Most Helpful Review
Use ExtraHop Reveal(x)? Share your opinion.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
Pricing varies based on the packages you choose and the volume of your usage.
The licensing costs is around 10,000 dollars.
There are additional costs associated with the integrator.
My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly.
I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution.
In Intrusion Detection and Prevention Software
out of 45 in Intrusion Detection and Prevention Software
Average Words per Review
Compared 52% of the time.
Compared 22% of the time.
Compared 8% of the time.
Compared 18% of the time.
Compared 17% of the time.
Compared 11% of the time.
Also Known As
|Reveal(x), Revealx||Caspida, Splunk UBA|
Reveal(x) provides the visibility, insights, and answers that security analysts need to respond quickly and confidently to the highest priority threats against their organization's critical assets. It starts by automatically discovering and classifying every device communicating across the network, and using machine-learning driven behavioral analysis to detect anomalous and malicious activity.
|Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics â for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.|
Learn more about ExtraHop Reveal(x)
Learn more about Splunk User Behavior Analytics
|Wood County Hospital||8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia|
No Data Available
Software R&D Company19%
Financial Services Firm17%
Comms Service Provider14%