Cyberhaven Features
What are the features of Cyberhaven?
Administration
- Data Management
- Incident Logs
- Reporting
Governance
- Access Control
- Compliance
- Data Visibility
Security
- Encryption
- Endpoint Intelligence
- Activity Monitoring
- Breach Detection
Functionality
- Silent Deploy
- File and Application Activity
- Trigger Alerts
- Searchable Evidence
- Risk Scoring
Top Rated Cyberhaven Alternatives
(21)
4.8 out of 5
Visit Website
Sponsored
Cyberhaven Categories on G2
Filter for Features
Administration
Data Management | As reported in 12 Cyberhaven reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable. | 93% (Based on 12 reviews) | |
Incident Logs | Information on each incident is stored in databases for user reference and analytics. This feature was mentioned in 11 Cyberhaven reviews. | 98% (Based on 11 reviews) | |
Reporting | As reported in 13 Cyberhaven reviews. Produces reports detailing trends and vulnerabilities related to bot management and performance. | 88% (Based on 13 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data |
Governance
Access Control | Supports LDAP Protocol to enable access control and governance. 12 reviewers of Cyberhaven have provided feedback on this feature. | 83% (Based on 12 reviews) | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 14 Cyberhaven reviews. | 92% (Based on 14 reviews) | |
Data Visibility | Based on 14 Cyberhaven reviews. Similifies data identification to increase visibility and management capabilities | 98% (Based on 14 reviews) |
Security
Encryption | Based on 10 Cyberhaven reviews. Protects data with within and as it leaves your secure or local network. | 90% (Based on 10 reviews) | |
Endpoint Intelligence | Based on 12 Cyberhaven reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices. | 86% (Based on 12 reviews) | |
Activity Monitoring | Based on 14 Cyberhaven reviews. Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | 95% (Based on 14 reviews) | |
Breach Detection | As reported in 13 Cyberhaven reviews. Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. | 90% (Based on 13 reviews) |
Data Protection
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Sensitive Data Discovery | Includes funcationality to automatically discover and classify sensitive and other defined data. | Not enough data | |
Structured and Unstructured Data | Can protect both structured and unstructured data using automated discovery tools. | Not enough data | |
Encryption | Includes encryption methods to protect data. | Not enough data | |
Persistent Protection | Protects data at rest, in transit, and in use. | Not enough data | |
Data Masking | Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies. | Not enough data | |
Data Governance and Access Management | Provides policies and access controls to ensure the data is only handled by permisssioned users and processes. | Not enough data | |
Audit and Reporting | Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when. | Not enough data |
Analysis
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data |
Compliance
At-Risk Analysis | Uses machine learning to identify at-risk data. | Not enough data | |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data |
Usability
Visualization | Offers tools to help administrators visualize the flow of data, whether that be processes or data flows. | Not enough data | |
AI Algorithyms | Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks. | Not enough data | |
Cross-Platforms | Allows data to move across multiple platform types and remain protected. | Not enough data |
Functionality
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data | |
Silent Deploy | Based on 10 Cyberhaven reviews. Silently deploys on endpoints without alerting users. | 93% (Based on 10 reviews) | |
Detect Data Movement | Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage. | Not enough data | |
File and Application Activity | Based on 11 Cyberhaven reviews. Tracks activities taken on files or in applications, including save, print, or delete actions. | 92% (Based on 11 reviews) | |
Trigger Alerts | Based on 10 Cyberhaven reviews. Sends alerts to administrators when users take insider threat actions . | 90% (Based on 10 reviews) | |
Searchable Evidence | As reported in 10 Cyberhaven reviews. Maintains active and historical evidence in a searchable format. | 98% (Based on 10 reviews) | |
Risk Scoring | Provides risk scoring for suspicious activity. 10 reviewers of Cyberhaven have provided feedback on this feature. | 92% (Based on 10 reviews) |
Monitoring
Screen Recording | Records video or screenshots of endpoint sessions. | Not enough data | |
Keystroke Logging | Logs keystrokes of users. | Not enough data | |
Sentiment Analysis | Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers. | Not enough data |