Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Cyberhaven Features

What are the features of Cyberhaven?

Administration

  • Data Management
  • Incident Logs
  • Reporting

Governance

  • Access Control
  • Compliance
  • Data Visibility

Security

  • Encryption
  • Endpoint Intelligence
  • Activity Monitoring
  • Breach Detection

Functionality

  • Silent Deploy
  • File and Application Activity
  • Trigger Alerts
  • Searchable Evidence
  • Risk Scoring

Top Rated Cyberhaven Alternatives

Filter for Features

Administration

Data Management

As reported in 12 Cyberhaven reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable.
93%
(Based on 12 reviews)

Incident Logs

Information on each incident is stored in databases for user reference and analytics. This feature was mentioned in 11 Cyberhaven reviews.
98%
(Based on 11 reviews)

Reporting

As reported in 13 Cyberhaven reviews. Produces reports detailing trends and vulnerabilities related to bot management and performance.
88%
(Based on 13 reviews)

Auditing

Documents access and alterations of the database for analytics and reporting.

Not enough data

Data Discovery

Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.

Not enough data

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

Governance

Access Control

Supports LDAP Protocol to enable access control and governance. 12 reviewers of Cyberhaven have provided feedback on this feature.
83%
(Based on 12 reviews)

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 14 Cyberhaven reviews.
92%
(Based on 14 reviews)

Data Visibility

Based on 14 Cyberhaven reviews. Similifies data identification to increase visibility and management capabilities
98%
(Based on 14 reviews)

Security

Encryption

Based on 10 Cyberhaven reviews. Protects data with within and as it leaves your secure or local network.
90%
(Based on 10 reviews)

Endpoint Intelligence

Based on 12 Cyberhaven reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
86%
(Based on 12 reviews)

Activity Monitoring

Based on 14 Cyberhaven reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.
95%
(Based on 14 reviews)

Breach Detection

As reported in 13 Cyberhaven reviews. Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
90%
(Based on 13 reviews)

Data Protection

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

Not enough data

Data Encryption/Security

Manages policies for user data access and data encryption.

Not enough data

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Sensitive Data Discovery

Includes funcationality to automatically discover and classify sensitive and other defined data.

Not enough data

Structured and Unstructured Data

Can protect both structured and unstructured data using automated discovery tools.

Not enough data

Encryption

Includes encryption methods to protect data.

Not enough data

Persistent Protection

Protects data at rest, in transit, and in use.

Not enough data

Data Masking

Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies.

Not enough data

Data Governance and Access Management

Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.

Not enough data

Audit and Reporting

Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.

Not enough data

Analysis

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

Not enough data

Compliance

At-Risk Analysis

Uses machine learning to identify at-risk data.

Not enough data

DLP Configuration

Offers data loss prevention tools to protect data from leaving the environments it is allowed to.

Not enough data

Usability

Visualization

Offers tools to help administrators visualize the flow of data, whether that be processes or data flows.

Not enough data

AI Algorithyms

Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks.

Not enough data

Cross-Platforms

Allows data to move across multiple platform types and remain protected.

Not enough data

Functionality

Structure type

Searches structured, semi-structured, and unstructured data for sensitive data.

Not enough data

Contextual search

Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.

Not enough data

Template algorithms

Has template rules and pattern matching algorithms (PII, PCI, PHI and more)

Not enough data

Custom algorithms

Offers the option to create custom templates and rules based on department, user type and data type.

Not enough data

False-positive management

Offers false-positive management functions

Not enough data

Multiple file and location types

Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)

Not enough data

Real-time monitoring

Monitors data stores in real-time searching for newly created sensitive data.

Not enough data

Dashboard

Offers a dashboard showing specific location of sensitive data.

Not enough data

Compliance

Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.

Not enough data

Reporting

Offers reporting functionality.

Not enough data

Silent Deploy

Based on 10 Cyberhaven reviews. Silently deploys on endpoints without alerting users.
93%
(Based on 10 reviews)

Detect Data Movement

Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.

Not enough data

File and Application Activity

Based on 11 Cyberhaven reviews. Tracks activities taken on files or in applications, including save, print, or delete actions.
92%
(Based on 11 reviews)

Trigger Alerts

Based on 10 Cyberhaven reviews. Sends alerts to administrators when users take insider threat actions .
90%
(Based on 10 reviews)

Searchable Evidence

As reported in 10 Cyberhaven reviews. Maintains active and historical evidence in a searchable format.
98%
(Based on 10 reviews)

Risk Scoring

Provides risk scoring for suspicious activity. 10 reviewers of Cyberhaven have provided feedback on this feature.
92%
(Based on 10 reviews)

Monitoring

Screen Recording

Records video or screenshots of endpoint sessions.

Not enough data

Keystroke Logging

Logs keystrokes of users.

Not enough data

Sentiment Analysis

Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers.

Not enough data