Sign in to see all reviews and comparisons. It's Free!
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.
StealthDEFEND combines user behavior analytics and machine learning with access auditing and sensitive data discovery to not only detect abnormal account behavior, but accurately assess the risk associated with such behavior.
Category
User and Entity Behavior Analytics
Features
Detect risky account Detect ransomware and malware Allow sensitive data discovery
License
Proprietary Software
Price
Contact for Pricing
Pricing
Subscription
Free Trial
Available
Users Size
Small (<50 employees), Medium (50 to 1000 Enterprise (>1001 employees)
Company
StealthDEFEND
PAT Rating™
Editor Rating
Aggregated User Rating
Rate Here
Ease of use
7.5
9.6
Features & Functionality
7.4
8.7
Advanced Features
7.5
8.6
Integration
7.4
8.6
Performance
7.6
8.7
Training
—
Customer Support
7.6
—
Implementation
—
Renew & Recommend
—
Bottom Line
StealthDEFEND detects shifts in behavioral patterns of users and correlates them with the user access information to determine the potential risk they pose to the organization’s data.
7.5
Editor Rating
8.8
Aggregated User Rating
1 rating
You have rated this
StealthDEFEND combines user behavior analytics and machine learning with access auditing and sensitive data discovery to not only detect abnormal account behavior, but accurately assess the risk associated with such behavior.StealthDEFEND detects attempts to use common attack vectors to either gain initial access to, or propagate through, an environment.
Examples of these attacks include: Brute Force, Lateral Movement, Golden Ticket, Account Hacking, Breached Passwords.The software tracks risky and abused accounts. The software make use of advanced machine learning techniques to detect threats. StealthDEFEND detects shifts in behavioral patterns of users and correlates them with the user access information to determine the potential risk they pose to the organization’s data.The software allow sensitive data discovery and access auditing features. The software identifies abnormal behavior and anomalies and determine the type of risk associated with those behaviors. The software identifies attempt to make a malicious attack.
The software looks for deviations in behavior that might signal a risk or a threat to the organization. Organization sometimes have accounts with elevated permission. These accounts can access anything and may make changes anywhere they want. The software identifies such account. The software monitors the behavior of these elevated accounts to detect threats and risks. The software identifies risky users who might attempt to gain access to confidential and private data. Any user trying to access such information is stopped by the software.
The software detects malware and ransomwares too. This software identifies threats, stops them and even determine attempts to make risky attacks. The software with its power analytics and detection techniques, companies would be able to significantly reduce their vulnerability to attacks and risks. The software allows for easy threat detection. The software detects risk and threats before it is too late or a huge damage is caused to the organization. The software is also capable of recovery sensitive data lost. The software can detect insider risks and threats and present them to security analysts.
By clicking Sign In with Social Media, you agree to let PAT RESEARCH store, use and/or disclose your Social Media profile and email address in accordance with the PAT RESEARCH Privacy Policy and agree to the Terms of Use.