Security AnalyticsLogRhythm NextGen SIEM Platform1https://media.trustradius.com/vendor-logos/YF/X9/J40ME3894TL8-180x180.JPEGSumo Logic2https://media.trustradius.com/vendor-logos/iD/Ks/HOFFU00WSJLT-180x180.PNGPalo Alto Networks WildFire3https://media.trustradius.com/product-logos/52/97/F7QTO7QIO9UF-180x180.PNGLogz.io4https://media.trustradius.com/vendor-logos/ox/0Y/LEG7VIFHNBV0-180x180.JPEGInterset5https://media.trustradius.com/product-logos/vy/6L/EDAMH53MAQ2U-180x180.jpgMicrosoft Advanced Threat Analytics (formerly Aorato)6https://media.trustradius.com/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGSecuronix SNYPR Platform7https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGSymantec Security Analytics (formerly Blue Coat)8https://media.trustradius.com/product-logos/7a/HP/I3ALL685RUST-180x180.PNGInsightIDR9https://media.trustradius.com/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGExabeam Security Intelligence Platform10https://media.trustradius.com/vendor-logos/2f/Iu/3CV52KIWX2FF-180x180.JPEGDNSentinel11https://media.trustradius.com/vendor-logos/6V/qX/PWGWXE300WQT-180x180.JPEGGurucul Risk Analytics (GRA)12https://media.trustradius.com/vendor-logos/Kn/7N/R7NRA40C9FZW-180x180.JPEGBay Dynamics Risk Fabric Platform13https://media.trustradius.com/vendor-logos/PX/oP/OCO2L00LDIBT-180x180.JPEGSecuronix Next-Generation SIEM14https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGSecuronix User and Entity Behavior Analytics (UEBA)15https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGBitdefender Network Traffic Security Analytics16https://media.trustradius.com/vendor-logos/4f/RI/FS87QQ1GMP8R-180x180.PNGDevo Data Operations Platform17https://media.trustradius.com/vendor-logos/kZ/Mv/QF3XREQGADC4-180x180.JPEGHillstone CloudView18https://media.trustradius.com/vendor-logos/8a/XH/8KXSWQW27BJ6-180x180.JPEGLogRhythm UEBA19https://media.trustradius.com/vendor-logos/YF/X9/J40ME3894TL8-180x180.JPEGForcepoint UEBA Behavior Analytics20https://media.trustradius.com/vendor-logos/Ih/Yn/XPF0T8T20KCE-180x180.JPEGForcepoint Insider Threat21https://media.trustradius.com/vendor-logos/Ih/Yn/XPF0T8T20KCE-180x180.JPEGSplunk User Behavior Analytics (UBA)22https://media.trustradius.com/vendor-logos/gJ/c0/2GB5D7JTKHQN-180x180.JPEGRSA NetWitness UEBA23https://media.trustradius.com/vendor-logos/VR/tQ/QQ1UVO3W5C25-180x180.JPEGHuntsman Enterprise SIEM24https://media.trustradius.com/vendor-logos/pz/6f/HFGJZST02KAV-180x180.JPEGIBM QRadar Advisor with Watson25https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEG

Security Analytics Software

Security Analytics Software Overview

What is Security Analytics Software?

Security analytics software are tools which provide proactive or exploratory network security via behavioral machine learning or analytics techniques. Alternately described as SA Platforms or network traffic analytics software, these tool collect, normalize, and analyze network traffic for threat behavior. Vendors specializing specifically in SA offer machine learning tools for applying security models to traffic across enterprise assets. While highly related to SIEM, security analytics software may provide more advanced tools for data mining or freeform analytics.

Features of Security Analytics Software

Security analytics platforms provide the following features, or target for analysis:
  • Ingested data from SIEM or other sources
  • User and entity behavior analytics (UEBA)
  • Automated or on-demand network traffic analysis
  • Model observed behavior against threat intelligence
  • Configure analytics to observe behavior against policy
  • Application access and analytics
  • DNS analysis tool
  • Email activity
  • Network packets
  • Identity and social persona
  • File access
  • Geolocation, IP context

Security Analytics Products

Listings (1-25 of 37)

We don't have enough ratings and reviews to provide an overall score.

Interset, developed by the company of the same name in Ottawa which was acquired by Micro Focus in February 2019, is a security analytics platform bringing artificial intelligence and machine learning to insider threat detection or related behavior-related security policy violations and threats.

We don't have enough ratings and reviews to provide an overall score.

Securonix, from the Los Angeles-based company of the same name, offers the SNYPR Platform, an advanced analytics platform providing real time insights with identity data, threat hunting, and other security analytics capabilities. The SNYPR platform combines this with Securonix Response Bot, inci...

We don't have enough ratings and reviews to provide an overall score.

In addition to their incident response service, Rapid7 offers InsightIDR, a relatively broad offering covering SIEM and user behavior and threat analytics.

We don't have enough ratings and reviews to provide an overall score.

Exabeam headquartered in San Mateo, offers their security intelligence and SIEM platform, the Exabeam Security Intelligence Platform, featuring unlimited security data collection (Exabeam Data Lake), threat detection via Exabeam Advanced Analytics, security response and orchestration via Exabeam ...

We don't have enough ratings and reviews to provide an overall score.

SRC headquartered in New York offers DNSentinel, a security analytics tool which allows the user to perform domain name analysis, or perform data mining on passive DNS data.

We don't have enough ratings and reviews to provide an overall score.

Hillstone Security headquartered in Santa Clara offers Hillstone CloudView, a SaaS security management and advanced analytics solution for entities deploying Hillstone Security's firewalls or threat detection solutions.

We don't have enough ratings and reviews to provide an overall score.

LogRhythm UEBA is the company's security analytics application for advanced threat detection via analysis of user behavior. LogRhythm offers their UEBA product standalone, or it can be integrated into the enterprise's SIEM product for additional functionality.

We don't have enough ratings and reviews to provide an overall score.

Huntsman Security, an Australian company offers the Huntsman Enterprise SIEM security platform, designed to provide a complete SIEM solution with a built-in behavior anomaly detection engine / UEBA engine (Huntsman BAD), which is an integral part of the Enterprise SIEM solution.

We don't have enough ratings and reviews to provide an overall score.

IBM QRadar Advisor with Watson supports QRadar SIEM with Watson's AI guided automation as well as providing advanced analytics capabilities for evaluating suspicious user activity, conducting threat validation, and other analytics based tasks.