Anomaly detection is defined as the identification and determination of details about the occurrence of an unusual pattern that does not conform to the expected behavior. The occurrence of anomalies is a rare event, however, when it occurs, it may signify a large and significant threat, such as data theft, fraud, and cyber intrusion. An anomaly is classified into network-based anomaly and user behavior-based anomaly. Network-based anomalies are the unusual patterns observed during the monitoring of network traffic. The user behavior-based anomaly detection detects threats or unusual behaviors of users with the help of statistical analysis and algorithms.

VISIONARY LEADERS

Visionary leaders are the leading market players in terms of new developments such as product launches, innovative technologies, and the adoption of growth strategies. These players have a broad product offering that caters to most of the regions globally. Visionary leaders primarily focus on acquiring the leading market position through their strong financial capabilities and their well-established brand equity.

INNOVATORS

Innovators in the competitive leadership mapping are vendors that have demonstrated substantial product innovations as compared to their competitors. The companies have focused on product portfolios. However, they do not have very strong growth strategies for their overall business, when compared with the visionary leaders.

DYNAMIC DIFFERENTIATORS

Dynamic Differentiators are established players with very strong business strategies. However, they have a weaker product portfolio compared to the visionary leaders. They generally focus only on a specific type of technology related to the product.

EMERGING COMPANIES

Emerging companies have niche product and service offerings. Their business strategies are not as strong as that of the established vendors. The emerging vendors include the new entrants in the market, emerging in terms of product portfolio and geographic reach, and require time to gain significant traction in the market.

Anomaly Detection Software Quadrant

Comparing 41 vendors in Anomaly Detection Software across 147 criteria.

Find the best Anomaly Detection Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Anomaly Detection Software tools.
  • Breadth and Depth of Product Offerings
    • Services Offered
      • Integration & Deployment
      • Support & Maintenance
      • Business Consulting Services
      • Other Services
    • Products Offered
      • Network Behaviour Anomoly Detection
      • User Behaviour Anomoly Detection
  • Product Features and Functionality
    • Solutions Offered
      • Network Traffic Analytics (Traffic Monitoring)
      • Network Intelligence and Security (DDOS and IDS/IPS)
      • Identity and access management (IAM)
      • Threat Intelligence and Management
      • SIEM(Log Management)
      • Risk Mitigation and Management (Network Dectection)
      • Data Loss Prevention (DLP)
  • Product Branding
    • Industry Verticals
      • BFSI
      • Retail and Consumer Goods
      • IT and Telecom
      • Healthcare and Life Sciences
      • Media and Entertainment
      • Manufacturing
      • Other Industry Verticals
    • End-Users
      • SME's
      • Large Enterprises
  • Product Differentiation and Impact on Customer Value
    • Technology Offered
      • Big Data Analytics
      • Data Mining & Business Intelligence
      • Machine Learning & AI
  • Product Quality and Reliability
    • Support Services
      • Customer support service
      • Documentation
      • Support Program
      • Support Training
    • Medium of Delivery of Support Services
      • On-Site Support
      • Remote Support
    • Frequency of Support Services
      • Frequency of Support Services - Monthly
      • Frequency of Support Services - Quarterly

TOP VENDORS

    • Startup
    • California, US
    • Founded: 2013
    • Below $10 MN
    • 101 to 500
    • Startup
    • California, US
    • Founded: 2005
    • $11MN to $50MN
    • 51 to 100
    • SME
    • California, US
    • Founded: 1997
    • $101MN to $500MN
    • 101 to 500
    • Startup
    • Ontario, Canada
    • Founded: 1984
    • Below $10 MN
    • 1 to 50
  • #

    Anodot’s flagship anomaly detection solution named Anomaly Detection OEM is instrumental in monitoring and detecting the outliers reflected in the data, and it receives early warnings about the issues present in the data. It provides the Anodot API to stream data on the Anodot cloud. This helps in retrieving the anomalies in real time via API.

    Read More
    • Startup
    • Raanana, Israel
    • Founded: 2014
    • 101 to 500
    • Startup
    • Massachusetts, USA
    • Founded: 2011
    • $10BN to $50BN
    • 51 to 100
  • #

    Cisco is highly focused on designing products that transform the way people communicate and collaborate. The company possesses a significant breadth of offerings in the anomaly detection arena and provides enhanced features and functionalities to its commercial customers. Some of the products are NetFlow, CS-MARS, Traffic Anomaly Detectors, Guard DDoS Mitigation Appliances, IPS sensors (version 6.x and later), and NAM.

