Best Insider Threat Management (ITM) Software

Products Buyer's Guide
9.4
Haystax Enterprise Security Solution
★★★★★

Haystax Enterprise Security Solution

A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provide: ‘whole-person' analysis of potential insider risk; end-to-end critical infrastructure security awareness, from single manufacturing facilities to sprawling global operations; proactive warnings of malware, fraud, sabotage and other cyber ...

Ideal software to mitigate the most powerful risks at the business level - Adolf R.

Ease of use
9.7
Support
9.3
Ease of Setup
9.4
6.0
InterGuard Employee Monitoring Software
★★★★★

InterGuard Employee Monitoring Software

InterGuard employee monitoring software provides employers and managers insight into all computer and internet activity. InterGuard records all employee computer activity regardless if it is on or off the network.

Very Bad Experience - Administrator in Law Practice

Ease of use
Support
Ease of Setup
9.0
Incydr
★★★★★

Incydr

Next-Gen Data Loss Protection

Code42 Is Super Slow. For 20 Gigs of data, on 400mbps Upload, 5 days. Abundance of CPU and Ram. - Brandon T. B.

Ease of use
9.1
Support
8.8
Ease of Setup
0.0

Languages supported: English

8.2
Teramind
★★★★★

Teramind

Teramind provides a security approach to monitor behavior and give organizations the opportunity to automate actions to prevent unwanted behavior.

A lot of help in monitoring and optimizing our productivity. - Ogie M.

Ease of use
7.9
Support
8.1
Ease of Setup
9.3

Languages supported: English, Portuguese, Russian, Spanish, Turkish, Chinese (Simplified), Chinese (Traditional)

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

8.8
Netwrix Auditor
★★★★★

Netwrix Auditor

Netwrix Auditor enables auditing of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware and Windows Server. It also supports monitoring of privileged user activity.

Bring audit data from multiple sources into one pane of glass and easily detect malicious behaviors. - Jim P.

Ease of use
8.4
Support
8.8
Ease of Setup
8.4

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

0.0
Ekran System
★★★★★

Ekran System

Ekran System helps companies of any size to build their strategies of mitigating user-based security risks. It is a universal user activity monitoring tool for corporate servers and desktops. Per-session indexed video records is the core format.

An easy to manage Employee monitoring solution - Internal Consultant in Information Technology and Services

Ease of use
Support
Ease of Setup

Languages supported: English, Japanese, Korean, Chinese (Simplified)

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.0
ActivTrak
★★★★★

ActivTrak

ActivTrak is a single-agent, cloud-native behavior analysis solution used to increase productivity, streamline operational efficiency, and harden security. Our software is affordable, easy-to-use, and quick to install.

Great tracking software (a little too great?) - Antonio R.

Ease of use
8.9
Support
8.8
Ease of Setup
0.0

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 0

8.0
inDefend
★★★★★

inDefend

inDefend offers a mechanism designed to allow users to detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

A DLP solution for all OS type. - Ravi K.

Ease of use
Support
Ease of Setup

Languages supported: English

4.0
ObserveIT
★★★★★

ObserveIT

Enable your organization to uncover risky user behavior in real-time, investigate incidents, and prevent data exfiltration

Solid product but mass deployment is a nightmare. - Administrator in Computer Software

Ease of use
Support
Ease of Setup
10.0
Data Security Platform
★★★★★

Data Security Platform

Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.

Useful for keeping shared drives safe. - Raquel G.

Ease of use
Support
Ease of Setup
0.0
SearchInform Risk Monitor
★★★★★

SearchInform Risk Monitor

Facilitates internal governance helping you create a threat mitigation platform tailored to the scope and needs. It helps you monitor the maximum number of communication channels, including email, IM, social media, apps such as Skype, printing, uploading to external storage. Assesses security tools whether they conform to the requirements and comply with regulators. Supplies preconfigured policies and allows to conduct an independent in-depth ...

-

Ease of use
Support
Ease of Setup
0.0
Cerebral
★★★★★

Cerebral

Veriato Cerebral is an integrated insider threat security platform, powered by advanced machine learning and AI. Cerebral integrates User Activity Monitoring (UAM) and User Behavior Analytics (UBA) into a powerful solution that allows you to quickly identify and react to signs of breach or fraud. Cerebral provides visibility into emails, chats, web surfing, document movement and more. Once alerted, you can view logs and related screenshot ...

-

Ease of use
Support
Ease of Setup

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

B2B Software Guide