Anomaly Detection Software in Middle East and Africa

Comparing 23 vendors in Anomaly Detection Software across 113 criteria.
All vendors(17)
Filters
Reset
5
1
2
3
10
11
9
12
9
8
12
9
7
9
14
16
16
9
11
12
12
8
15
IBM is a prominent player in the field of anomaly detection market. The company provides various services in the area of intrusion detection. Some of these are threat monitoring, multi-vendor intrusion detection, and threat analysis services. IBM has several product offerings, such as cloud security, mainframe security, advanced fraud protection, and endpoint and data security.
Read less Read more
Symantec offers a comprehensive range of products and solutions in order to provide high levels of security to protect data and uncover advanced threats. Endpoint and hybrid cloud, messaging and website security, and information protection are the major products offered by the company to its commercial clients. These products provide visibility and remediation of advanced threats for clients across global industry verticals.
Read less Read more
SAS offers an enterprise analytic platform used for data management, data integration, and data quality. The company focuses on providing customer-centric solutions for its commercial customers and end-users. The company’s portfolio offers reliable solutions, which are used enterprise wide for fulfilling tasks such as innovative statistical techniques, dynamic data collection, post data-collection contextualization, and dynamic content placement.
Read less Read more
3.6
The company offers a wide range of solutions to deal with anomaly detection, insider threat management, identity and access, application and network security, data exfiltration intelligence, threat intelligence, risk monitoring, and cloud and fraud security. The company also provides services, such as professional, managed, support, and education, for security intelligence solutions.
Read less Read more
3.5
Dell Technologies offers a wide range of computers, and associated products and services through diversified business segments serving global commercial clientele. The company’s flagship product, RSA Security Analytics, detects advanced threats with the use of machine learning and helps understand unknown attacks.
Read less Read more
Trend Micro has strong product offerings in the anomaly detection market. The company has various categories under which it provides threat detection and prevention products and solutions. Under the hybrid cloud security category, it provides data center, cloud, and virtualization security. Splunk Analytics for Hadoop is a software that allows users to explore, analyze, and visualize existing Hadoop data.
Read less Read more
3.4
The company provides GRA, which is a predictive identity-based behavior anomaly engine that identifies anomalous behaviors across users, accounts, applications, and devices by leveraging behavior analytics and machine learning. GRA has 3 uniquely combining data science for UEBA, IdA, APM.
Read less Read more
In the anomaly detection market, Wipro offers the Apollo and Holmes solution. Apollo is an anomaly detection software built to address challenges in fraud, risk, and compliance. The Wipro Holmes fraud and anomaly detection solution helps in proactive fraud, risk, compliance, and unintentional error detection.
Read less Read more
3.4

Rapid7 InsightIDR is a fast-to-implement cloud-based SIEM designed to rapidly identify complex attacks. It combines data from AWS sources like CloudTrail and GuardDuty, all together with information from on-premises networks, endpoints, and other cloud platforms. It engages User Behavior Analytics (UBA), industry-leading threat intelligence, and automated workflows to help security teams discover and examine threats in AWS environments and across the organization’s entire IT footprint.

Read less Read more
3.3
HPE offers complete anomaly detection, monitoring, and control services as a comprehensive packaged solution to its commercial clientele. This enables the company to gain a competitive edge in the market. The company possesses a significant breadth of offerings in the UBA area, and provides enhanced features and functionalities to its commercial customers.
Read less Read more

Aqueduct Technologies provide advanced security as a solution in which anomaly detection is used extensively. Aqueduct Technologies specializes in helping organizations transform their businesses by leveraging the private, public, and hybrid cloud.

Read less Read more
3.2
LogRhythm's products enable organizations to secure their networks and optimize information technology operations. In addition to this, it strives to automate collection, organization, analysis, archival, and recovery of log data that enables enterprises to comply with log data retention regulations. The product’s components include collection, system and network monitoring, analytics modules, log and event managing, and an AI engine.
Read less Read more
TrustWave offers a wide range of products and services, including data loss prevention, incident response, intrusion detection system, penetration testing, security assessment, security information and event management, to its clients across various industry verticals. Furthermore, the company offers services such as application protection, application code review, application penetration test, incident response, network penetration testing, consulting management and reporting, and physical security and social engineering services.
Read less Read more

The threat detection and response solution from Varonis simplify security investigations, detect suspicious activity on data, get insight into privileged account behavior, and investigate security incidents directly in dashboard. This solution continuously monitors and alerts core data and systems.

Read less Read more
Splunk is engaged in the development and marketing of software solutions. Splunk offerings enable users to collect, index, search, explore, monitor, and analyze data. They address diverse data sets that are referred to as big data and are specifically used for machine data. The company's anomaly detection products help users in various roles, including IT, security, and business professionals, to analyze their machine data and achieve real-time visibility and intelligence about their organization's operations.
Read less Read more
In the anomaly detection market, the company offers a user behavior anomaly detection software, which is a big data solution combination of Non-Structured Query Language (NoSQL), Structured Query Language (SQL) wrappers, real-time transformations, and streaming analytics.
Read less Read more
2.4
Anodot’s flagship anomaly detection software named Anomaly Detection OEM is instrumental in monitoring and detecting the outliers reflected in the data, and it receives early warnings about the issues present in the data. It provides the Anodot API to stream data on the Anodot cloud. This helps in retrieving the anomalies in real time via API.
Read less Read more