Introducing G2.ai, the future of software buying.Try now

Best Insider Threat Management (ITM) Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Insider Threat Management (ITM) software is a user activity monitoring software that helps companies prevent internal users from taking malicious or negligent actions within systems, such as accessing, copying, removing, tampering with, or destroying company data or other assets without permission. Companies use ITM software to monitor and record the actions of internal system users on their endpoints, such current and former employees, contractors, business partners, and other permissioned individuals, in order to protect company assets, such as customer data or intellectual property. ITM software is used by IT or security professionals. ITM software provides a critical role in a company's overall security strategy, as security tools that focus on external threats to systems or networks are often not able to detect the nuanced threats of internal, permissioned users.

ITM software often integrates with identity and access managment (IAM) software tools to pull internal user data. ITM tools also often integrate with security information and event mangement (SIEM) software tools and other threat analytics systems to centralize security operations into a single location. Many ITM software soltuions have functionality which overlaps with privileged access management (PAM) software, data loss prevention (DLP) software and user and entity behavior analystics (UEBA) software, however these tools have different uses. PAM is used to monitor the actions of privileged users. DLP tools detect sensitive data leaks. UEBA software uses machine learning to detect anomolies from benchmark useage; this is different from ITM software which utilizes endpoint sensors and contexutal user data to uncover insider threat risks.

To qualify for inclusion in the Insider Threat Management category, a product must:

Monitor user endpoints and trigger alerts when insider threat actions are taken
Detect data movement to external USBs or external drives or uploaded to cloud storage or emails, excessive printer-usage, and copy/cut/paste keystroke usage on user endpoints
Provide session video recording, screen captures, and keystroke logging as evidence of malicious or negligent action
Show More
Show Less

Best Insider Threat Management (ITM) Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Best Free Software:
Show LessShow More
Easiest to Use:
Top Trending:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
45 Listings in Insider Threat Management (ITM) Available
(55)4.9 out of 5
1st Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DataPatrol is a type of data security software solution designed to help organizations prevent internal data leaks by implementing visible watermarks on screens. This innovative approach ensures that

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DataPatrol Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    21
    Customer Support
    17
    Data Protection
    17
    Easy Installation
    13
    Implementation Ease
    11
    Cons
    Poor Integration
    3
    Setup Difficulties
    2
    Difficult Navigation
    1
    Expensive
    1
    Lack of Linux Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DataPatrol features and usability ratings that predict user satisfaction
    9.7
    Ease of Use
    Average: 8.7
    9.5
    Ease of Admin
    Average: 8.4
    9.5
    Ease of Setup
    Average: 8.4
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DataPatrol is a type of data security software solution designed to help organizations prevent internal data leaks by implementing visible watermarks on screens. This innovative approach ensures that

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Mid-Market
  • 29% Small-Business
DataPatrol Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
21
Customer Support
17
Data Protection
17
Easy Installation
13
Implementation Ease
11
Cons
Poor Integration
3
Setup Difficulties
2
Difficult Navigation
1
Expensive
1
Lack of Linux Support
1
DataPatrol features and usability ratings that predict user satisfaction
9.7
Ease of Use
Average: 8.7
9.5
Ease of Admin
Average: 8.4
9.5
Ease of Setup
Average: 8.4
9.4
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
(65)4.5 out of 5
9th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 65% Enterprise
    • 32% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Varonis Data Security Platform is a solution that provides visibility into sensitive data and monitors user access.
    • Reviewers like the platform's ability to proactively detect unusual behavior, automate threat detection, and provide clear insights for risk prevention, making data governance and compliance easier to manage.
    • Reviewers experienced a steep learning curve due to the platform's complexity and comprehensive features, and some found the interface could be more intuitive and the setup process time-consuming.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    21
    Security
    21
    Features
    19
    Data Protection
    18
    Ease of Use
    18
    Cons
    Complexity
    17
    Learning Curve
    10
    Learning Difficulty
    10
    Expensive
    9
    Steep Learning Curve
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.7
    8.3
    Ease of Admin
    Average: 8.4
    7.9
    Ease of Setup
    Average: 8.4
    9.3
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,314 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,767 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 65% Enterprise
  • 32% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Varonis Data Security Platform is a solution that provides visibility into sensitive data and monitors user access.
  • Reviewers like the platform's ability to proactively detect unusual behavior, automate threat detection, and provide clear insights for risk prevention, making data governance and compliance easier to manage.
  • Reviewers experienced a steep learning curve due to the platform's complexity and comprehensive features, and some found the interface could be more intuitive and the setup process time-consuming.
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
21
Security
21
Features
19
Data Protection
18
Ease of Use
18
Cons
Complexity
17
Learning Curve
10
Learning Difficulty
10
Expensive
9
Steep Learning Curve
8
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.7
8.3
Ease of Admin
Average: 8.4
7.9
Ease of Setup
Average: 8.4
9.3
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,314 Twitter followers
LinkedIn® Page
www.linkedin.com
2,767 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(173)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 59% Mid-Market
    • 38% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Safetica is a data protection and IRM solution that provides robust protection for sensitive business data across end points and the cloud.
    • Reviewers appreciate the software's user-friendly interface, easy integration and implementation, and the helpful customer support team that assists during the installation process.
    • Users mentioned issues such as performance degradation when interacting with some Antimalware software, confusion with the new graphical interface, and high cost.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Safetica Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    22
    Features
    20
    Security
    18
    Data Protection
    16
    Implementation Ease
    15
    Cons
    Slow Performance
    9
    Performance Issues
    7
    Integration Issues
    6
    Limited Compatibility
    5
    Limited Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Safetica features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.7
    8.7
    Ease of Admin
    Average: 8.4
    8.7
    Ease of Setup
    Average: 8.4
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Safetica
    Company Website
    Year Founded
    2011
    HQ Location
    San Jose, California, United States
    Twitter
    @Safetica
    669 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    123 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adapti

