StealthDEFEND

Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data.

Languages supported:

8.8/10 (Expert Score) ★★★★★
Product is rated as #15 in category Cloud File Security Software
Ease of use
Support
Ease of Setup

Images

Check Software Images

StealthDEFEND is the real-time threat analytics component of STEALTHbits’ Data Access Governance Suite. Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data.

TOP FEATURES:

– Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users.
– Seamless Sensitive Data Integration – Threat and Data Access Governance information is seamlessly integrated, further reducing noise by honing in specifically on the files that matter most.
– Preconfigured Threat Models – StealthDEFEND has been purpose-built to detect file system threats associated with Ransomware, Abnormal Behavior, First Time Host Access, First Time Client Use, Unusual Processes, and more.
– Response Playbooks – StealthDEFEND’s actions engine automates security responses and connects various security applications and processes together with multi-stage actions. Out-of-the-Box or custom “Playbooks” can be leveraged to respond to threats automatically or programatically.
– User Behavioral Profiles – Concrete understanding of each individual user’s behavior is incorporated into StealthDEFEND’s threat analytics and Machine Learning models, complemented by visuals that make understanding any user’s normal behavior a trivial task.
– Comprehensive Investigations – Create, configure, and save detailed reports, alerts, and threats on User and Group activity.
– SIEM Integration – Out-of-the-box SIEM integration and preconfigured dashboards extend ready-to-use functions.
– Real-Time Alerting – Real-time security alerts powered by Machine Learning allow you to master your threat data in a continuous way that leads to faster investigations and threat neutralizations.
– Interactive, Real-Time Visualizations – Through a unified web presentation layer, threat data is streamed, processed, and visualized as it happens, including modern visualization elements like heat maps that update themselves in real-time to bring data to life.
– Incident Detection Response Workflow – Quickly coordinate your team’s efforts so they’re prepared to share information and track who is working on an issue at any given time.

StealthDEFEND
StealthDEFEND

Show more categories

Customer Reviews

StealthDEFEND Reviews

Matt D.

Advanced user of StealthDEFEND
★★★★★
StealthDefend is like boarder security - keeps harmful stuff out

What do you like best?

This program is really ingenious, it is constantly analysing and checking current patterns to ensure that no malicious occurrences are occurring. If it detects something is not right it has several ways to alert you. It is always looking at trends from now and right back to when it was installed. You also have the benefit of running different set of tasks i,e disable the account, shutdown a server, run custom scripts, etc. This program helps us keep one step ahead of the bad guys and keep our data safe and sound.

What do you dislike?

There is no automatic update function, instead you have to go to their website and keep checking for new improvements or bug fixes.

Recommendations to others considering the product:

If your looking for a product that protects against next generation threats this product should be high on your list to consider. This does an amazing job of detecting patterns and analyzing potential threats, before you even know what is going on - it has already highlighted what is going on where and when. This product also is not as pricey as some of the other products on the market, which is great because this gives you the protection you need with out the huge cost.

What problems are you solving with the product? What benefits have you realized?

Protecting against cryptolocker type of malware and keeping our data safe.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide