Cisco ISE is an all-in-one solution that streamlines security policy management and reduces operating costs. Cisco ISE delivers visibility and access control over users and devices across wired, wireless, and VPN connections.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
Collibra Governance is a software solution for data governance, which refers to the set of policies, standards, and processes that govern how an organization manages, uses, and protects its data. Collibra Governance provides a centralized platform for managing data governance, enabling organizations to ensure data accuracy, completeness, and security.
I would say it's probably in line with what other vendors charge for licensing.
It is substantial, and we do pay yearly.
I would say it's probably in line with what other vendors charge for licensing.
It is substantial, and we do pay yearly.
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
I am sure that there are cheaper products out there, but none that meet so many of our needs whilst maintaining stability and usability.
The team is very willing to work with companies. My suggestion is to call the Rapid7 sales department and see how they can help.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
The licensing costs is around 10,000 dollars.
Exabeam Fusion SIEM is a cloud-delivered solution that that enables you to:
-Leverage turnkey threat detection, investigation, and response
-Collect, search and enhance data from anywhere
-Detect threats missed by other tools, using market-leading behavior analytics
-Achieve successful SecOps outcomes with prescriptive, threat-centric use case packages
-Enhance productivity and reduce response times with automation
-Meet regulatory compliance and audit requirements with ease
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
They have a great model for pricing that can be based either on user count or gigabits per day.
If the customer has only a few users in some environment, then Exabeam is cheaper than competitors. But it can get expensive when adding more users.
Securonix Security Analytics SNYPR is a next-generation security analytics platform that transforms big data into actionable security intelligence, enabling you to take care of so much more than simply your SIEM (security information and event management) needs. In addition, it contains all of the tools that you may need to enable your organization to successfully handle both log management as well as UEBA (user and entity behavior analytics)-related tasks. The SNYPR management platform gives users the ability to combine security orchestration, automation, and response, security information and event management, network traffic analysis, and user and entity behavior analytics. This single technical environment does away with your need for multiple security, management, and analytics solutions.
We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000.
We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service.
We have a license from our 5.0, so that license just continued. We paid them the extra cloud-hosting costs for a year which were about $300,000.
We have an annual license. We pay $200,000 for the base licensing and we pay another $50,000 for the software as a service.
One Identity Safeguard is a comprehensive solution for managing privileged access, ensuring enhanced security and control over sensitive operations and data within organizations. Key use cases include automatic session recording for audit compliance, real-time monitoring of privileged access, credential management and rotation to mitigate password-related security risks, and integration with various platforms for unified account management. Users appreciate its robust security features that allow only authenticated access, effective session management, and comprehensive audit trails that aid in regulatory compliance and improve transparency. Additionally, it offers seamless integration with existing systems, enhancing operational efficiency and reducing complexity.
Setup cost, pricing and licensing are all very expensive.
The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible.
Setup cost, pricing and licensing are all very expensive.
The full license is expensive but if you plan to use it in a big organization then it is the best option because it is more flexible.
CA Privileged Access Manager is a simple-to-deploy, automated, proven solution for privileged access management in physical, virtual and cloud environments. It enhances security by protecting sensitive administrative credentials such as root and administrator passwords, controlling privileged user access, proactively enforcing policies and monitoring and recording privileged user activity across all IT resources. It includes CA PAM Server Control (previously CA Privileged Identity Manager) for fine-grained protection of critical servers
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
The prices are not low, but one can ask for a discount. It’s not the cheapest PAM solution.
Cost-wise, CA was better compared to others in the market.
Varonis Datalert prevents data breaches and alert on suspicious activity, stop ransomware, and defend your data from insider threats. It monitors enterprise assets for suspicious activity and unusual behavior, detecting critical events and compromised assets on your core infrastructure: Windows, UNIX/Linux, NAS, Active Directory, SharePoint, Exchange, and Office 365. It detects insider threats and cyber threats by analyzing data, account activity, and user behavior and automate responses to suspicious activity and alert on unusual behavior - using deep analysis of metadata, machine learning, and advanced User Behavior Analytics (UBA).
Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive.
I would rate the pricing an eight out of ten, with ten being the most expensive.
Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive.
I would rate the pricing an eight out of ten, with ten being the most expensive.
Teramind provides a user-centric security approach to monitor employee behavior. Our software streamlines employee data collection in order to identify suspicious activity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents by providing real-time access to user activities by offering alerts, warnings, redirects and user lock-outs to keep your business running as efficiently and secure as possible. We offer both cloud-based and on-premise deployment options to meet your organization’s requirements.
Dtex includes advanced user behavior intelligence. This intelligence automatically baselines normal user activity and identifies anomalies. This allows Dtex to detect and alert on the "unknown unknowns" - never-before-seen suspicious behavior.
Get overall user activity tracking with this local, Telnet, and terminal session monitoring software. See any user session in your reports.
Veriato Recon a User and Entity Behavior Analytics that combines machine learning and advanced statistical analysis to uncover indicators of compromise traditional preventative security measures. The software learns the behavior patterns in your company, and evaluates changes versus historical self and peer groups. All changes in behavior are identified in near real-time, and compared to sensitivity settings you control for prioritization. Automatically, alerts are triggered on anomalies most indicative of insider threat in an organization, and rich activity data is stored for rapid review.