    Read More
    • Enterprise
    • California, USA
    • Founded: 1984
    • $10BN to $50BN
    • 50,001 to 75,000
    • Startup
    • Illinois, US
    • Founded: 2013
    • Below $10 MN
    • 101 to 500
    • Enterprise
    • Sterling, VA, US
    • Founded: 2010
    • 501 to 1,000
  • #

    Dell Technologies offers a wide range of computers, and associated products and services through diversified business segments serving global commercial clientele. The company’s flagship product, RSA Security Analytics, detects advanced threats with the use of machine learning and helps understand unknown attacks.

    Read More
    • Enterprise
    • 1 to 50
    • Startup
    • California, US
    • Founded: 2013
    • Below $10 MN
    • 101 to 500
    • Startup
    • Connecticut, US
    • Founded: 2006
    • Below $10 MN
    • 51 to 100
    • Enterprise
    • California, US
    • Founded: 1956
    • $500MN to $1BN
    • 1,001 to 5,000
  • #

    In the anomaly detection market, Flowmon Networks offers Flowmon ADS for catering NBA and anomaly detection, network monitoring and visibility, and DDoS Protection. Flowmon ADS works as a forefront warrior in the technology-driven battle against modern cyber threats that bypass traditional perimeters and endpoint security.

    Read More
    • Startup
    • Oulu, Finland
    • Founded: 2003
    • 1 to 50
    • Startup
    • California, US
    • Founded: 2007
    • Below $10 MN
    • 51 to 100
    • Startup
    • California, US
    • Founded: 2008
    • 101 to 500
  • #

    The company offers Mendel Analyst, which helps improve security and network operations capabilities by detecting network anomalies based on historical network behavior. It uses advanced machine learning, artificial intelligence, and specialized algorithms to detect critical threats and behavioral anomalies with minimal operational cost.

    Read More
    • Startup
    • South Moravia, Czech Republic
    • Founded: 2016
    • 1 to 50
  • #

    Guardian Analytics offers a reliable anomaly detection product named FraudDESK. FraudDESK is instrumental in preventing frauds associated with banking.

    • Startup
    • Mountain View, CA, US
    • Founded: 2005
    • $11MN to $50MN
    • 101 to 500
  • #

    The company provides GRA, which is a predictive identity-based behavior anomaly engine that identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics and machine learning. GRA has 3 uniquely combining data science for UEBA, IdA, APM.

    Read More
    • Startup
    • Los Angeles, US
    • Founded: 2010
    • 501 to 1,000
  • #

    In the anomaly detection market, the company offers a user behavior anomaly detection solution, which is a big data solution combination of Non-Structured Query Language (NoSQL), Structured Query Language (SQL) wrappers, real-time transformations, and streaming analytics.

    Read More
    • SME
    • 501 to 1,000
  • #

    HPE offers complete anomaly detection, monitoring, and control services as a comprehensive packaged solution to its commercial clientele. This enables the company to gain a competitive edge in the market. The company possesses a significant breadth of offerings in the UBA area, and provides enhanced features and functionalities to its commercial customers.

    Read More
    • Enterprise
    • Palo Alto, California, United States
    • Founded: 2015
    • 10,001 to 15,000
  • #

    IBM is a prominent player in the field of anomaly detection market. The company provides various services in the area of intrusion detection. Some of these are threat monitoring, multi-vendor intrusion detection, and threat analysis services. IBM has several product offerings, such as cloud security, mainframe security, advanced fraud protection, and endpoint and data security.

    Read More
    • Enterprise
    • 1 to 50
    • SME
    • New York, US
    • Founded: 1975
    • $101MN to $500MN
    • 1,001 to 5,000
    • Startup
    • Bracknell Forest, UK
    • Founded: 1987
    • Below $10 MN
    • 51 to 100
  • #

    LogRhythm's products enable organizations to secure their networks and optimize information technology operations. In addition to this, it strives to automate collection, organization, analysis, archival, and recovery of log data that enables enterprises to comply with log data retention regulations. The product’s components include collection, system and network monitoring, analytics modules, log and event managing, and an AI engine.

