Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"One of the most valuable features is the ability to report on questionable activity."
"The solution works well when used with other Microsoft solutions."
"The stability of the solution is very good."
"The most valuable feature is the ability to search through a large amount of data."
"The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them."
"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks."
"The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus."
"It's straightforward in terms of configuration and troubleshooting and log management and monitoring as well. These are the edge points in addition to it being a modular solution where you can capitalize on your current licenses with extra licensing models, which can match the customer's business requirement and it can help the customer to design or to actually plan for their own roadmap."
"The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."
"The most valuable features are the indexing and powerful search features."
"The solution is definitely scalable."
"Some of the newer features are not completely there yet... For example, there's a tool that allows you to grade your overall internal security and I don't feel that it's completely accurate."
"It would be ideal if the interface allowed for more granular configurations. For example, if I were to set a rule that is a deviation from the pre-defined rules in the Microsoft product, there's conflict."
"There are occasions where it generates some false positives and you have to embark into figuring it out. You need to find out if it was a true alert or a false positive. It's a little bit cumbersome in that area."
"It could be easier to scale the solution if you are using it on-premise, not in the cloud."
"The initial setup was complex because some of the configurations that we required needed customization."
"The solution is much more expensive than relative competitors like ArcSight or LogRhythm. It makes it hard to sell to customers sometimes."
"They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases."
"The correlation engine should have persistent and definable rules."
"In the future I would like to see simplified statistics and analytical threats."
"The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."
"Currently, a lot of network operations need improvement. We still need people to handle incidents. Our vision is to leverage status and convert it directly from the network devices. It would be ideal if we could take action using APIs and API code and remove manual processes."
Pricing and Cost Advice
"I believe we are looking into new licenses. They may be called the E5. Honestly, I don't have it on top of my mind, but I think it's around seven to $10 a user per month."
"My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
"There are additional costs associated with the integrator."
"The licensing costs is around 10,000 dollars."
"Pricing varies based on the packages you choose and the volume of your usage."
Questions from the Community
Top Answer: The solution works well when used with other Microsoft solutions.
Top Answer: The software is not as advanced as many competitors. It doesn't offer the level of granularity that other software might. It would be ideal if the interface allowed for more granular configurations… more »
Ask a question
Earn 20 points
In User Behavior Analytics - UEBA
out of 38 in User Behavior Analytics - UEBA
Average Words per Review
Compared 22% of the time.
Compared 12% of the time.
Compared 9% of the time.
Compared 9% of the time.
Compared 5% of the time.
Compared 18% of the time.
Compared 14% of the time.
Compared 7% of the time.
Compared 6% of the time.
Compared 5% of the time.
Also Known As
|Microsoft Advanced Threat Analytics||Caspida, Splunk UBA|
|Microsoft Advanced Threat Analytics (ATA) provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline. Microsoft ATA is an on-premises platform to help you protect your enterprise from advanced targeted attacks by automatically analyzing, learning, and identifying normal and abnormal entity (user, devices, and resources) behavior. It detects suspicious activities and malicious attacks with behavioral analytics, adapts to the changing nature of cyber-security threats, focuses on what is important with a simple attack timeline and reduces false positive fatigue.||Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics â for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.|
Learn more about Microsoft ATA [EOL]
Learn more about Splunk User Behavior Analytics
|Turkish Airlines, Seoul National University Bundang Hospital, Empa, The Alberta Teachers' Association||8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia|
Computer Software Company27%
Comms Service Provider17%
Financial Services Firm7%
Financial Services Firm57%
Computer Software Company25%
Comms Service Provider22%
Financial Services Firm7%
No Data Available
Microsoft ATA [EOL] is ranked unranked in User Behavior Analytics - UEBA with 3 reviews while Splunk User Behavior Analytics is ranked 2nd in User Behavior Analytics - UEBA with 11 reviews. Microsoft ATA [EOL] is rated 6.6, while Splunk User Behavior Analytics is rated 8.0. The top reviewer of Microsoft ATA [EOL] writes "Good integration, simple to maintain, and very stable". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Microsoft ATA [EOL] is most compared with Varonis Datalert, Securonix UEBA, Rapid7 InsightIDR, Exabeam and IBM QRadar User Behavior Analytics, whereas Splunk User Behavior Analytics is most compared with Darktrace, Cisco Stealthwatch, Exabeam, Varonis Datalert and Securonix Security Analytics.
See our list of best User Behavior Analytics - UEBA vendors.
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.