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 59% Mid-Market
  • 38% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Safetica is a data protection and IRM solution that provides robust protection for sensitive business data across end points and the cloud.
  • Reviewers appreciate the software's user-friendly interface, easy integration and implementation, and the helpful customer support team that assists during the installation process.
  • Users mentioned issues such as performance degradation when interacting with some Antimalware software, confusion with the new graphical interface, and high cost.
Safetica Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
22
Features
20
Security
18
Data Protection
16
Implementation Ease
15
Cons
Slow Performance
9
Performance Issues
7
Integration Issues
6
Limited Compatibility
5
Limited Features
5
Safetica features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.7
8.7
Ease of Admin
Average: 8.4
8.7
Ease of Setup
Average: 8.4
8.9
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Safetica
Company Website
Year Founded
2011
HQ Location
San Jose, California, United States
Twitter
@Safetica
669 Twitter followers
LinkedIn® Page
www.linkedin.com
123 employees on LinkedIn®
(48)4.3 out of 5
11th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As the leading people-centric Insider Threat Management solution, Proofpoint ITM and Endpoint DLP protects against endpoint-based data loss, malicious acts, and brand damage involving insiders acting

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Information Technology and Services
    Market Segment
    • 69% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Proofpoint Insider Threat Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    5
    Ease of Use
    4
    User Monitoring
    4
    Detection Efficiency
    3
    Employee Monitoring
    3
    Cons
    False Positives
    2
    Limited Features
    2
    Access Control Issues
    1
    Complexity
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Proofpoint Insider Threat Management features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.7
    8.4
    Ease of Admin
    Average: 8.4
    8.1
    Ease of Setup
    Average: 8.4
    8.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Sunnyvale, CA
    Twitter
    @proofpoint
    31,123 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,890 employees on LinkedIn®
    Ownership
    NASDAQ: PFPT
Product Description
How are these determined?Information
This description is provided by the seller.

As the leading people-centric Insider Threat Management solution, Proofpoint ITM and Endpoint DLP protects against endpoint-based data loss, malicious acts, and brand damage involving insiders acting

Users
No information available
Industries
  • Hospital & Health Care
  • Information Technology and Services
Market Segment
  • 69% Enterprise
  • 29% Mid-Market
Proofpoint Insider Threat Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
5
Ease of Use
4
User Monitoring
4
Detection Efficiency
3
Employee Monitoring
3
Cons
False Positives
2
Limited Features
2
Access Control Issues
1
Complexity
1
Expensive
1
Proofpoint Insider Threat Management features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.7
8.4
Ease of Admin
Average: 8.4
8.1
Ease of Setup
Average: 8.4
8.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2002
HQ Location
Sunnyvale, CA
Twitter
@proofpoint
31,123 Twitter followers
LinkedIn® Page
www.linkedin.com
4,890 employees on LinkedIn®
Ownership
NASDAQ: PFPT
(218)4.6 out of 5
Optimized for quick response
2nd Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Starting at $6.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 37% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
    • Reviewers frequently mention the product's high success rate in capturing threats, its easy installation, responsive customer support, and the convenience of having a central view for remotely resolving alerts.
    • Users reported issues with the product's handling of spam filtration, occasional false positives, the inability to interact directly with the Bitdefender agent on local machines, and the lack of support for Hubspot CRM.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Coro Cybersecurity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    92
    Customer Support
    65
    Security
    62
    Protection
    50
    Easy Setup
    45
    Cons
    Performance Issues
    32
    Improvements Needed
    20
    Inaccuracy
    16
    False Positives
    15
    Limited Features
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.5
    Ease of Use
    Average: 8.7
    9.5
    Ease of Admin
    Average: 8.4
    9.7
    Ease of Setup
    Average: 8.4
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,921 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro, the leading cybersecurity platform for small and midsize businesses, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform. Coro’s platform e

