Likelihood to Recommend Splunk User Behavior Analytics application is necessary when any company wants to capture the threat based on user behavior instead of just counting the number of occurrences of particular event. With Splunk UBA, we can analyse number of anomalies captured and which in turn creating threats which are nearly true positive.
Read full review If you have Symantec based environment including Symantec proxy and endpoints, Content and Malware Analysis is the obvious choice. You can't run the CAS-MAS as a standalone deployment, you need proxies or ICAP supported devices capable to send the files/URLS. It's not a network security device where you can flow/direct the traffic to C/MAS. It does not have UBA, NBA or NTR features, it is just working for analyzing files as expected.
Read full review Pros Monitor and troubleshoot for any system errors. Get the insights on application data sets and do some predictive analysis. Read full review 0 day detection and prevenion Flawless integration with Symantec Ecosystem Integration with other vendors supporting ICAP is also working Custom and golden image support High performance on busy environments Many threats are already detected and prevented through the CAS, it improves the performance drastically. Already builtin virustotal integration Reference to updates and updates information where I can see the product/service detecting which APTs Multiple Antivirus engines which you can select/subscribe Manual submission of file is supported through the gui URL manual submission is also supported Read full review Cons Performance-wise, it can be improved. Queries take a long time. Dataset exploration - More data visualization charts can be added. Read full review API support is lacking Symantec/Broadcom security vision in general Symantec support is not perfect You can't run the product as a standalone network device No packet capture capabiliy or work in span mode You need a dedicated hardware to make it run You need to buy Read full review Alternatives Considered Easier we were using
Splunk Enterprise on heavy forwarder on which all the add-on were installed and were using
Splunk Cloud with respect to search head and indexers stack. And with
Splunk Enterprise Security premium app, we were relying on correlation rules which were throwing more number of false positive but after implementing Splunk UBA, we are now getting real-time true positive threat or incidents.
Read full review We have been using many solutions even tested nearly all available 0day sandbox solutions in the market. We choose Symantec CMA as we have already Symantec endpoint protection/EDR on the client, Symantec proxy for the web access, SCMA fits our environment. We have a big bargain when we puchase lots of equipment from the Symantec. Detection and prevention is very good at SCMA but some constant issues; like the product is not designed for heterogeneous environments, we can not integrate the SCMA with WAFs, it's lacking in api and request/reply calls. There's no file scanning, discover the option. SIEM integration is not smooth. I can not run some of the SOAR playbooks through the SCMA.
Read full review Return on Investment Fewer team members to work on real threats. Less time required to deal with real incidents. Easy to implement across the network. Read full review 0-day and APT risk is covered by the SCMA As the SSL is inspected and analyzed at Bluecoat proxy servers, hidden threats, malicous files are passed to SCMA to be analyzed. Getting full visibility at file trajectory level As it's a full proxy and ICAP integration, we are sure that the files are to analyzed and scanned for malicious activity. This is a big plus compared to NGFW analyze concept, as the NGFWs have special failsafe mechanisms allowing bypass of file analysis. SCMA fully catches the hidden threats. Flawless integration with Bluecoat systems is a big plus, customers are getting the same type of messages within their browsers. A negative impact is the standardization when I deploy SCAM to one of our locations. Then the auditors demand the same coverage within other areas and it comes with the cost. Especially maintaining these devices on premise environment has a significant cost. Read full review ScreenShots