Nuwan ChathurangaTeam Lead - Network and Security at Connex Information Technologies
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The solution's most valuable features are the graphical user interface and the reporting."
"It has a lot of features. It has file integration monitoring."
"The most valuable features are file activity monitoring and registry activity monitoring."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The HTML file sandboxing is very good."
"The most valuable features are the protection and that it is fast."
"I like the sales operations testing. and support."
"The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox."
"The product is very easy to install."
"The search feature needs to be improved."
"It should have better mitigation with other solutions and be tightly integrated with other solutions. It has to be improved."
"It would be helpful if there were more guidance provided for integrating with unsupported devices."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The solution needs to be able to integrate better with third-party infrastructure."
"The solution could be more stable and offer more security."
"Licensing is on a yearly basis. It's not expensive compared to its competitors."
"The pricing is nice when compared to other products in the industry."
"Overall, the price is good."
"The price of the solution is lower compared to the competition."
Earn 20 points
LogRhythm UEBA enables your security team to quickly and effectively detect, respond to, and neutralize both known and unknown threats. Providing evidence-based starting points for investigation, it employs a combination of scenario analytics techniques (e.g., statistical analysis, rate analysis, trend analysis, advanced correlation), and both supervised and unsupervised machine learning (ML).
Deep Discovery is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.
LogRhythm Enterprise UEBA is ranked 16th in User Behavior Analytics - UEBA with 3 reviews while Trend Micro Deep Discovery is ranked 9th in Intrusion Detection and Prevention Software (IDPS) with 7 reviews. LogRhythm Enterprise UEBA is rated 6.0, while Trend Micro Deep Discovery is rated 8.6. The top reviewer of LogRhythm Enterprise UEBA writes "Good file and registry activity monitoring capability, and the support team is helpful". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Helped us to improve our security levels and protects our internal network from any external threats". LogRhythm Enterprise UEBA is most compared with Darktrace, Cisco Stealthwatch, Splunk User Behavior Analytics, Vectra AI and Securonix Security Analytics, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Cisco Stealthwatch, Palo Alto Networks Threat Prevention and ExtraHop Reveal(x).
See our list of .
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.