Sign in to see all reviews and comparisons. It's Free!
Integrated platform which provides advanced cyber threat detection, incident forensics, breach response, compliance reporting and basic security monitoring.The analysis and retention infrastructure, which is made up of an Archiver that manages long-term data storage and an Event Stream Analysis (ESA) engine that processes high volumes of disparate event data and executes machine learning algorithms in real time.
Security Information and Event Management Software
• Flexible, Scalable Architecture • No Stone Unturned • Real-Time and Historical Analysis • Identifies Advanced Threats and Multiple Use Cases
Contact for Pricing
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Aggregated User Rating
Ease of use
Features & Functionality
Renew & Recommend
Collects and examines multiple pieces of data in real time and over extended periods of time, detects deviations from normal behavior, and creates a probability-weighted risk score for alerts based on these results.
Aggregated User Rating
You have rated this
Organizations can deploy RSA NetWitness Logs & Packets across diverse network typologies and geographies, and scale it according to their data capture and performance requirements. It recreates full sessions (web browsing, FTP, email, etc.) so that analysts can literally see what happened during an attack (including what was stolen during an exfiltration) and identify root causes. Its automated behavior analytics provides insight into attacker tactics, techniques and procedures as they execute their attacks. RSA NetWitness Logs & Packets is Flexible, Scalable Architecture that Consists of three components which can be deployed virtually, on premise, in the cloud or using a hybrid approach: The capture infrastructure, which consists of a highly configurable Decoder that captures and stores raw log and packet data; a Concentrator that stores and indexes metadata for fast queries and retrieving raw data; and a broker that facilitates queries across a multisite deployment of Concentrators and Decoders. The analysis and retention infrastructure, which is made up of an Archiver that manages long-term data storage and an Event Stream Analysis (ESA) engine that processes high volumes of disparate event data and executes machine learning algorithms in real time. The security analytics server. It promises No Stone Unturned because it inspects every network, packet session and log event for threat indicators at time of collection and enriches this data with threat intelligence and business context. It Identifies Advanced Threats because it looks for myriad behavioral indicators to identify attacks that evade signature- and rules-based monitoring tools. It also provides Real-Time and Historical Analysis.
Every day, thousands of potential buyers including CEO's, CIO's, Directors, and Executives use PAT RESEARCH.
PAT RESEARCH is a B2B discovery platform which provides Best Practices, Buying Guides, Reviews, Ratings, Comparison, Research, Commentary, and Analysis for Enterprise Software and Services. We provide Best Practices, PAT Index™ enabled product reviews and user review comparisons to help IT decision makers such as CEO’s, CIO’s, Directors, and Executives to identify technologies, software, service and strategies.