We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Very good scalability."
"This solution has advanced a lot over the last few years."
"Defender for Identity has not affected the end-user experience."
"It is easy to set up. Based on the number of devices you would like to set up, you can use scripts, Group Policy, etc. It takes five minutes to set up."
"The basic security monitoring at its core feature is the most valuable aspect. But also the investigative parts, the historical logging of events over the network are extremely interesting because it gives an in-depth insight into the history of account activity that is really easy to read, easy to follow, and easy to export."
"Lacks recording features."
"When the data leaves the cloud, there are security issues."
"The solution could be better at using group-managed access and they could replace it with broad-based access controls."
"I would like to be able to do remediation from the platform because it is just a scanner right now. If you onboard a device, it shows you what is happening, but you can't use it to fix things. You need to go into the system to fix it instead."
"The impact of the sensors on the domain controllers can be quite high depending on your loads. I don't know if there's any room for improvement there, but that's one of the things that might be improved."
"You won't be able to change your tenants from where you deploy them. For example, if you select Canada, they will charge you based on Canadian pricing. If you are also in London, when you deploy in Canada, the pound is higher than Canadian dollars, but your platform resources are billable in Canadian dollars. Using your pounds to pay for any of these things will be cheaper. Or, if you deploy in London, they will charge you based on your local currency."
Earn 20 points
The future works with actionable insights
Organizations have more rich data available to them than ever before, but data is only as good as the insights it provides and the actions you can take on it. Gathering this data can be unwieldy and making sense of it can be overwhelming. With machine learning applied to data that spans network traffic, users, files, and endpoints, you can identify and take action on user behavior and app performance.
Microsoft Defender for Identity is a cloud-based security solution that leverages your on-premises Active Directory signals to identify, detect, and investigate advanced threats, compromised identities, and malicious insider actions directed at your organization. With Microsoft Defender for Identity, you can:
- Monitor users, entity behavior, and activities with learning-based analytics
- Protect user identities and credentials stored in Active Directory
- Identify and investigate suspicious user activities and advanced attacks throughout the kill chain
- Provide clear incident information on a simple timeline for fast triage
To learn more about our solution, ask questions, and share feedback, join our Microsoft Defender for Identity Community.
Citrix Analytics is ranked 19th in User Behavior Analytics - UEBA with 1 review while Microsoft Defender for Identity is ranked 12th in User Behavior Analytics - UEBA with 4 reviews. Citrix Analytics is rated 7.0, while Microsoft Defender for Identity is rated 9.0. The top reviewer of Citrix Analytics writes "Good security and scalability features; recording feature would be helpful". On the other hand, the top reviewer of Microsoft Defender for Identity writes "Gives most administrators absolutely amazing insight into what's happening in the network that they probably never had before". Citrix Analytics is most compared with IBM QRadar User Behavior Analytics, LogRhythm Enterprise UEBA and Splunk User Behavior Analytics, whereas Microsoft Defender for Identity is most compared with Microsoft Defender for Office 365, Palo Alto Networks WildFire, Palo Alto Networks VM-Series, McAfee Advanced Threat Defense and Splunk User Behavior Analytics.
See our list of best User Behavior Analytics - UEBA vendors.
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.