Best Software for 2025 is now live!
Product Avatar Image

Cyberhaven

Show rating breakdown
15 reviews
  • 1 profiles
  • 5 categories
Average star rating
4.8
Serving customers since
2016

Profile Name

Star Rating

14
1
0
0
0

Cyberhaven Reviews

Review Filters
Profile Name
Star Rating
14
1
0
0
0
PK
Palm K.
06/18/2024
Validated Reviewer
Review source: Organic

Next Gen DLP Solution

I find Cyberhaven the most immediate value add to our organization, the moment the sensor is installed, we have insight to what data is moving to where and how they were able to get there, it's full data visibility, full stop. By far, Cyberhaven's single pane of glass interface and incident/data reporting was miles apart to their nearest competitor, the sensor performance is lightweight (also backed up by their SLA), from deployment to anti-tampering, is industry leading. The integration with our exisiting security stack goes hand in hand and fits with what we had, with little performance loss. I love this DDR product and we compared it with three other vendors, this is a leader.
nic s.
NS
nic s.
06/17/2024
Validated Reviewer
Verified Current User
Review source: Organic

Innovative DLP Tool

They have given us the ability to track and measure data movement. We had no visibility into certain areas of our internal systems. Through their file lineage feature, we can not only track movement before an incident, but we can continue to track where that data moves after an incident. This is something we couldn't find in other vendors. Combined with the ability to classify data sources and not just destinations. This gave us a huge head start in data classification.
PM
Phil M.
06/13/2024
Validated Reviewer
Review source: Organic

Great exfiltration tool

CyberHaven is an insider threat tool that allows us to capture external exfiltations and is now an integral part of our DLP control process.

About

Contact

HQ Location:
Palo Alto

Social

@CyberhavenInc

What is Cyberhaven?

Your important data is always in motion, spreading to new people, applications, and devices that are outside traditional security controls. We protect data anywhere it goes in the extended enterprise. You can't protect what you can't see. We classify data by analyzing billions of events, not just patterns in the content, assembling a data lineage to identify and protect what other tools can’t.

Details

Year Founded
2016