Microsoft ATA Reviews

Filter by:Reset all filters
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Real User
Director Cyber Security at a tech services company with 5,001-10,000 employees
Jan 29 2020

What is most valuable?

The solution works well when used with other Microsoft solutions. It's rather easy to define your rules.

What needs improvement?

The software is not as advanced as many competitors. It doesn't offer the level of granularity that other software might. It would be ideal if the interface allowed for more granular configurations. For example, if I were to set a rule that is a deviation from the pre-defined rules in the Microsoft product, there's conflict. The solution may not integrate well with solutions that aren't in the… more»

What other advice do I have?

We're an official Microsoft partner. I'm not a user of the product myself. I'm a consultant. I don't always recommend the product. It's one of the many products we work with. Usually, there's an evaluation procedure and we make a recommendation to clients as to which solution would be best to use. If ATA makes sense for the client's project we recommend it. Most clients we recommend the solution… more»
Real User
Security Officer
Mar 24 2019

What is most valuable?

One of the most valuable features is the ability to report on questionable activity.

How has it helped my organization?

It's given us a better, more real-time ability to be aware of employee situations that could be fraudulent. It has also measurably decreased our mean time to detect threats by about 50 percent, and… more»

What needs improvement?

I would like to see continuous improvement in upcoming releases. In terms of room for improvement, some of the newer features are not completely there yet. I have confidence that they will get there… more»

Which solution did I use previously and why did I switch?

We didn't have a previous solution.

What other advice do I have?

I would recommend this solution, even though it does have room for growth. I have confidence in the company. Regarding the maturity of our security program, there is always room for improvement. We're… more»

Which other solutions did I evaluate?

This product was really the key one that we looked at based on the direction that our company is taking and the number of products from this vendor that we utilize.

Articles

User Assessments By Topic About Microsoft ATA

Find out what your peers are saying about Microsoft, Splunk, Varonis and others in User Behavior Analytics - UEBA. Updated: April 2020.
408,459 professionals have used our research since 2012.

Microsoft ATA Questions

What is Microsoft ATA?

Microsoft Advanced Threat Analytics (ATA) provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in intelligence and providing clear and relevant threat information on a simple attack timeline. Microsoft ATA is an on-premises platform to help you protect your enterprise from advanced targeted attacks by automatically analyzing, learning, and identifying normal and abnormal entity (user, devices, and resources) behavior. It detects suspicious activities and malicious attacks with behavioral analytics, adapts to the changing nature of cyber-security threats, focuses on what is important with a simple attack timeline and reduces false positive fatigue.
Also known as
Microsoft Advanced Threat Analytics
Microsoft ATA customers
Turkish Airlines, Seoul National University Bundang Hospital, Empa, The Alberta Teachers' Association
BUYER'S GUIDE
Download our free User Behavior Analytics - UEBA Report and find out what your peers are saying about Microsoft, Splunk, Varonis, and more!