TOP VENDORS
In Anomaly Detection Software

  1. 6SENSE
    Reviews
    0.0
  2. AGILONE
    Reviews
    0.0
  3. ALTERYX INC
    Reviews
    0.0

Anomaly Detection Software Quadrant

Comparing [object Object] vendors in Anomaly Detection Software across 113 criteria.

Find the best Anomaly Detection Software solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Anomaly Detection Software tools.
Product Maturity
Company Maturity
Most IMPORTANT
4.2
4.2
3.0
Breadth and Depth of Product Offerings
4.50
4.50
4.25
Product Features and Functionality
3.85
4.65
1.55
Product Branding
5.00
4.60
4.80
Product Differentiation and Impact on Customer Value
3.80
2.65
1.05
Product Quality and Reliability
3.65
4.20
4.35
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • The company provides GRA, which is a predictive identity-based behavior anomaly engine that identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics and machine learning. GRA has 3 uniquely combining data science for UEBA, IdA, APM.

    BUYERS
    VENDORS
    EXPERTS
    3.4
    ANALYSTS
     
    • Startup
    • Los Angeles, US
    • Founded: 2010
    • 501 to 1,000
  • HPE offers complete anomaly detection, monitoring, and control services as a comprehensive packaged solution to its commercial clientele. This enables the company to gain a competitive edge in the market. The company possesses a significant breadth of offerings in the UBA area, and provides enhanced features and functionalities to its commercial customers.

    BUYERS
    VENDORS
    EXPERTS
    3.3
    ANALYSTS
     
    • Enterprise
    • Palo Alto, California, United States
    • Founded: 2015
    • 10,001 to 15,000
  • IBM is a prominent player in the field of anomaly detection market. The company provides various services in the area of intrusion detection. Some of these are threat monitoring, multi-vendor intrusion detection, and threat analysis services. IBM has several product offerings, such as cloud security, mainframe security, advanced fraud protection, and endpoint and data security.

    BUYERS
    VENDORS
    EXPERTS
    4.3
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • LogRhythm's products enable organizations to secure their networks and optimize information technology operations. In addition to this, it strives to automate collection, organization, analysis, archival, and recovery of log data that enables enterprises to comply with log data retention regulations. The product’s components include collection, system and network monitoring, analytics modules, log and event managing, and an AI engine.

    BUYERS
    VENDORS
    EXPERTS
    3.2
    ANALYSTS
     
    • Startup
    • Boulder, Colorado, US
    • Founded: 2003
    • $11MN to $50MN
    • 101 to 500
  • SAS offers an enterprise analytic platform used for data management, data integration, and data quality. The company focuses on providing customer-centric solutions for its commercial customers and end-users. The company’s portfolio offers reliable solutions, which are used enterprise wide for fulfilling tasks such as innovative statistical techniques, dynamic data collection, post data-collection contextualization, and dynamic content placement.

    BUYERS
    VENDORS
    EXPERTS
    3.7
    ANALYSTS
     
    • Enterprise
    • North Carolina, US
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
  • Symantec offers a comprehensive range of products and solutions in order to provide high levels of security to protect data and uncover advanced threats. Endpoint and hybrid cloud, messaging and website security, and information protection are the major products offered by the company to its commercial clients. These products provide visibility and remediation of advanced threats for clients across global industry verticals.

    BUYERS
    VENDORS
    EXPERTS
    4.1
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Trend Micro has strong product offerings in the anomaly detection market. The company has various categories under which it provides threat detection and prevention products and solutions. Under the hybrid cloud security category, it provides data center, cloud, and virtualization security. Splunk Analytics for Hadoop is a software that allows users to explore, analyze, and visualize existing Hadoop data.

    BUYERS
    VENDORS
    EXPERTS
    3.5
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • TrustWave offers a wide range of products and services, including data loss prevention, incident response, intrusion detection system, penetration testing, security assessment, security information and event management, to its clients across various industry verticals. Furthermore, the company offers services such as application protection, application code review, application penetration test, incident response, network penetration testing, consulting management and reporting, and physical security and social engineering services.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    3.0
    ANALYSTS
     
    • SME
    • New York, US
    • Founded: 2004
    • $101MN to $500MN
    • 1,001 to 5,000
  • In the anomaly detection market, Wipro offers the Apollo and Holmes solution. Apollo is an anomaly detection platform built to address challenges in fraud, risk, and compliance. The Wipro Holmes fraud and anomaly detection solution helps in proactive fraud, risk, compliance, and unintentional error detection.

    BUYERS
    VENDORS
    EXPERTS
    3.4
    ANALYSTS
     
    • Enterprise
    • Karnataka, India
    • Founded: 1945
    • $5BN to $10BN
    • 1,00,001 to 5,00,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

1. Anomaly Detection is a vast market and is connected to many others. How do I track down its dependencies and effects on other markets?

2. How do I find out the best emerging usecases in anomaly detection market that can be advantageous for my industry?

3. Different parameters are considered while analysing the companies in Anomaly Detection market. What is the criteria to find out the ones that are most important?

TOP REVIEWS

Looking for Anomaly Detection Software? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.