12
    Security
    11
    Customer Support
    10
    Monitoring
    10
    Cons
    Missing Features
    4
    Learning Difficulty
    3
    Limited Features
    3
    Complexity
    2
    Employee Dissatisfaction
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.6
    9.6
    Ease of Admin
    Average: 8.3
    9.4
    Ease of Setup
    Average: 8.2
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Needham, MA
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Mid-Market
  • 33% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Tracking
12
Security
11
Customer Support
10
Monitoring
10
Cons
Missing Features
4
Learning Difficulty
3
Limited Features
3
Complexity
2
Employee Dissatisfaction
2
Syteca features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.6
9.6
Ease of Admin
Average: 8.3
9.4
Ease of Setup
Average: 8.2
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
Year Founded
2013
HQ Location
Needham, MA
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
(82)4.5 out of 5
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.6
    8.9
    Ease of Admin
    Average: 8.3
    8.9
    Ease of Setup
    Average: 8.2
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    584,242 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.6
8.9
Ease of Admin
Average: 8.3
8.9
Ease of Setup
Average: 8.2
9.3
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
584,242 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
Ownership
NYSE:CRM
(38)4.3 out of 5
8th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Starting at $15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 63% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Monitoring
    11
    Customer Support
    8
    Employee Monitoring
    8
    Activity Monitoring
    7
    Cons
    Setup Difficulties
    9
    Difficult Setup
    8
    Technical Issues
    8
    Complex Setup
    6
    Software Issues
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.6
    8.0
    Ease of Admin
    Average: 8.3
    7.1
    Ease of Setup
    Average: 8.2
    8.1
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,349 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 63% Mid-Market
  • 29% Small-Business
Veriato Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Monitoring
11
Customer Support
8
Employee Monitoring
8
Activity Monitoring
7
Cons
Setup Difficulties
9
Difficult Setup
8
Technical Issues
8
Complex Setup
6
Software Issues
5
Veriato features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.6
8.0
Ease of Admin
Average: 8.3
7.1
Ease of Setup
Average: 8.2
8.1
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,349 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We provide simple but effective data leak monitoring and process validation solutions. With Assumed, you can ensure that your partners handle their data as they claim, validate your lead/sales process

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Data Leak Monitoring Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    7
    Security
    5
    Customer Support
    3
    Ease of Use
    3
    Real-time Monitoring
    2
    Cons
    Expensive
    2
    False Positives
    2
    Access Control Issues
    1
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Data Leak Monitoring features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.6
    0.0
    No information available
    8.3
    Ease of Setup
    Average: 8.2
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Assumed
    Year Founded
    2023
    HQ Location
    Chicago
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We provide simple but effective data leak monitoring and process validation solutions. With Assumed, you can ensure that your partners handle their data as they claim, validate your lead/sales process

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Data Leak Monitoring Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
7
Security
5
Customer Support
3
Ease of Use
3
Real-time Monitoring
2
Cons
Expensive
2
False Positives
2
Access Control Issues
1
Alert Management
1
Data Leak Monitoring features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.6
0.0
No information available
8.3
Ease of Setup
Average: 8.2
0.0
No information available
Seller Details
Seller
Assumed
Year Founded
2023
HQ Location
Chicago
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect companies from global security threats such as ransomware, s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Small-Business
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Security Protection
    4
    Cybersecurity
    3
    Data Protection
    3
    Protection
    3
    Cons
    Complexity
    2
    Learning Curve
    2
    Learning Difficulty
    2
    Limited Features
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.6
    8.7
    Ease of Admin
    Average: 8.3
    9.4
    Ease of Setup
    Average: 8.2
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    Cheyenne, Wyoming
    Twitter
    @blackfogprivacy
    1,488 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect companies from global security threats such as ransomware, s

Users
No information available
Industries
No information available
Market Segment
  • 73% Small-Business
  • 18% Mid-Market
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Security Protection
4
Cybersecurity
3
Data Protection
3
Protection
3
Cons
Complexity
2
Learning Curve
2
Learning Difficulty
2
Limited Features
2
Missing Features
2
BlackFog features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.6
8.7
Ease of Admin
Average: 8.3
9.4
Ease of Setup
Average: 8.2
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
Cheyenne, Wyoming
Twitter
@blackfogprivacy
1,488 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
Entry Level Price:$1.20
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is the

    Users
    No information available
    Industries
    • Education Management
    • Primary/Secondary Education
    Market Segment
    • 62% Mid-Market
    • 24% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GAT Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Customer Support
    17
    Features
    14
    Google Workspace Integration
    12
    Productivity Efficiency
    11
    Cons
    Complexity
    7
    Poor Interface Design
    6
    Poor Interface
    5
    Difficult Navigation
    4
    Learning Difficulty
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GAT Labs features and usability ratings that predict user satisfaction
    8.0
    Ease of Use
    Average: 8.6
    9.2
    Ease of Admin
    Average: 8.3
    9.3
    Ease of Setup
    Average: 8.2
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Dublin, Ireland
    Twitter
    @GATlabs_
    4,492 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is the

Users
No information available
Industries
  • Education Management
  • Primary/Secondary Education
Market Segment
  • 62% Mid-Market
  • 24% Enterprise
GAT Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Customer Support
17
Features
14
Google Workspace Integration
12
Productivity Efficiency
11
Cons
Complexity
7
Poor Interface Design
6
Poor Interface
5
Difficult Navigation
4
Learning Difficulty
4
GAT Labs features and usability ratings that predict user satisfaction
8.0
Ease of Use
Average: 8.6
9.2
Ease of Admin
Average: 8.3
9.3
Ease of Setup
Average: 8.2
9.4
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Dublin, Ireland
Twitter
@GATlabs_
4,492 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®