Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Gurucul Alternatives

Gurucul Reviews & Product Details

Gurucul Overview

What is Gurucul?

Gurucul is the only cost-optimized security analytics company founded in data science that delivers radical clarity about cyber risk. Our REVEAL security analytics platform analyzes enterprise data at scale using machine learning and artificial intelligence. Instead of useless alerts, you get real-time, actionable information about true threats and their associated risk. The platform is open, flexible and cloud native. It conforms to your business requirements so you don't have to compromise. Our technology has earned us recognition from leading industry analysts as the most Visionary platform and an Overall leader in product, market and innovation. Our solutions are used by Global 1000 enterprises and government agencies to minimize their cybersecurity risk. To learn more, visit Gurucul.com

Gurucul Details
Languages Supported
English, Spanish
Show LessShow More
Product Description

Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics.


Seller Details
Seller
Gurucul
HQ Location
El Segundo, CA
Twitter
@Gurucul
1,300 Twitter followers

George W.
GW
Overview Provided by:

Recent Gurucul Reviews

NA
Nahoum A.Mid-Market (51-1000 emp.)
2.0 out of 5
"Tedious Cloud Integration reduces scalability"
At a large enterprise, working as a security analyst, Gurucul’s REVEAL platform has proved beneficial to me. The machine-based analytics greatly d...
SY
Sujeet Y.Enterprise (> 1000 emp.)
4.0 out of 5
"GURUCUL SIEM Review"
The dashboard is self explanatory and covers all the aspect related to security posture. The pre-built parser used for ingesting logs of various de...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Gurucul Media

Gurucul Demo - Security Rating
Cybersecurity is complicated. Understanding cyber risk doesn't have to be. See our Security Rating at: https://securityscorecard.com/security-rating/gurucul.com
Answer a few questions to help the Gurucul community
Have you used Gurucul before?
Yes

2 Gurucul Reviews

3.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Gurucul Reviews
3.0 out of 5
2 Gurucul Reviews
3.0 out of 5

Gurucul Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
NA
Enterprise Account Executive
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Gurucul?

At a large enterprise, working as a security analyst, Gurucul’s REVEAL platform has proved beneficial to me. The machine-based analytics greatly decrease alert fatigue which is caused by the number of alerts by focusing on the high risk threats. Review collected by and hosted on G2.com.

What do you dislike about Gurucul?

Security data to be processed in REVEAL has to be moved to the cloud which is quite a tedious process. This poses a problem to our utilization of the scaling and versatility of cloud based security analytics. Review collected by and hosted on G2.com.

What problems is Gurucul solving and how is that benefiting you?

Gurucul solves the problem of having to go through countless security alerts by using machine learning to triage actual threats. This means that I have enough time to concentrate and use my experience to analyze only the most significant matters. Review collected by and hosted on G2.com.

SY
Associate Manager
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Gurucul?

The dashboard is self explanatory and covers all the aspect related to security posture. The pre-built parser used for ingesting logs of various devices are reliable and there is no data loss from the bucket. Review collected by and hosted on G2.com.

What do you dislike about Gurucul?

The various threat intel integration feeds although, integrated but the alerts take significant amount of time to populate on the console. The TI feed ingesting parser needs modulation in itslef. Review collected by and hosted on G2.com.

What problems is Gurucul solving and how is that benefiting you?

Earlier we had seperate tools for SIEM ingesting purpose, threat hunting tool, and maintaining other security postures. But, with the Gurucul inception in our infra we are able to ingest and visualize all the security reated paramaeters on the single console. Additionally, the ML feeds provided for UEBA works on heuristic algorithm which is at par with industry standards. Review collected by and hosted on G2.com.

There are not enough reviews of Gurucul for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
2
Wiz Logo
Wiz
4.7
(697)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Datadog Logo
Datadog
4.3
(541)
Datadog is a monitoring service for IT, Dev and Ops teams who write and run applications at scale, and want to turn the massive amounts of data produced by their apps, tools and services into actionable insight.
4
BetterCloud Logo
BetterCloud
4.4
(457)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
5
Splunk Enterprise Logo
Splunk Enterprise
4.3
(417)
Splunk is a software platform for machine data that enables customers to gain real-time Operational Intelligence.
6
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
7
Sumo Logic Logo
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
8
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
9
ActivTrak Logo
ActivTrak
4.4
(290)
ActivTrak is a cloud-native workforce intelligence platform that transforms work activity data into actionable insights for employee monitoring, productivity and performance management, and workforce planning capabilities that deliver measurable ROI. Deployment is quick and easy — start collecting data in minutes.
10
CrowdStrike Falcon Endpoint Protection Platform Logo
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
Show More