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 37% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product that uses AI to identify and flag potential spam and phishing, and provides a single dashboard for managing white and black lists for Office 365.
  • Reviewers frequently mention the product's high success rate in capturing threats, its easy installation, responsive customer support, and the convenience of having a central view for remotely resolving alerts.
  • Users reported issues with the product's handling of spam filtration, occasional false positives, the inability to interact directly with the Bitdefender agent on local machines, and the lack of support for Hubspot CRM.
Coro Cybersecurity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
92
Customer Support
65
Security
62
Protection
50
Easy Setup
45
Cons
Performance Issues
32
Improvements Needed
20
Inaccuracy
16
False Positives
15
Limited Features
14
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.5
Ease of Use
Average: 8.7
9.5
Ease of Admin
Average: 8.4
9.7
Ease of Setup
Average: 8.4
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,921 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microsoft Purview Insider Risk Management utilizes more than 100 ready-to-use indicators and machine learning models to effectively detect critical security risks originating from insiders, including

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Purview Insider Risk Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Analytics
    1
    Cons
    Software Instability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Purview Insider Risk Management features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.7
    8.1
    Ease of Admin
    Average: 8.4
    7.9
    Ease of Setup
    Average: 8.4
    8.8
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,908,227 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    232,306 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Microsoft Purview Insider Risk Management utilizes more than 100 ready-to-use indicators and machine learning models to effectively detect critical security risks originating from insiders, including

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 38% Enterprise
Microsoft Purview Insider Risk Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Analytics
1
Cons
Software Instability
1
Microsoft Purview Insider Risk Management features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.7
8.1
Ease of Admin
Average: 8.4
7.9
Ease of Setup
Average: 8.4
8.8
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,908,227 Twitter followers
LinkedIn® Page
www.linkedin.com
232,306 employees on LinkedIn®
Ownership
MSFT
(28)4.9 out of 5
3rd Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 68% Small-Business
    • 25% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BlackFog is a digital threat identification and prevention system that provides customizable options for various browsers and operating systems, and cuts network access on a device if it detects abnormal program activity.
    • Users frequently mention the ease of deployment, intuitive dashboard, minimal maintenance, effective protection against ransomware, and responsive customer support as key benefits of using BlackFog.
    • Reviewers noted that while BlackFog is highly effective, it can sometimes be too strict, and its warnings can be difficult to understand for people without a lot of cybersecurity background.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BlackFog Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    11
    Customer Support
    10
    Security
    8
    Security Protection
    8
    Ease of Use
    6
    Cons
    Billing Issues
    2
    Complexity
    2
    Learning Curve
    2
    Learning Difficulty
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BlackFog features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.7
    9.3
    Ease of Admin
    Average: 8.4
    9.6
    Ease of Setup
    Average: 8.4
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BlackFog
    Company Website
    Year Founded
    2015
    HQ Location
    BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
    Twitter
    @blackfogprivacy
    1,492 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2015, BlackFog is a global AI based cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect organizations from ransomware and data loss. W

