BMC TrueSight Vulnerability Management vs DataVisor comparison

Cancel
You must select at least 2 products to compare!
Executive Summary

We performed a comparison between BMC TrueSight Vulnerability Management and DataVisor based on real PeerSpot user reviews.

Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management.
To learn more, read our detailed Vulnerability Management Report (Updated: March 2024).
768,924 professionals have used our research since 2012.
Featured Review
Ranking
48th
Views
175
Comparisons
131
Reviews
0
Average Words per Review
0
Rating
N/A
68th
Views
51
Comparisons
38
Reviews
0
Average Words per Review
0
Rating
N/A
Buyer's Guide
Vulnerability Management
March 2024
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
768,924 professionals have used our research since 2012.
Comparisons
Also Known As
TrueSight Vulnerability Management, SecOps Response Service, BladeLogic Threat Director
Learn More
Overview

Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

  • Powerful dashboards highlight vulnerability data, performance trends, and SLA compliance for quick prioritization of remediation tasks
  • Streamlined workflows combine scan verification and remediation tasks, leveraging BladeLogic Server Automation and Microsoft SCCM systems management
  • Blindspot awareness enables you to identify areas of your infrastructure which are not being monitored, leaving you exposed
  • Rapid import lets you quickly consume vulnerability scanning reports with native integration to Qualys, Tenable, and Rapid 7
  • Data export enables deep analysis and custom reports to help meet audit requirements and fuel process improvements

DataVisor is the leading big data fraud detection solution utilizing unsupervised analytics to identify malicious account campaigns before they conduct any damage to banks, consumer-facing web sites and mobile apps. Our unique approach to big data fraud detection does not rely on prior knowledge of attack patterns – “training data” in data science speak.

The rapid expansion of consumer-facing online services has led to an explosion of user accounts, ushering in the “billion user era”. Well-organized attack campaigns are using this growth to their advantage, creating armies of fake and compromised accounts to hide in the shadows and conduct fraud against banks, web sites and mobile apps. It is challenging for trust and safety teams to stay ahead of these fraudsters since rules and models need constant maintenance and are always reacting after the damage has been done. Our approach to big data fraud detection gives you a leg up. 

Sample Customers
Online Business Systems
I Got Games, Momo, Changba, Yelp
Top Industries
VISITORS READING REVIEWS
Financial Services Firm22%
Government12%
Wholesaler/Distributor12%
Computer Software Company10%
VISITORS READING REVIEWS
Financial Services Firm28%
Computer Software Company16%
Retailer14%
Educational Organization7%
Company Size
No Data Available
VISITORS READING REVIEWS
Small Business17%
Midsize Enterprise22%
Large Enterprise60%
Buyer's Guide
Vulnerability Management
March 2024
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management. Updated: March 2024.
768,924 professionals have used our research since 2012.

BMC TrueSight Vulnerability Management is ranked 48th in Vulnerability Management while DataVisor is ranked 68th in Vulnerability Management. BMC TrueSight Vulnerability Management is rated 7.0, while DataVisor is rated 0.0. The top reviewer of BMC TrueSight Vulnerability Management writes "Good features for infrastructure application; lacking in integrations with other software ". On the other hand, BMC TrueSight Vulnerability Management is most compared with Qualys VMDR, Tenable Security Center and Tenable Nessus, whereas DataVisor is most compared with Sift Digital Trust and Safety.

See our list of best Vulnerability Management vendors.

We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.