"It provides good protection from ransomware and malware attacks. It is very good as compared to other products. If any threat is there, their support is very good. They immediately respond to the users and do a follow-up. They call us and also provide email support."
"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued."
"The initial setup is very fast and very easy."
"This solution requires less management and is very easy to use."
"We are using almost all of the features and we find it quite good overall."
"The product is very easy to use. Customers really appreciate that."
"It's transparent, so it's not something where every user has to press a button to download or do the thing. It is centralized, in fact. Personally, I use Malwarebytes and other tools, which are fine for home use. Cynet is also relatively silent in terms of operation, except when it's required to act."
"We are protecting all our workstations."
"It provides many options for searching. I can see devices from different vendors, like Cisco, in one interface, which is good for me."
"It has a powerful GUI where you can put together your use cases, and don't have to write your own scripts."
"QRadar shows very effective correlations. If you combine all the logins plus user behavior and the current intelligence, it gives a very good correlation for business. I think it reduces the false positives in user activity monitoring because there is a lot of social information to correlate with other data."
"In terms of the most valuable features, the log collections and log processing mechanisms are good. They have good dashboards."
"Integration is very easy and the reporting is good."
"The feature that I find the most useful is that IBM QRadar User Behavior Analytics is free of charge. It's a fully free product that can be installed on top of IBM QRadar SIEM."
"I really like the feature we have with the logs, that if there are any credit card numbers being used, like a PII, you can just use rejects and you can mask it. This is a really good feature in QRadar."
"Most of the features are good. It is an excellent solution."
"The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"Could have better integration with other security applications."
"They have some things in the pipeline, we understand, and they're going to be able to support Android and all these other devices soon. The key is the devices - which is an aspect that is lacking right now. Every company has that problem, not just Cynet."
"I would like to see support for mobile protection and some additional reports included."
"The inability to add contact information inside the Cynet is also an issue because it makes things more complicated. I would like to have a simple feature to enter a contact name and number for the person taking care of that unit or that server."
"Most of their times are in Greenwich Mean Time. I would like to see more local time zones."
"Compliance reports need to improve."
"The dashboard is pathetic and it takes a long time to perform a search."
"While the interface is easy to use, it could be a little more responsive."
"IMB should reduce the pricing, or reduce some of the features for a more economical solution for the customer."
"The user interface and configurability of IBM QRadar User Behavior Analytics can be improved. It has a lot of pre-configured settings and not many things can be changed. It also needs more integrations. Currently, User Behavior Analytics is integrated only with IBM QRadar. It could have deeper integrations. It can also have more complicated scoring models. Currently, it has a very simple linear scoring model for users."
"They have to build more quantitative monitoring, profiling, and make it more predictive."
"We sometimes get an error about the hard drive. Approximately once in two months, we can't find the logs, and they go missing, which is a terrible issue. We are getting support for this issue from our support company."
"There should be an extension where we can get the reports. This could be an extension to the dashboard with the Guardian or another product with limited technology, for example IPS. Now, we only have IBM. Basically, it needs more and more integration models."
"From a functionality point of view there are issues sometimes."
Earn 20 points
Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.
Cynet Consists Of:
With Cynet You Can:
Four different deployment methods:
Cynet Benefits and Features:
Features Users Find Most Valuable:
Reviews from Real Users
“I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues.” - Ken S., Director InfoSec and Audit at a manufacturing company
"The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use." - Senior Cyber Security Manager at a financial services firm
"The dashboard is beautiful, overall ease of use, and the UBA and NBA features are valued." - Harsh P., Cyber Security Operations Center Analyst at Vincacyber
The User Behavior Analytics for QRadar (UBA) app is a tool for detecting insider threats in your organization. It is built on top of the app framework to use existing data in your QRadar to generate new insights around users and risk. UBA adds two major functions to QRadar: risk profiling and unified user identities.
Risk profiling is done by assigning risk to different security use cases. Examples might include simple rules and checks such as bad websites, or more advanced stateful analytics that use machine learning. Risk is assigned to each one depending on the severity and reliability of the incident detected. UBA uses existing event and flow data in your QRadar system to generate these insights and profile risks of users.
Cynet is ranked 1st in User Behavior Analytics - UEBA with 12 reviews while IBM QRadar User Behavior Analytics is ranked 8th in User Behavior Analytics - UEBA with 8 reviews. Cynet is rated 8.6, while IBM QRadar User Behavior Analytics is rated 6.8. The top reviewer of Cynet writes "A complete, transparent, and centralized solution ". On the other hand, the top reviewer of IBM QRadar User Behavior Analytics writes "Stable and solid security intelligence but lacks some functionalities ". Cynet is most compared with CrowdStrike Falcon, SentinelOne, Darktrace, Microsoft Defender for Endpoint and Cortex XDR by Palo Alto Networks, whereas IBM QRadar User Behavior Analytics is most compared with Splunk User Behavior Analytics, Securonix UEBA, LogRhythm Enterprise UEBA, Citrix Analytics and Exabeam Fusion SIEM. See our Cynet vs. IBM QRadar User Behavior Analytics report.
See our list of best User Behavior Analytics - UEBA vendors.
We monitor all User Behavior Analytics - UEBA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.