NetWitness Platform Features
What are the features of NetWitness Platform?
Network Management
- Activity Monitoring
- Asset Management
- Log Management
Incident Management
- Event Management
- Automated Response
- Incident Reporting
Security Intelligence
- Threat Intelligence
- Vulnerability Assessment
- Advanced Analytics
- Data Examination
Top Rated NetWitness Platform Alternatives
(89)
4.3 out of 5
Visit Website
Sponsored
NetWitness Platform Categories on G2
Filter for Features
Network Management
Activity Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. This feature was mentioned in 14 NetWitness Platform reviews. | 83% (Based on 14 reviews) | |
Asset Management | As reported in 13 NetWitness Platform reviews. Keeps records of each network asset and its activity. Discovers new assets accessing the network. | 78% (Based on 13 reviews) | |
Log Management | Provides security information and stores the data in a secure repository for reference. This feature was mentioned in 13 NetWitness Platform reviews. | 86% (Based on 13 reviews) |
Incident Management
Event Management | Alerts users of incidents and allows users to intervene manually or triggers an automated response. 14 reviewers of NetWitness Platform have provided feedback on this feature. | 76% (Based on 14 reviews) | |
Automated Response | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 12 reviewers of NetWitness Platform have provided feedback on this feature. | 75% (Based on 12 reviews) | |
Incident Reporting | Based on 14 NetWitness Platform reviews. Documents cases of abnormal activity and compromised systems. | 76% (Based on 14 reviews) |
Security Intelligence
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 13 NetWitness Platform reviews. | 79% (Based on 13 reviews) | |
Vulnerability Assessment | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. 11 reviewers of NetWitness Platform have provided feedback on this feature. | 76% (Based on 11 reviews) | |
Advanced Analytics | Allows users to customize analytics with granulized metrics that are pertinent to your specific resources. This feature was mentioned in 13 NetWitness Platform reviews. | 81% (Based on 13 reviews) | |
Data Examination | Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents. 11 reviewers of NetWitness Platform have provided feedback on this feature. | 83% (Based on 11 reviews) |
Analysis
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data | |
Data Context | Provide insights into why trends are occurring and what issues could be related. | Not enough data | |
Activity Logging | Monitors, records, and logs both real-time and post-event activity. | Not enough data | |
Incident Reporting | Produces reports detailing trends and vulnerabilities related to their network and infrastructur | Not enough data | |
Network Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data | |
Metadata Enrichment | Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Metadata Management | Indexes metadata descriptions for easier searching and enhanced insight | Not enough data |
Detection
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Activity Monitoring | Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Multi-Network Monitoring | Provides monitoring capabilities for multiple networks at once. | Not enough data | |
Asset Discovery | Detect new assets as they enter a network and add them to asset inventory. | Not enough data | |
Anomaly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns | Not enough data |
Automation
Workflow Mapping | Visually displays connected applications and integrated data. Allows customization and management of workflow structures. | Not enough data | |
Workflow Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Log Monitoring | Constantly monitors logs to detect anomalies in real time. | Not enough data |
Orchestration
Security Orchestration | Integrates additional security tools to automate security and incident response processes. | Not enough data | |
Data Collection | Collects information from multiple sources to cross reference and build contextual to correlate intelligence. | Not enough data | |
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. | Not enough data | |
Data Visualization | Offer pre-built and custom reporting and dashboards for quick insights into system states. | Not enough data |
Response
Alerting | Clearly notifies users with relevant information and anomalies in a timely manner. | Not enough data | |
Performance Baselin | Sets a standard performance baseline by which to compare log activity. | Not enough data | |
High Availability/Disaster Recovery | Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities. | Not enough data | |
Incident Alerts | Gives alerts when incidents arise. Some responses may be automated, but users will still be informed. | Not enough data | |
Response Orchestration | Integrates additional security tools to automate security and incident response processes. | Not enough data | |
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly | Not enough data |
Detection & Response
Response Automation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Threat Hunting | Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | Not enough data | |
Rule-Based Detection | Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance. | Not enough data | |
Real-Time Detection | Constantly monitors system to detect anomalies in real time. | Not enough data |
Management
Extensibility | Allows for customized support for hybrid environments | Not enough data | |
Workflow Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Unified Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. | Not enough data |
Analytics
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. | Not enough data | |
Artificial Intelligence & Machine Learning | Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis. | Not enough data | |
Data Collection | Collects information from multiple sources to cross reference and build contextual to correlate intelligence. | Not enough data |