Compare Top Anomaly Detection Software

Get to know the strength and weaknesses of top vendors in Anomaly Detection Software market. Compare vendors against their competitors on the basis of criteria, the scores of which are derived by ratings from buyers, industry experts, MnM analysts and vendors. Set comparison preferences option allows you to decide features which are important to you and evaluate vendors considering them as your parameters.

EVALUATION CRITERIA

4.34
4.05
3.66
  • Breadth and Depth of Product Offerings

    • Services Offered

      Integration & Deployment | Support & Maintenance | Business Consulting Services | Other Services |
    • Products Offered

      Network Behaviour Anomoly Detection | User Behaviour Anomoly Detection |
  • Product Features and Functionality

    • Solutions Offered

      Network Traffic Analytics (Traffic Monitoring) | Network Intelligence and Security (DDOS and IDS/IPS) | Identity and access management (IAM) | Threat Intelligence and Management | SIEM(Log Management) | Risk Mitigation and Management (Network Dectection) | Data Loss Prevention (DLP) | Other Features Offered |
  • Product Branding

    • Industry Verticals

      BFSI | Retail and Consumer Goods | IT and Telecom | Healthcare and Life Sciences | Media and Entertainment | Manufacturing | Other Industry Verticals |
    • End-Users

      SME's | Large Enterprises |
  • Product Differentiation and Impact on Customer Value

    • Technology Offered

      Big Data Analytics | Data Mining & Business Intelligence | Machine Learning & AI | Other technology offered |
  • Product Quality and Reliability

    • Support Services

      Customer support service | Documentation | Support Program | Support Training |
    • Medium of Delivery of Support Services

      On-Site Support | Remote Support |
    • Frequency of Support Services

      Frequency of Support Services - Monthly | Frequency of Support Services- Quarterly | Frequency of Support Services- Bi-Annually | Frequency of Support Services - Annually | Any other Frequency of Support Services |
  • Geographic Footprint

    • Direct Presence - North America

    • Direct Presence - Europe

    • Direct Presence - Asia-Pacific

    • Direct Presence - Middle East and Africa

    • Direct Presence - Latin America

    • Sales Office - Europe

    • Sales Office - Asia-Pacific

    • Sales Office - Middle East and Africa

    • Sales Office - Latin America

    • Indirect Presence - North America

    • Indirect Presence - Europe

    • Indirect Presence - Asia-Pacific

    • Indirect Presence - Middle East and Africa

    • Indirect Presence - Latin America

    • Sales Office - North America

  • Breadth of Applications Served

    • Industry Verticals

      BFSI | Retail and Consumer Goods | IT and Telecom | Healthcare and Life Sciences | Media and Entertainment | Manufacturing | Other Industry Verticals |
  • Channel Strategy and Fit

    • Strategy to Manage Partners

    • Strategy to Address New Target Audience

    • Partner Ecosystem

      Solution Providers | System Integrators | Technology Providers | Value Added Resellers (VAR) | Other Partner Ecosystem |
  • Effectiveness of Organic and Inorganic Growth Strategy

    • Total Revenue

    • Revenue Growth Rate (Y-o-Y)

    • No. of Customers

    • % Revenue from Regions

      Revenue - North America | Revenue - Europe | Revenue - Asia-Pacific | Revenue - Middle East and Africa | Revenue - Latin America |
  • Effectiveness of Organic Growth Strategy

    • No. of New Products Launched

    • No. of New Customers in Last One Year

    • R&D Spend

  • Mergers and Acquisitions Strategy

    • No. of Mergers and Acquisitions

    • No. of Joint Ventures

    • No. of Partnerships and Collaborations

  • Total Funding Amount

  • Revenue

  • Funding Status

  • Protecting web-based retail business

  • Preventing leakage of sensitive data

  • Network intrusion detection

  • Detecting anomalous log-on patterns

  • Detecting abnormal finance activities

  • Advanced penetration detection