Top Rated Cyberhaven Alternatives
I find Cyberhaven the most immediate value add to our organization, the moment the sensor is installed, we have insight to what data is moving to where and how they were able to get there, it's full data visibility, full stop. By far, Cyberhaven's single pane of glass interface and incident/data reporting was miles apart to their nearest competitor, the sensor performance is lightweight (also backed up by their SLA), from deployment to anti-tampering, is industry leading. The integration with our exisiting security stack goes hand in hand and fits with what we had, with little performance loss. I love this DDR product and we compared it with three other vendors, this is a leader. Review collected by and hosted on G2.com.
Inline memory scanning during copy/paste operation (example program to program) but that's about it. Cyberhaven pretty much meets all our business requirements Review collected by and hosted on G2.com.
14 out of 15 Total Reviews for Cyberhaven
Overall Review Sentiment for Cyberhaven
Log in to view review sentiment.

"Cyberhaven stands out among the crowd based on real-time data tracking and mapping, offering clear transparency into data flows. It presents an intuitive user interface with highly robust protection-the best fit in safeguarding critical information." Review collected by and hosted on G2.com.
"Cyberhaven could be improved by simplifying the setup process; it might take longer to fully integrate and configure for nontech-savvy users. The current performance could also get affected during peak traffic times." Review collected by and hosted on G2.com.
Cyberhaven has user-controlled override functions that work on email, web, USB, and peripheral data transfers to keep availability "always on" in my enterprise, provides an impression of comprehensive oversight to deter would-be insiders, and a lightweight feel that has virtually no user-experience for those who are always doing the right thing.
With so much emphasis on the user-experience, it's hard to put Cyberhaven in the category of DLP. It's almost like they need to make a new category.. like, "Company Operations and Data Assurance Technology"
CODAT! Review collected by and hosted on G2.com.
The user interface isn't the most intuitive i have ever seen, although the forest does get smaller with use. I won't say, "dislike", but I do think that the company hasn't done nearly enough to advertise itself.
I'd also like to see a lightweight version of the tool that only provides user pop-ups and logs activities vs. doing any sort of blocking.. there's a market for this, and the agent would be much simpler and less intrusive. You don't know how many times DLP gets blamed for new software causing performance issues. With a lightweight version, it would be virtually impossible for the CODAT agent to be targeted, yet you still get the detection, response, deterrence, and non-repudiation of a DLP capability.. and, honestly, that's how 99% of DLP tools are used anyway! Review collected by and hosted on G2.com.

They have given us the ability to track and measure data movement. We had no visibility into certain areas of our internal systems. Through their file lineage feature, we can not only track movement before an incident, but we can continue to track where that data moves after an incident. This is something we couldn't find in other vendors. Combined with the ability to classify data sources and not just destinations. This gave us a huge head start in data classification. Review collected by and hosted on G2.com.
Creating custom policies with multiple conditions is not always straightforward. If you're used to creating a SQL style query to "filter" data, where each statement reduces events. There's a learning curve in Cyberhaven, and you might inadvertently be excluding more data than you wanted. Support is always willing to jump in and refine policies. Once they are set up, they are pretty easy to maintain, especially if you're using a "list" to include/exclude destinations. But I wish the "filtering" logic was more intuitive. Review collected by and hosted on G2.com.
Cyberhaven allows us to meet and exceed contractual requirements for DLP. It goes far beyond standard 3-2-4 or 4-4-4-4 blocking and allows us to protect IP from leaving the organization. It also helps with Insider Threat as we have a “forensic” view of what happened to a file. Did Johnny copy an important file, change the extension to try and make it look like a .png, share with someone internal and then email or copy to a file sharing site? We have the details on what happened and when. We also have the ability to block these activities as needed/desired. Finally, we have protection to question or block what is being sent to gen AI sites. All in all, it is watching our back and provides details on what is moving in the organization. Review collected by and hosted on G2.com.
Tuning for a large organization takes focus. However, it is easy enough to do and makes sense as there is just a lot going on in large orgs. Review collected by and hosted on G2.com.
Traditional DLP tends to rely on content scanning while Cyberhaven cares about the provenance of the data. As we are a privacy-focused company that still needs to have some DLP in place, we can't just rely purely on content scanning. We care about where the data is actually coming from first and foremost. Viewing data lineage in the UI is incredibly intuitive and a standout feature. Review collected by and hosted on G2.com.
Having more advanced features like webhooks and building out the API more will further cement this as one of the best DLP products on the market. Review collected by and hosted on G2.com.
Cyberhaven is so simple to set up and getting it deployed to environments. It doesn't take a ton of configuration changes, deploy the agent to systems and then watch the data coming in. Review collected by and hosted on G2.com.
The automated reports that get sent out are only in PDF. So if you have a table in a dashboard it does not get sent as a csv in the automated reports. Review collected by and hosted on G2.com.
Overall interface is easy to navigate once you get familiar with it. The real time threat-monitoring. The customer service from the Cyberhaven team is always quick and responsive. The product roadmap, there are always new and upcoming updates to the product. Bi-weekly Touch Bases with the account managers are timely and beneficial. Review collected by and hosted on G2.com.
There is a good amount of documentation but I would like to see additional video tutorials. I would say there is limited mobile support. Review collected by and hosted on G2.com.
Cyberhaven customer support is top notch, and they are quick to address any issues or concerns. They have also been very willing to accept feedback for future product enhancements. The product has proven to be extremely effective in blocking the egress of designated data. The adminstrative aspect of the portal is pretty easy to use, it has a lot of options for creating custom data sets that were able to match our complex environment. Review collected by and hosted on G2.com.
I wouldn't say there are things I dislike about Cyberhaven. We had a few challenges in the beginning but with the help of their support, those challenges were quickly overcome. Review collected by and hosted on G2.com.
CyberHaven is an insider threat tool that allows us to capture external exfiltations and is now an integral part of our DLP control process. Review collected by and hosted on G2.com.
The setup and customization was a bit involved Review collected by and hosted on G2.com.
- Data Lineage feature
- Easy Deployment, Configuration, Maintenance and Asset onboarding process
- Capability to leverage the logs for integration with Incident Response process
- Good Support team that is very responsive Review collected by and hosted on G2.com.
- Creating Custom policies (eg: detecting exfiltration by scanning for a specific keyword in the content) is either not efficient or not available yet.
- Configuring new policies gets a little tedious in occassions where there is overlap of huge exceptions list across policies Review collected by and hosted on G2.com.