Try our new research platform with insights from 80,000+ expert users

Adaptive Shield vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Valuable Features

No sentiment score available
Sentiment score
7.9
Varonis Platform offers 24/7 support, strong behavior analytics, data security, and compliance features, praised for monitoring and flexibility.
 

Room For Improvement

No sentiment score available
Sentiment score
5.1
Varonis Platform needs cloud integration, improved performance, enhanced troubleshooting, and better interface to address complexity and dependency issues.
 

Stability Issues

No sentiment score available
Sentiment score
6.9
Varonis Platform is stable, reliable, but faces performance issues with new plugins and large data, needing permanent fixes.
 

Scalability Issues

No sentiment score available
Sentiment score
7.2
Varonis Platform is scalable for large environments, especially SaaS, but expanding requires expertise; handles increased data loads efficiently.
 

Customer Service

No sentiment score available
No sentiment score available
Varonis Platform's technical support is praised for responsiveness and effectiveness, despite occasional delays and team transfers.
 

Setup Cost

No sentiment score available
No sentiment score available
Varonis Platform's pricing varies from average to expensive, better suited for large enterprises with distinct licensing needs.
 

Categories and Ranking

Adaptive Shield
Ranking in SaaS Security Posture Management (SSPM)
2nd
Ranking in Identity Threat Detection and Response (ITDR)
20th
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Varonis Platform
Ranking in SaaS Security Posture Management (SSPM)
4th
Ranking in Identity Threat Detection and Response (ITDR)
6th
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
13
Ranking in other categories
Data Loss Prevention (DLP) (13th), Data Governance (8th), Data Security Posture Management (DSPM) (8th), Compliance Management (8th), Ransomware Protection (9th)
 

Mindshare comparison

As of November 2024, in the SaaS Security Posture Management (SSPM) category, the mindshare of Adaptive Shield is 12.3%, down from 16.4% compared to the previous year. The mindshare of Varonis Platform is 6.7%, up from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
SaaS Security Posture Management (SSPM)
 

Featured Reviews

Asaf Rozenblum - PeerSpot reviewer
Provides not only visibility but also remediation information and is helpful in working with people who are not in security-oriented roles
For compliance security checks, it identifies and tells you about a specific compliance, but it would be better if they also attach a link to the rule of the compliance they are referring to. That will be a lot more clear. You won't have to leave the platform every time to find information on the web. They do have a lot of things that keep you inside the app and give you clarity, but there are a couple of little things that got missed. One feature about which I have talked to them multiple times is related to being able to rescan or do a recheck on a specific security issue. Currently, when you fix something and you want to check if it is fixed, you need to power off the integration and then power it on. If there is a clickable button that can re-scan and do a single check or even the whole security check, without powering off and powering on, it will be easier and more efficient.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.
report
Use our free recommendation engine to learn which SaaS Security Posture Management (SSPM) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Computer Software Company
13%
Energy/Utilities Company
7%
Manufacturing Company
7%
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
10%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components. The interface has improved with the move to a SaaS model, but aspects could s...
What is your primary use case for Varonis Platform?
Customers use the product to identify sensitive information, correlate it with access permissions, and utilize its automation engine for remediation. It includes fixing broken permissions and manag...
 

Learn More

Video not available
 

Overview

 

Sample Customers

Information Not Available
Nottingham Building Society