Top Rated Vectra AI Platform Alternatives
Sweep the different sort of utilization and source code for escape clauses. Channel unapproved demands dependent on the sort. Sends cautions in a flash in the wake of getting a suspicious movement underway condition. Screens and UI are extraordinary as far as client experience.Easy to introduce/incorporate. Programmed process for filtering the framework and applications. Gives numerous arrangement to set up over the distinctive plateformz. Emotionally supportive network is exceptionally great from vectra systems. Review collected by and hosted on G2.com.
Need inside and out information of the instrument to distinguish conceivable security dangers. This sets aside opportunity to become accustomed to the product.I loathe about this is you need a minium of knowleadge about you see beacuse its brimming with therms without data Review collected by and hosted on G2.com.
17 out of 18 Total Reviews for Vectra AI Platform
Overall Review Sentiment for Vectra AI Platform
Log in to view review sentiment.

Ease of deployment, intuitive UI, and easy to work with sales and support staff. Review collected by and hosted on G2.com.
Reporting is lacking, currently only one report available with different timelines, also no ability to export from the console. Review collected by and hosted on G2.com.
Vectra finds what other controls miss. It is used to help with network visibility and integrates great with Splunk. We have passed every pen test since Vectra was deployed. The company has really listened to the customers and made big improvements over the last three years. Review collected by and hosted on G2.com.
It can get expensive if you have a lot of offices. The appliances are not cheap so if you have a bunch of smaller offices it can start to add up. Review collected by and hosted on G2.com.
Vectra does what it says on the tin, but goes beyond in providing a constant. speed of innovation that means they are constantly releasing new features. and detections, helping us to keep up to speed with any threats on our network Review collected by and hosted on G2.com.
As with any security tool, the alerts! But thankfully by monitoring the. quadrant based approach serious issues boil up for quick investigation. Review collected by and hosted on G2.com.
Generally excellent instrument to identify and stay away from digital assaults utilizing man-made consciousness progressively. Interestingly, the device advances as the strategies of digital assaults advance gratitude to the way that it depends on a man-made brainpower that is found out and improved after some time. It permits to discover digital assaults and dangers in the cloud, server farm and in business situations. Review collected by and hosted on G2.com.
Need all around data of the instrument to recognize possible security perils. This puts aside chance to end up acquainted with the product.I severely dislike about this is you need a minium of knowleadge about you see beacuse its overflowing with therms without information Review collected by and hosted on G2.com.
The different types of utilization and source code for escape clauses. The unauthorized channel demands dependencies of the ordering. Sends warnings instantly due to a suspicious ongoing movement condition. The screens and user interface are extraordinary in terms of customer experience. Easy to introduce/incorporate. Process programmed for framework and application filtering. Offers numerous arrangements to configure on the distinctive board. The emotional support network is exceptionally large from the vectra systems. Review collected by and hosted on G2.com.
Internal and external information about the instrument is needed to distinguish possible safety hazards. This sets aside the opportunity to get used to the product. I detest this because it requires a minimum of knowledge about its presence, as it is full of data without data. Review collected by and hosted on G2.com.
Low-friction POC deployment - saw tangible value immediately upon deployment, solid sales engineering support both pre and post sale. Vectra has been a willing and available partner making all levels of the organization (data science, marketing, and executives) available for support at different phases of sales, deployment, and post-adoption. Review collected by and hosted on G2.com.
Remote office sensors are limited to single gig upload, need to deploy the larger brain for sites you need 10 gb uplink capabilities. Review collected by and hosted on G2.com.

Very good tool for detecting and preventing cyberattacks using artificial intelligence in real time. The good thing is that the tool evolves as cyber attack techniques evolve, thanks to being based on artificial intelligence that learns and improves over time. It allows finding cyberattacks and threats in the cloud, data centers, and enterprise environments. Review collected by and hosted on G2.com.
It is very difficult to set up, a minimum of learning is needed to be able to configure and connect it with our company's intranet. In our case, we have had to hire other companies to provide us with training on how to use the tool. Review collected by and hosted on G2.com.
This is a high quality anomaly detection tool, very easy to understand and it helps very nicely to get reports, PCaps, and lets you see in an easy way what is happening in the network, this has top of the line algorithms, I simply love this product. Review collected by and hosted on G2.com.
Is very long process to tweak it to the point that it works perfect, but once that is done this is a beast Review collected by and hosted on G2.com.
1. Simple yet powerful
2. Easy to integrate
3. Customization in playbook
4. User friendly reporting Review collected by and hosted on G2.com.
The Product is in its initial release and hence it will be unfair to dislike it. Though the reporting of Threats can be more user readable (for business people who don't understand technical terms) Review collected by and hosted on G2.com.
This product is very easy to integrate. It allows you to use it to protect both the whole and certain components. Sends notifications if any suspicious activity has been noticed on the network. The interface is very user friendly and easy to configure. Review collected by and hosted on G2.com.
To enter the product you need minimal knowledge. A lot of terms and lack of instructions scares a lot of people. Review collected by and hosted on G2.com.