Bigdata
Now Reading
StealthDEFEND
0
Review

StealthDEFEND

Overview
Synopsis

StealthDEFEND combines user behavior analytics and machine learning with access auditing and sensitive data discovery to not only detect abnormal account behavior, but accurately assess the risk associated with such behavior.

Category

User and Entity Behavior Analytics

Features

Detect risky account
Detect ransomware and malware
Allow sensitive data discovery

License

Proprietary Software

Price

Contact for Pricing

Pricing

Subscription

Free Trial

Available

Users Size

Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)

Company

StealthDEFEND

PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.5
9.6
Features & Functionality
7.4
8.7
Advanced Features
7.5
8.6
Integration
7.4
8.6
Performance
7.6
8.7
Training
Customer Support
7.6
Implementation
Renew & Recommend
Bottom Line

StealthDEFEND detects shifts in behavioral patterns of users and correlates them with the user access information to determine the potential risk they pose to the organization’s data.

7.5
Editor Rating
8.8
Aggregated User Rating
1 rating
You have rated this

StealthDEFEND combines user behavior analytics and machine learning with access auditing and sensitive data discovery to not only detect abnormal account behavior, but accurately assess the risk associated with such behavior.StealthDEFEND detects attempts to use common attack vectors to either gain initial access to, or propagate through, an environment.

Examples of these attacks include: Brute Force, Lateral Movement, Golden Ticket, Account Hacking, Breached Passwords.The software tracks risky and abused accounts. The software make use of advanced machine learning techniques to detect threats. StealthDEFEND detects shifts in behavioral patterns of users and correlates them with the user access information to determine the potential risk they pose to the organization’s data.The software allow sensitive data discovery and access auditing features. The software identifies abnormal behavior and anomalies and determine the type of risk associated with those behaviors. The software identifies attempt to make a malicious attack.

The software looks for deviations in behavior that might signal a risk or a threat to the organization. Organization sometimes have accounts with elevated permission. These accounts can access anything and may make changes anywhere they want. The software identifies such account. The software monitors the behavior of these elevated accounts to detect threats and risks. The software identifies risky users who might attempt to gain access to confidential and private data. Any user trying to access such information is stopped by the software.

The software detects malware and ransomwares too. This software identifies threats, stops them and even determine attempts to make risky attacks. The software with its power analytics and detection techniques, companies would be able to significantly reduce their vulnerability to attacks and risks. The software allows for easy threat detection. The software detects risk and threats before it is too late or a huge damage is caused to the organization. The software is also capable of recovery sensitive data lost. The software can detect insider risks and threats and present them to security analysts.

Filter reviews
User Ratings





User Company size



User role





User industry





Ease of use
Features & Functionality
Advanced Features
Integration
Performance
Training
Customer Support
Implementation
Renew & Recommend

What's your reaction?
Love It
0%
Very Good
0%
INTERESTED
0%
COOL
0%
NOT BAD
0%
WHAT !
0%
HATE IT
0%