Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

Integrating visibility, analytics, and automated control into a unified solution streamlines the workflow for security analysts. By utilizing UEBA's automated policy enforcement and thorough user risk scoring, you can simplify complex processes. Merging DLP with behavioral analytics allows for a comprehensive perspective on user intent and actions throughout the organization. You have the option to utilize pre-built analytics or tailor risk models to align with your specific organizational requirements. With a quick glance, you can identify risk trends by viewing users ranked by their risk levels. Harness the full potential of your IT ecosystem, including unstructured data sources such as chat, to achieve a holistic understanding of user interactions across the enterprise. Gain insights into user intent through in-depth context enabled by big data analytics and machine learning technologies. In contrast to conventional UEBA systems, this approach empowers you to take proactive measures on insights, preventing breaches before they lead to significant losses. Consequently, you can effectively shield your personnel and data from insider threats while ensuring rapid detection and response capabilities. Ultimately, this comprehensive strategy promotes a safer organizational environment.

Description

Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness—combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Corelight
ARIA SDS Packet Intelligence
AWS IoT SiteWise
Amazon Web Services (AWS)
Carbon Black EDR
Code42 Incydr
Contrast Security
Cydarm
Cyral
EndaceProbe
Feroot
Mindflow
Polonious
Quickwork
Revelstoke
SeeMetrics
Stream Security
ThreatConnect Risk Quantifier (RQ)
Zoho Directory

Integrations

Corelight
ARIA SDS Packet Intelligence
AWS IoT SiteWise
Amazon Web Services (AWS)
Carbon Black EDR
Code42 Incydr
Contrast Security
Cydarm
Cyral
EndaceProbe
Feroot
Mindflow
Polonious
Quickwork
Revelstoke
SeeMetrics
Stream Security
ThreatConnect Risk Quantifier (RQ)
Zoho Directory

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$270.00 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Forcepoint

Founded

1994

Country

United States

Website

www.forcepoint.com/product/ueba-user-entity-behavior-analytics

Vendor Details

Company Name

Sumo Logic

Founded

2009

Country

United States

Website

www.sumologic.com

Product Features

Application Performance Monitoring (APM)

Baseline Manager
Diagnostic Tools
Full Transaction Diagnostics
Performance Control
Resource Management
Root-Cause Diagnosis
Server Performance
Trace Individual Transactions

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Alternatives

FortiInsight Reviews

FortiInsight

Fortinet

Alternatives

Securonix UEBA Reviews

Securonix UEBA

Securonix
Zulu Embedded Reviews

Zulu Embedded

Azul Systems