    Read More
    • Startup
    • 101 to 500
  • #

    Niara offers a security analytics platform, which includes a behavioral analytics solution that uses machine learning-based techniques to detect anomalous behaviors and find attackers without upfront configurations. The platform applies behavioral analytics on a combination of network and security data, and provides comprehensive Entity360 risk profiles for users, hosts, and IP addresses.

    Read More
    • Enterprise
    • Santa Clara, CA, US
    • Founded: 2013
    • 5,001 to 10,000
    • Enterprise
    • Pennsylvania, US
    • Founded: 1993
    • $1BN to $5BN
    • 1,001 to 5,000
    • Startup
    • California, US
    • Founded: 2012
    • $11MN to $50MN
    • 501 to 1,000
    • SME
    • 501 to 1,000
  • #

    SAS offers an enterprise analytic platform used for data management, data integration, and data quality. The company focuses on providing customer-centric solutions for its commercial customers and end-users. The company’s portfolio offers reliable solutions, which are used enterprise wide for fulfilling tasks such as innovative statistical techniques, dynamic data collection, post data-collection contextualization, and dynamic content placement.

    Read More
    • Enterprise
    • North Carolina, USA
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
  • #

    The company offers a wide range of solutions to deal with anomaly detection, insider threat management, identity and access, application and network security, data exfiltration intelligence, threat intelligence, risk monitoring, and cloud and fraud security. The company also provides services, such as professional, managed, support, and education, for security intelligence solutions.

    Read More
    • Startup
    • Addison, Texas, US
    • Founded: 2007
    • $11MN to $50MN
    • 101 to 500
    • Startup
    • New York, US
    • Founded: 2004
    • Below $10 MN
    • 501 to 1,000
  • #

    Splunk is engaged in the development and marketing of software solutions. Splunk offerings enable users to collect, index, search, explore, monitor, and analyze data. They address diverse data sets that are referred to as big data and are specifically used for machine data. The company's anomaly detection products help users in various roles, including IT, security, and business professionals, to analyze their machine data and achieve real-time visibility and intelligence about their organization's operations.

    Read More
    • Enterprise
    • San Francisco, California, US
    • Founded: 2003
    • $500MN to $1BN
    • 1,001 to 5,000
  • #

    Symantec offers a comprehensive range of products and solutions in order to provide high levels of security to protect data and uncover advanced threats. Endpoint and hybrid cloud, messaging and website security, and information protection are the major products offered by the company to its commercial clients. These products provide visibility and remediation of advanced threats for clients across global industry verticals.

    Read More
    • Enterprise
    • 1 to 50
    • Enterprise
    • Washington, US
    • Founded: 2003
    • $500MN to $1BN
    • 1,001 to 5,000
    • Enterprise
    • California, US
    • Founded: 1979
    • $1BN to $5BN
    • 10,001 to 15,000
    • Enterprise
    • 1,001 to 5,000
  • #

    Trend Micro has strong product offerings in the anomaly detection market. The company has various categories under which it provides threat detection and prevention products and solutions. Under the hybrid cloud security category, it provides data center, cloud, and virtualization security. Splunk Analytics for Hadoop is a software that allows users to explore, analyze, and visualize existing Hadoop data.

    Read More
    • SME
    • 1,001 to 5,000
  • #

    TrustWave offers a wide range of products and services, including data loss prevention, incident response, intrusion detection system, penetration testing, security assessment, security information and event management, to its clients across various industry verticals. Furthermore, the company offers services such as application protection, application code review, application penetration test, incident response, network penetration testing, consulting management and reporting, and physical security and social engineering services.

    Read More
    • SME
    • 501 to 1,000
    • SME
    • New York, US
    • Founded: 2004
    • $101MN to $500MN
    • 1,001 to 5,000
  • #

    In the anomaly detection market, Wipro offers the Apollo and Holmes solution. Apollo is an anomaly detection platform built to address challenges in fraud, risk, and compliance. The Wipro Holmes fraud and anomaly detection solution helps in proactive fraud, risk, compliance, and unintentional error detection.

    Read More
    • Enterprise
    • Karnataka, India
    • Founded: 1945
    • $5BN to $10BN
    • 1,00,001 to 5,00,000

TOP REVIEWS

Looking for Anomaly Detection Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.