4 VendorsBlog
We pay for content
Splunk User Behavior Analytics

Add to comparison

Splunk User Behavior Analytics

Splunk User Behavior Analytics - Securing against unkown threats through user and entity behavior analytics

Features of product

Проблемы Pain points
  • Employee personal use of corporate IT during working hours
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Unaurthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors

About Product

Detect unknown threats and anomalous behavior using machine learning

  • Advanced Threat Detection. Discover abnormalities and unknown threats that traditional security tools miss
  • Higher Productivity. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life
  • Accelerate Threat Hunting. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat

Automatically find unknown threats using machine learning

  • Enhance Visibility and Detection. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution.
  • Accelerate Threat Hunting. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications.
  • Augment SOC Resources. Automatically stitch hundreds of anomalies observed across multiple-entities—users, accounts, devices and applications - to a single threat for faster action.
  • Better Together: Splunk ES and Splunk UBA. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions by combing Splunk® Enterprise Security and Splunk UBA.




On-premises software
Advanced Analytics N/A
Incident Response
Machine Learning
Deep Learning N/A
Visibility into users via reports and dashboards
Near real-time alerts
Forensic Tools