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 68% Small-Business
  • 25% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BlackFog is a digital threat identification and prevention system that provides customizable options for various browsers and operating systems, and cuts network access on a device if it detects abnormal program activity.
  • Users frequently mention the ease of deployment, intuitive dashboard, minimal maintenance, effective protection against ransomware, and responsive customer support as key benefits of using BlackFog.
  • Reviewers noted that while BlackFog is highly effective, it can sometimes be too strict, and its warnings can be difficult to understand for people without a lot of cybersecurity background.
BlackFog Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
11
Customer Support
10
Security
8
Security Protection
8
Ease of Use
6
Cons
Billing Issues
2
Complexity
2
Learning Curve
2
Learning Difficulty
2
Limited Features
2
BlackFog features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.7
9.3
Ease of Admin
Average: 8.4
9.6
Ease of Setup
Average: 8.4
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
BlackFog
Company Website
Year Founded
2015
HQ Location
BlackFog Inc. Suite 1400 4 Embarcadero Ctr San Francisco CA 94111, United States
Twitter
@blackfogprivacy
1,492 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
(148)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:$15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 54% Small-Business
    • 39% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Teramind is a user-friendly tool that provides visibility to users in recording sessions with detailed analytics, behavior alerts, customizable policies, and comprehensive monitoring capabilities.
    • Reviewers appreciate Teramind's reliable performance, accurate analytics, behavior alerts, customizable policies, and its ability to track and analyze user activity effectively, which enhances overall security and compliance.
    • Users experienced difficulties in navigating the user interface, especially for new administrators, and reported that setting time-based filters specifically associated with application execution could be improved, as well as report optimization and dashboard usability.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Teramind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    8
    Monitoring
    8
    Ease of Use
    7
    Employee Monitoring
    7
    Remote Management
    6
    Cons
    Complexity
    3
    Difficult Setup
    3
    Dashboard Issues
    2
    Difficult Navigation
    2
    Inadequate Monitoring
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Teramind features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.7
    8.8
    Ease of Admin
    Average: 8.4
    8.9
    Ease of Setup
    Average: 8.4
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Teramind
    Company Website
    Year Founded
    2014
    HQ Location
    Aventura, FL
    Twitter
    @teramindco
    856 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    187 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Teramind is the leading global provider of insider threat management, data loss prevention, and productivity and process optimization solutions powered by user behavior analytics. Serving enterprise,

Users
  • IT Manager
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 54% Small-Business
  • 39% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Teramind is a user-friendly tool that provides visibility to users in recording sessions with detailed analytics, behavior alerts, customizable policies, and comprehensive monitoring capabilities.
  • Reviewers appreciate Teramind's reliable performance, accurate analytics, behavior alerts, customizable policies, and its ability to track and analyze user activity effectively, which enhances overall security and compliance.
  • Users experienced difficulties in navigating the user interface, especially for new administrators, and reported that setting time-based filters specifically associated with application execution could be improved, as well as report optimization and dashboard usability.
Teramind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
8
Monitoring
8
Ease of Use
7
Employee Monitoring
7
Remote Management
6
Cons
Complexity
3
Difficult Setup
3
Dashboard Issues
2
Difficult Navigation
2
Inadequate Monitoring
2
Teramind features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.7
8.8
Ease of Admin
Average: 8.4
8.9
Ease of Setup
Average: 8.4
8.9
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Teramind
Company Website
Year Founded
2014
HQ Location
Aventura, FL
Twitter
@teramindco
856 Twitter followers
LinkedIn® Page
www.linkedin.com
187 employees on LinkedIn®
(475)4.4 out of 5
Optimized for quick response
8th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

    Users
    • IT Manager
    • Systems Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 60% Mid-Market
    • 28% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • BetterCloud is a tool that streamlines SaaS management, provides centralized visibility, and enhances security and collaboration.
    • Reviewers appreciate BetterCloud's ability to automate workflows, provide a holistic view of file exposure, and easily manage Google admin settings.
    • Users reported that BetterCloud can be complex to set up, the interface could be improved, and the customer support could be more responsive.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BetterCloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    42
    Ease of Use
    36
    Onboarding
    28
    Features
    26
    Time-saving
    23
    Cons
    Limited Features
    27
    Integration Issues
    18
    Missing Features
    18
    Lacking Features
    13
    Access Limitations
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BetterCloud features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.7
    8.9
    Ease of Admin
    Average: 8.4
    8.6
    Ease of Setup
    Average: 8.4
    9.1
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2011
    HQ Location
    New York
    Twitter
    @BetterCloud
    11,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    166 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on aut

Users
  • IT Manager
  • Systems Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 60% Mid-Market
  • 28% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • BetterCloud is a tool that streamlines SaaS management, provides centralized visibility, and enhances security and collaboration.
  • Reviewers appreciate BetterCloud's ability to automate workflows, provide a holistic view of file exposure, and easily manage Google admin settings.
  • Users reported that BetterCloud can be complex to set up, the interface could be improved, and the customer support could be more responsive.
BetterCloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
42
Ease of Use
36
Onboarding
28
Features
26
Time-saving
23
Cons
Limited Features
27
Integration Issues
18
Missing Features
18
Lacking Features
13
Access Limitations
12
BetterCloud features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.7
8.9
Ease of Admin
Average: 8.4
8.6
Ease of Setup
Average: 8.4
9.1
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
Year Founded
2011
HQ Location
New York
Twitter
@BetterCloud
11,217 Twitter followers
LinkedIn® Page
www.linkedin.com
166 employees on LinkedIn®
(16)4.5 out of 5
7th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberhaven Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    7
    Features
    7
    Security
    6
    Customer Support
    4
    Monitoring
    4
    Cons
    Complexity
    4
    Setup Difficulties
    4
    Complex Configuration
    2
    Difficult Setup
    2
    Improvement Needed
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberhaven features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.7
    8.8
    Ease of Admin
    Average: 8.4
    8.5
    Ease of Setup
    Average: 8.4
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Palo Alto
    Twitter
    @CyberhavenInc
    771 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

Users
No information available
Industries
  • Financial Services
Market Segment
  • 56% Enterprise
  • 31% Mid-Market
Cyberhaven Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
7
Features
7
Security
6
Customer Support
4
Monitoring
4
Cons
Complexity
4
Setup Difficulties
4
Complex Configuration
2
Difficult Setup
2
Improvement Needed
2
Cyberhaven features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.7
8.8
Ease of Admin
Average: 8.4
8.5
Ease of Setup
Average: 8.4
9.4
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Palo Alto
Twitter
@CyberhavenInc
771 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
(22)4.7 out of 5
4th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syteca Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    6
    Ease of Use
    5
    Features
    5
    Implementation Ease
    5
    Real-time Monitoring
    5
    Cons
    Limited Features
    3
    Insufficient Detail
    2
    Limited Customization
    2
    Slow Performance
    2
    Alert Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syteca features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.7
    9.6
    Ease of Admin
    Average: 8.4
    9.2
    Ease of Setup
    Average: 8.4
    9.7
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    24 Crescent Street Suite 403 Waltham, MA 02453, USA
    LinkedIn® Page
    www.linkedin.com
    79 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syteca — Transforming human risk into human assets. The Syteca platform is a comprehensive cybersecurity solution designed to meet the diverse needs of modern organizations. The platform features a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Mid-Market
  • 36% Small-Business
Syteca Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
6
Ease of Use
5
Features
5
Implementation Ease
5
Real-time Monitoring
5
Cons
Limited Features
3
Insufficient Detail
2
Limited Customization
2
Slow Performance
2
Alert Management
1
Syteca features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.7
9.6
Ease of Admin
Average: 8.4
9.2
Ease of Setup
Average: 8.4
9.7
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Company Website
Year Founded
2013
HQ Location
24 Crescent Street Suite 403 Waltham, MA 02453, USA
LinkedIn® Page
www.linkedin.com
79 employees on LinkedIn®
(38)4.3 out of 5
10th Easiest To Use in Insider Threat Management (ITM) software
Save to My Lists
Entry Level Price:Starting at $15.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 63% Mid-Market
    • 29% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veriato User Activity Monitoring (UAM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Monitoring
    8
    Activity Monitoring
    6
    Employee Monitoring
    6
    Customer Support
    5
    Cons
    Setup Difficulties
    7
    Difficult Setup
    6
    Technical Issues
    5
    Complex Setup
    4
    Inadequate Reporting
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.7
    8.0
    Ease of Admin
    Average: 8.4
    7.1
    Ease of Setup
    Average: 8.4
    8.1
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veriato
    Year Founded
    1998
    HQ Location
    West Palm Beach, US
    Twitter
    @Veriato
    1,333 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At Veriato, we believe understanding the human factor is key to driving workforce productivity, ensuring compliance, and maintaining operational efficiency. By focusing on user behavior and analyzing

Users
No information available
Industries
  • Financial Services
Market Segment
  • 63% Mid-Market
  • 29% Small-Business
Veriato User Activity Monitoring (UAM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Monitoring
8
Activity Monitoring
6
Employee Monitoring
6
Customer Support
5
Cons
Setup Difficulties
7
Difficult Setup
6
Technical Issues
5
Complex Setup
4
Inadequate Reporting
3
Veriato User Activity Monitoring (UAM) features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.7
8.0
Ease of Admin
Average: 8.4
7.1
Ease of Setup
Average: 8.4
8.1
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Seller
Veriato
Year Founded
1998
HQ Location
West Palm Beach, US
Twitter
@Veriato
1,333 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Assumed Seeds provides powerful data leak detection through strategically placed artificial consumer contacts ("honey tokens") that monitor for unauthorized use of your sensitive data. The platform of

