StealthDEFEND

StealthDEFEND

4.4
(4)

Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data.

Work for StealthDEFEND?

Learning about StealthDEFEND?

We can help you find the solution that fits you best.

Find the Right Product

StealthDEFEND Reviews

Ask StealthDEFEND a Question
Write a Review
StealthDEFEND review by User
User
Validated Reviewer
Review Source
content

"Insights I didn't even know I needed"

What do you like best?

I love the alerts for abnormal behavior. We've been able to find some process that were causing small issues here and there but were unable to track down in the past.

What do you dislike?

The software does so much that configuration can be daunting

Recommendations to others considering the product

It is a very complex piece of software but support is amazing and the payoff is well worth it.

What business problems are you solving with the product? What benefits have you realized?

Insight in to what is changing and how often things are changing. We've had trouble in the past with files moving without anyone knowing who did it. Now we can see that very quickly

Sign in to G2 Crowd to see what your connections have to say about StealthDEFEND
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 3 StealthDEFEND reviews
LinkedIn Connections
StealthDEFEND review by Matt D.
Matt D.
Validated Reviewer
Verified Current User
Review Source
content

"StealthDefend is like boarder security - keeps harmful stuff out"

What do you like best?

This program is really ingenious, it is constantly analysing and checking current patterns to ensure that no malicious occurrences are occurring. If it detects something is not right it has several ways to alert you. It is always looking at trends from now and right back to when it was installed. You also have the benefit of running different set of tasks i,e disable the account, shutdown a server, run custom scripts, etc. This program helps us keep one step ahead of the bad guys and keep our data safe and sound.

What do you dislike?

There is no automatic update function, instead you have to go to their website and keep checking for new improvements or bug fixes.

Recommendations to others considering the product

If your looking for a product that protects against next generation threats this product should be high on your list to consider. This does an amazing job of detecting patterns and analyzing potential threats, before you even know what is going on - it has already highlighted what is going on where and when. This product also is not as pricey as some of the other products on the market, which is great because this gives you the protection you need with out the huge cost.

What business problems are you solving with the product? What benefits have you realized?

Protecting against cryptolocker type of malware and keeping our data safe.

Sign in to G2 Crowd to see what your connections have to say about StealthDEFEND
StealthDEFEND review by Administrator in Sporting Goods
Administrator in Sporting Goods
Validated Reviewer
Verified Current User
Review Source
content

"Powerful insights into data and systems."

What do you like best?

The reports are easily consumable, and actionable. The alerts allow for prompt response and resolution of issues. The pre-configured reports and alerts cover some of the most critical cases. The report and dashboard interfaces provide a quick and easy way to review the status of the environment.

What do you dislike?

The system is quite complex and requires significant understanding to utilize fully. The menus are a bit hard to navigate, and the overall feel of the system is not intuitive. The setup process has had a few roadbumps as well due to recent releases having some incompatibilities with our environment.

Recommendations to others considering the product

This is an incredibly powerful tool. It's worth the effort to configure and implement as it provides nearly immeasurable time savings once running. It also provides more insight into company and user behaviors than just about any other tools.

What business problems are you solving with the product? What benefits have you realized?

StealthDEFEND is moving us towards compliance with security requirements without increasing our staffing needs.

What Data Security solution do you use?

Thanks for letting us know!
StealthDEFEND review by Executive Sponsor in Information Technology and Services
Executive Sponsor in Information Technology and Services
Validated Reviewer
Review Source
content

"Implementing and happy so far"

What do you like best?

I like the deep functionality and configurability of the product.

What do you dislike?

UI is a little busy and intuitive compared to competitor.

What business problems are you solving with the product? What benefits have you realized?

We are assuring compliance with audits and improving our security posture.

There are not enough reviews of StealthDEFEND for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Box Zones Logo
Box Zones
4.2
(30)
Box Zones enables organizations to address data residency obligations across multiple geographies, allowing them to raise the bar for privacy and control in the cloud.
2
OpenSSH Logo
OpenSSH
4.9
(29)
OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.
3
Sophos SafeGuard Encryption Logo
Sophos SafeGuard Encryption
3.8
(24)
Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.
4
StealthAUDIT Management Platform Logo
StealthAUDIT Management Platform
4.4
(24)
StealthAUDIT Management Platform (SMP) is an IT infrastructure management framework designed to facilitate data collection, analysis, remediation, and reporting.
5
AWS Key Management Service (KMS) Logo
AWS Key Management Service (KMS)
4.4
(24)
AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.
6
Trend Micro Logo
Trend Micro
4.0
(23)
Trend Micro develops server security, cloud security, and small business content security solutions.
7
Amazon Inspector Logo
Amazon Inspector
4.2
(19)
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities or deviations from best practices.
8
TokenEx Logo
TokenEx
4.6
(17)
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store, and secure data. TokenEx extends flexibility by working with multiple data acceptance channels and by maintaining a processor-agnostic approach. Moreover, TokenEx is able to tokenize and secure almost any data type your company works with, including PCI, PII, PHI, and even unstructured data formats.
9
IBM Security Guardium Logo
IBM Security Guardium
4.0
(15)
IBM Security® Guardium® helps ensure the security, privacy and integrity of your critical data across a full range of environments, from databases to big data, cloud, file systems and more.
10
HashiCorp Vault Logo
HashiCorp Vault
4.0
(14)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
Show more

Learn more about StealthDEFEND

StealthDEFEND Videos

StealthDEFEND Downloads

Kate from G2 Crowd

Learning about StealthDEFEND?

I can help.
* We monitor all StealthDEFEND reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.