Save to My Lists
Claimed
Claimed

NetWitness Platform Features

What are the features of NetWitness Platform?

Network Management

  • Activity Monitoring
  • Asset Management
  • Log Management

Incident Management

  • Event Management
  • Automated Response
  • Incident Reporting

Security Intelligence

  • Threat Intelligence
  • Vulnerability Assessment
  • Advanced Analytics
  • Data Examination

Top Rated NetWitness Platform Alternatives

Filter for Features

Network Management

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. This feature was mentioned in 14 NetWitness Platform reviews.
83%
(Based on 14 reviews)

Asset Management

As reported in 13 NetWitness Platform reviews. Keeps records of each network asset and its activity. Discovers new assets accessing the network.
78%
(Based on 13 reviews)

Log Management

Provides security information and stores the data in a secure repository for reference. This feature was mentioned in 13 NetWitness Platform reviews.
86%
(Based on 13 reviews)

Incident Management

Event Management

Alerts users of incidents and allows users to intervene manually or triggers an automated response. 14 reviewers of NetWitness Platform have provided feedback on this feature.
76%
(Based on 14 reviews)

Automated Response

Reduces time spent remedying issues manually. Resolves common network security incidents quickly. 12 reviewers of NetWitness Platform have provided feedback on this feature.
75%
(Based on 12 reviews)

Incident Reporting

Based on 14 NetWitness Platform reviews. Documents cases of abnormal activity and compromised systems.
76%
(Based on 14 reviews)

Security Intelligence

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. This feature was mentioned in 13 NetWitness Platform reviews.
79%
(Based on 13 reviews)

Vulnerability Assessment

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. 11 reviewers of NetWitness Platform have provided feedback on this feature.
76%
(Based on 11 reviews)

Advanced Analytics

Allows users to customize analytics with granulized metrics that are pertinent to your specific resources. This feature was mentioned in 13 NetWitness Platform reviews.
81%
(Based on 13 reviews)

Data Examination

Allows users to search databases and incident logs to gain insights on vulnerabilities and incidents. 11 reviewers of NetWitness Platform have provided feedback on this feature.
83%
(Based on 11 reviews)

Analysis

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Behavioral Analysis

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Data Context

Provide insights into why trends are occurring and what issues could be related.

Not enough data

Activity Logging

Monitors, records, and logs both real-time and post-event activity.

Not enough data

Incident Reporting

Produces reports detailing trends and vulnerabilities related to their network and infrastructur

Not enough data

Network Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Metadata Enrichment

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Metadata Management

Indexes metadata descriptions for easier searching and enhanced insight

Not enough data

Detection

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Activity Monitoring

Monitors the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Multi-Network Monitoring

Provides monitoring capabilities for multiple networks at once.

Not enough data

Asset Discovery

Detect new assets as they enter a network and add them to asset inventory.

Not enough data

Anomaly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns

Not enough data

Automation

Workflow Mapping

Visually displays connected applications and integrated data. Allows customization and management of workflow structures.

Not enough data

Workflow Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Log Monitoring

Constantly monitors logs to detect anomalies in real time.

Not enough data

Orchestration

Security Orchestration

Integrates additional security tools to automate security and incident response processes.

Not enough data

Data Collection

Collects information from multiple sources to cross reference and build contextual to correlate intelligence.

Not enough data

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Data Visualization

Offer pre-built and custom reporting and dashboards for quick insights into system states.

Not enough data

Response

Alerting

Clearly notifies users with relevant information and anomalies in a timely manner.

Not enough data

Performance Baselin

Sets a standard performance baseline by which to compare log activity.

Not enough data

High Availability/Disaster Recovery

Allows platform to scale to size of desired environment and configured with high availability and disaster recovery capabilities.

Not enough data

Incident Alerts

Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.

Not enough data

Response Orchestration

Integrates additional security tools to automate security and incident response processes.

Not enough data

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly

Not enough data

Detection & Response

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.

Not enough data

Rule-Based Detection

Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.

Not enough data

Real-Time Detection

Constantly monitors system to detect anomalies in real time.

Not enough data

Management

Extensibility

Allows for customized support for hybrid environments

Not enough data

Workflow Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Unified Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Analytics

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Data Collection

Collects information from multiple sources to cross reference and build contextual to correlate intelligence.

Not enough data