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Assumed Seeds Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    2
    Compliance Management
    1
    Employee Monitoring
    1
    Real-time Monitoring
    1
    Security
    1
    Cons
    Access Control Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assumed Seeds features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.7
    0.0
    No information available
    8.3
    Ease of Setup
    Average: 8.3
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Assumed
    Year Founded
    2023
    HQ Location
    Chicago
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Assumed Seeds provides powerful data leak detection through strategically placed artificial consumer contacts ("honey tokens") that monitor for unauthorized use of your sensitive data. The platform of

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Assumed Seeds Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
2
Compliance Management
1
Employee Monitoring
1
Real-time Monitoring
1
Security
1
Cons
Access Control Issues
1
Assumed Seeds features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.7
0.0
No information available
8.3
Ease of Setup
Average: 8.3
0.0
No information available
Seller Details
Seller
Assumed
Year Founded
2023
HQ Location
Chicago
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

    Users
    No information available
    Industries
    • Education Management
    • Primary/Secondary Education
    Market Segment
    • 59% Mid-Market
    • 26% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • GAT Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Google Workspace Integration
    4
    Automation
    3
    Customer Support
    3
    Features
    3
    Reporting
    3
    Cons
    Slow Performance
    2
    Complex Configuration
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GAT Labs features and usability ratings that predict user satisfaction
    8.1
    Ease of Use
    Average: 8.7
    9.3
    Ease of Admin
    Average: 8.4
    9.4
    Ease of Setup
    Average: 8.4
    9.5
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Dublin, Ireland
    Twitter
    @GATlabs_
    4,451 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GAT Labs build tools that help complement the power of Google Workspace and Chrome for Enterprise and Education domains with auditing, management, security, automation and insights. Today, GAT is t

Users
No information available
Industries
  • Education Management
  • Primary/Secondary Education
Market Segment
  • 59% Mid-Market
  • 26% Enterprise
GAT Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Google Workspace Integration
4
Automation
3
Customer Support
3
Features
3
Reporting
3
Cons
Slow Performance
2
Complex Configuration
1
Complexity
1
Complex Setup
1
Difficult Navigation
1
GAT Labs features and usability ratings that predict user satisfaction
8.1
Ease of Use
Average: 8.7
9.3
Ease of Admin
Average: 8.4
9.4
Ease of Setup
Average: 8.4
9.5
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
2014
HQ Location
Dublin, Ireland
Twitter
@GATlabs_
4,451 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quickly scan and identify security gaps to determine the most efficient security strategy for your customers. ConnectWise Fortify Protection combines intelligent profiling and alerting technology with

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ConnectWise Cybersecurity Management – Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Easy Integrations
    3
    Integrations
    3
    Security
    3
    Detection Efficiency
    2
    Cons
    Outdated Software
    2
    Alert Management
    1
    Complexity
    1
    Expensive
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectWise Cybersecurity Management – Protection features and usability ratings that predict user satisfaction
    6.3
    Ease of Use
    Average: 8.7
    10.0
    Ease of Admin
    Average: 8.4
    7.3
    Ease of Setup
    Average: 8.4
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1982
    HQ Location
    Tampa, FL
    Twitter
    @ConnectWise
    14,998 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,287 employees on LinkedIn®
    Phone
    800-671-6898
Product Description
How are these determined?Information
This description is provided by the seller.

Quickly scan and identify security gaps to determine the most efficient security strategy for your customers. ConnectWise Fortify Protection combines intelligent profiling and alerting technology with

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
ConnectWise Cybersecurity Management – Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Easy Integrations
3
Integrations
3
Security
3
Detection Efficiency
2
Cons
Outdated Software
2
Alert Management
1
Complexity
1
Expensive
1
Inefficient Alert System
1
ConnectWise Cybersecurity Management – Protection features and usability ratings that predict user satisfaction
6.3
Ease of Use
Average: 8.7
10.0
Ease of Admin
Average: 8.4
7.3
Ease of Setup
Average: 8.4
10.0
Has the product been a good partner in doing business?
Average: 8.8
Seller Details
Year Founded
1982
HQ Location
Tampa, FL
Twitter
@ConnectWise
14,998 Twitter followers
LinkedIn® Page
www.linkedin.com
3,287 employees on LinkedIn®
Phone
800-671-6898