ObserveIT Competitors and Alternatives

Read reviews of ObserveIT competitors and alternatives
Real User
Technology Architect at a renewables & environment company with 51-200 employees
Feb 22 2017

What do you think of CyberArk Privileged Access Security?

Valuable Features EPV: Enterprise Password Vault PSM: Privileged Session Manager AIM: Application Identity Manager The latest version of the product is mature and there is more functionality than we need. • Improvements to My Organization Improved security Reduced the overhead to protect enterprise data from delays Receives logs about all activities Compliance with several standards • Use of Solution I’m not the end-user. As a solutions architect (consultant), I designed and planned the solution in a very complex network environment. • Stability Issues We have not encountered any stability issues. After more than six years with my first CyberArk client, everything works great. • Scalability Issues We have not encountered any scalability issues. The solution was...
Real User
Database Administrator with 501-1,000 employees
Mar 14 2018

What do you think of InsightIDR?

Primary Use Case Security incident Event management • Improvements to My Organization InsightIDR has allowed us to find potential security issues that we did not know existed, and get remediation quickly. • Valuable Features User behavioral analytics allows us to pinpoint abnormal or suspicious behavior among millions of events every day.  Log search allows us to dive deep into aggregated logs and query all event types at once. • Room for Improvement Threat Intelligence: It would be useful to import threat intelligence in YARA format along with known incorrect email addresses. • Use of Solution Less than one year. • Stability Issues During the entire duration of use, there have been no issues noted with stability. • Scalability Issues The log aggregation...
Real User
Chief Technology Officer & Solution Architect at a tech services company with 51-200 employees
Feb 20 2017

What is most valuable?

* Fully transparent for users. * Supports many protocols. * Full OCR indexing: You can find anything that happened in sessions, including commands, programs opened, etc. Without OCR, you would only be able to find who did which sessions, but... more»

How has it helped my organization?

Our customers use it to provide full privileged-access monitoring for external users/administrators, so they are fully compliant and still have easy access to external user’s activity.

What needs improvement?

VMware PCoIP protocol support: Many customers are switching from normal computers/environment to VDI infrastructure and some of them are switching to VMware Horizon that uses PCoIP protocol, which is not supported right now. Central... more»

Sign Up with Email