Compare Centrify Privilege Threat Analytics Service vs. IBM QRadar User Behavior Analytics

Cancel
You must select at least 2 products to compare!
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
"The price of this solution is a little bit expensive, so if it were cheaper then it would help.""It's free of charge.""The price of this product is high."

More IBM QRadar User Behavior Analytics Pricing and Cost Advice »

report
Use our free recommendation engine to learn which User Behavior Analytics - UEBA solutions are best for your needs.
465,339 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: In terms of the most valuable features, the log collections and log processing mechanisms are good. They have good dashboards.
Top Answer: There are more costs in addition to standard licensing; support, building.
Top Answer: They have to build more quantitative monitoring, profiling, and make it more predictive.
Ranking
Views
41
Comparisons
18
Reviews
0
Average Words per Review
0
Rating
N/A
Views
414
Comparisons
282
Reviews
7
Average Words per Review
417
Rating
6.7
Popular Comparisons
Also Known As
Centrify Analytics Services
IBM QRadar UBA, QRadar UBA, QRadar User Behavior Analytics
Learn More
Overview

Cyber adversaries are getting more and more sophisticated and therefore it is best practice to apply multiple security layers when protecting against privileged access abuse. Today’s threatscape requires security controls to be adaptive to the risk-context and to use machine learning to carefully analyze a privileged user’s behavior. Leveraging Centrify Privilege Threat Analytics Service can make the difference between falling victim to a breach or stopping it in its tracks.

The User Behavior Analytics for QRadar (UBA) app is a tool for detecting insider threats in your organization. It is built on top of the app framework to use existing data in your QRadar to generate new insights around users and risk. UBA adds two major functions to QRadar: risk profiling and unified user identities.

Risk profiling is done by assigning risk to different security use cases. Examples might include simple rules and checks such as bad websites, or more advanced stateful analytics that use machine learning. Risk is assigned to each one depending on the severity and reliability of the incident detected. UBA uses existing event and flow data in your QRadar system to generate these insights and profile risks of users.

Offer
Learn more about Centrify Privilege Threat Analytics Service
Learn more about IBM QRadar User Behavior Analytics
Sample Customers
GSI
Information Not Available
Top Industries
No Data Available
VISITORS READING REVIEWS
Comms Service Provider35%
Computer Software Company18%
Insurance Company14%
Financial Services Firm7%
Company Size
No Data Available
REVIEWERS
Midsize Enterprise29%
Large Enterprise71%
Find out what your peers are saying about Securonix Solutions, Splunk, One Identity and others in User Behavior Analytics - UEBA. Updated: February 2021.
465,339 professionals have used our research since 2012.

Centrify Privilege Threat Analytics Service is ranked 32nd in User Behavior Analytics - UEBA while IBM QRadar User Behavior Analytics is ranked 13th in User Behavior Analytics - UEBA with 8 reviews. Centrify Privilege Threat Analytics Service is rated 0.0, while IBM QRadar User Behavior Analytics is rated 6.8. On the other hand, the top reviewer of IBM QRadar User Behavior Analytics writes "Stable and solid security intelligence but lacks some functionalities ". Centrify Privilege Threat Analytics Service is most compared with , whereas IBM QRadar User Behavior Analytics is most compared with Securonix UEBA, Cynet, Splunk User Behavior Analytics, LogRhythm Enterprise UEBA and Citrix Analytics.

See our list of best User Behavior Analytics - UEBA vendors.

We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.