User Behavior Analytics Features

Read what people say are the most valuable features of the solutions they use.
Anonymous avatar x60
Databasea5f3 uses InsightIDR
Database Administrator with 501-1,000 employees
* User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day. * Log search allows us to dive deep into aggregated logs and query all event types at once. View full review »
215e667a 5240 4a7a 8e84 d47e16a6aa4d avatar
Aaron Harris uses InsightIDR
Information Security Officer at a tech vendor with 201-500 employees
* Intelligent alerting to avoid the common problem of alert fatigue associated with traditional SIEMs. * Great coverage of all systems within our network from endpoint to firewall. * Integration with threat modeling from the Metasploit and InsightIDR repositories. * Enables the use of honey pots, honey users, and honey files to monitor for suspicious patterns. It gives all the advantages of a SIEM. However, using clever AI, it looks for patterns of behavior rather than just flooding me with all the alerts. View full review »
8eee89f4 54e3 4f74 95b6 b2ea11b467cc avatar
Josh Serna uses InsightIDR
Information Security Systems Administrator at a non-tech company with 5,001-10,000 employees
The ability to ingest Office 365 log files, then process them into events and display them on a map. This feature is particularly useful as it allows us to view students who are attempting to bypass our content filters, and it shows us users who have been phished. View full review »
E44f2baa 80e9 45eb b796 123422a503bf avatar
Chad Kliewer uses InsightIDR
Information Security Officer at a comms service provider with 501-1,000 employees
InsightIDR’s ability to process millions of transactions per day, and to notify me of the most critical ones, is priceless. InsightIDR has the alerts tuned, and has the ability to quickly drill down to determine the threat level, which is very important to me as a one-person security department. Another very important part of insightIDR is the ability to collect data from endpoint devices via agent software. With a large remote workforce, this allows visibility into the endpoints that are connected to the internet, but not to the corporate network. View full review »
Birzu alexandru adrian li?1414334311
Birzu Alexandru-Adrian uses Rapid7 NeXpose
ITSM & AntiFraud Consultant at a tech services company with 51-200 employees
Rapid 7 offers the community edition, a free of charge edition( 32 IP's) that helps small companies to secure their IT environment. Also with this edition it helps the students to learn about Vulnerability Management. The report from Nexpose is very big, and gives you a description of the problems you have on your servers, and the solution for remediation. Other valuable feature is the ability to check the vulnerability with Metasploit with only one click. View full review »

Sign Up with Email