Header banner
Revain logoHome Page
stealthdefend logo

StealthDEFEND Review

3

·

Very good

Revainrating 4.5 out of 5  
Rating 
4.3
Security, Cloud Security

View on AmazonView on ЯM

Description of StealthDEFEND

StealthDEFEND is the real-time threat analytics component of STEALTHbits’ Data Access Governance Suite. Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data. TOP FEATURES: - Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users. - Seamless Sensitive Data Integration – Threat and Data Access Governance information is seamlessly integrated, further reducing noise by honing in specifically on the files that matter most. - Preconfigured Threat Models – StealthDEFEND has been purpose-built to detect file system threats associated with Ransomware, Abnormal Behavior, First Time Host Access, First Time Client Use, Unusual Processes, and more. - Response Playbooks – StealthDEFEND's actions engine automates security responses and connects various security applications and processes together with multi-stage actions. Out-of-the-Box or custom "Playbooks" can be leveraged to respond to threats automatically or programatically. - User Behavioral Profiles – Concrete understanding of each individual user’s behavior is incorporated into StealthDEFEND’s threat analytics and Machine Learning models, complemented by visuals that make understanding any user’s normal behavior a trivial task. - Comprehensive Investigations – Create, configure, and save detailed reports, alerts, and threats on User and Group activity. - SIEM Integration – Out-of-the-box SIEM integration and preconfigured dashboards extend ready-to-use functions. - Real-Time Alerting – Real-time security alerts powered by Machine Learning allow you to master your threat data in a continuous way that leads to faster investigations and threat neutralizations. - Interactive, Real-Time Visualizations – Through a unified web presentation layer, threat data is streamed, processed, and visualized as it happens, including modern visualization elements like heat maps that update themselves in real-time to bring data to life. - Incident Detection Response Workflow – Quickly coordinate your team’s efforts so they’re prepared to share information and track who is working on an issue at any given time.
Hide

Reviews

Global ratings 3
  • 5
    1
  • 4
    2
  • 3
    0
  • 2
    0
  • 1
    0

Type of review

Revainrating 4 out of 5

Best free security monitoring tool for your infrastructure

1) The UI looks very clean & easy2). Easy integrations with other 3rd party products like Splunk3.) Good support from stealth bits4.). They have good knowledge about security threats5.), they are also providing best practices for secure deployments6), which makes me feel confident that my system will be secured7); if you want more control over what's happening in our environment then this might not fit well8)). I would recommend it only when we need an offsite monitoring tool9)), but still i'm

Cons
  • Not as much customization available compared few competitors

Revainrating 5 out of 5

Stable & dependably performing, great customer service

The product works as advertised in that it does provide some fairly effective protection for our critical assets (data). It offers multiple levels/scopes which can be adjusted depending upon how much you want "the beast" running around all over everything at once or just keeping an eye out for low level threats such as phishing attacks etc.. I also appreciate being able to create my own rules using their API - this helps make sure we are not missing anything important but could result if too…

Pros
  • Very good support team who have been responsive when required
Cons
  • Not the best

I like that my team can use it as an additional layer in our SOC2 compliance program for security risk assessment of potential threats without having to create custom reports or write scripts - which would take time away from other duties we have at work! It also allows us to focus more on high priority tasks within our organization rather than being bogged down with low level issues such as patch management or endpoint protection monitoring. We do not currently utilize any 3rd party services…

Pros
  • Easy way report findings back via email
  • Ability run scans locally.
  • Ease Of Use interface is easy enough even beginners will understand what options need used etc
Cons
  • Slow response times, especially around patching