Most Helpful Review
Use ExtraHop Reveal(X) Cloud? Share your opinion.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
Pricing varies based on the packages you choose and the volume of your usage.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly.
I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution.
In Intrusion Detection and Prevention Software
out of 45 in Intrusion Detection and Prevention Software
Average Words per Review
Compared 19% of the time.
Compared 17% of the time.
Compared 11% of the time.
Also Known As
|Reveal(X) Cloud||Caspida, Splunk UBA|
The cloud may be a force multiplier for business and IT, but for security teams already struggling to manage a sprawling attack surface and a shortage of skilled analysts, public cloud platforms create friction and vulnerabilities. It's time to move past the legacy tools and processes that keep security teams one step behind.
ExtraHop Reveal(x) Cloud is a cloud-native, SaaS-based solution that helps organizations scale their enterprise while effectively managing risk. With inside-the-perimeter threat detection, investigation, and response across Virtual Private Clouds (VPC), workloads, and AWS accounts, security teams can confidently secure their applications and grow their hybrid business.
|Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics â for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.|
Learn more about ExtraHop Reveal(X) Cloud
Learn more about Splunk User Behavior Analytics
Information Not Available
|8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia|
No Data Available
Software R&D Company19%
Financial Services Firm19%
Comms Service Provider15%