Average Ratings 0 Ratings
Average Ratings 1 Rating
API Access
Has API
API Access
Has API
Integrations
IBM QRadar SIEM
OpenText ArcSight Enterprise Security Manager
Splunk Enterprise
Active Directory
CnSight
CyberArk Privileged Access Manager
Google Cloud BigQuery
Jira
LogRhythm SIEM
Microsoft 365
Integrations
IBM QRadar SIEM
OpenText ArcSight Enterprise Security Manager
Splunk Enterprise
Active Directory
CnSight
CyberArk Privileged Access Manager
Google Cloud BigQuery
Jira
LogRhythm SIEM
Microsoft 365
Pricing Details
$12/month/user
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Deployment
SaaS
iPhone
iPad
Android
Windows
Mac
Linux
Support
Phone Support
24/7 Live Support
Online
Support
Phone Support
24/7 Live Support
Online
Training
Documentation
Webinars
Live Online
In Person
Training
Documentation
Webinars
Live Online
In Person
Vendor Details
Company Name
Teramind
Founded
2014
Country
United States
Website
www.teramind.co
Vendor Details
Company Name
Varonis
Founded
2005
Country
United States
Website
www.varonis.com/products/data-security-platform/
Product Features
Business Process Management
Access Controls / Permissions
Alerts / Notifications
Business Process Automation
Business Rules Management
Collaboration
Process Change Tracking
Process Mapping
Process Modeling & Design
Visual Workflow Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Employee Monitoring
Activity Monitoring
Browsing History
Email Monitoring
Keystroke Recording
Productivity Analysis
Remote Control
Screen Activity Recording
Time & Attendance
Time Tracking
HR Analytics
Compensation Plan Modeling
Dashboard
HR Metrics Library
Leave & Absence Reporting
Predictive Modeling
Recruiting Management
Succession Planning
Talent Management
Trend Analysis
Turnover Tracking
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Time Tracking
Automatic Time Capture
Billable & Non-Billable Hours
Billing & Invoicing
Employee Database
Expense Tracking
Mobile Time Tracking
Multiple Billing Rates
Offline Time Tracking
Online Time Tracking
Overtime Calculation
Time per Project Reporting
Timesheet Management
Vacation / Leave Tracking
Workforce Management
Budgeting & Forecasting
Contractor Management
Employee Lifecycle Management
Labor Projection
Performance Appraisal
Recruiting Management
Scheduling
Skills Tracking
Time & Attendance
Variable Workforce
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Discovery
Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Loss Prevention
Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting