Try our new research platform with insights from 80,000+ expert users

Cynet vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 12, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cynet
Ranking in Ransomware Protection
7th
Average Rating
8.8
Reviews Sentiment
7.5
Number of Reviews
38
Ranking in other categories
Security Information and Event Management (SIEM) (11th), Endpoint Protection Platform (EPP) (17th), User Entity Behavior Analytics (UEBA) (5th), Endpoint Detection and Response (EDR) (14th), Threat Deception Platforms (4th), Network Detection and Response (NDR) (4th), Extended Detection and Response (XDR) (10th)
Varonis Platform
Ranking in Ransomware Protection
9th
Average Rating
8.2
Reviews Sentiment
6.3
Number of Reviews
13
Ranking in other categories
Data Loss Prevention (DLP) (12th), Data Governance (7th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (8th), Compliance Management (8th), Identity Threat Detection and Response (ITDR) (7th)
 

Mindshare comparison

As of February 2025, in the Ransomware Protection category, the mindshare of Cynet is 6.3%, down from 6.9% compared to the previous year. The mindshare of Varonis Platform is 3.1%, up from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Ransomware Protection
 

Featured Reviews

Ch342 - PeerSpot reviewer
Continuously improving and comes with automated response and SIEM/SOC
This is the third company I've worked with, and I've brought them in as a provider. For me, it's as good as it gets. Nobody likes to talk about tens, but they have a better record of detection than CrowdStrike, and they didn't shut down the world like CrowdStrike. If you really dig down into it, who are the founders of the companies? On the one hand, you have a guy who used to be a consultant, I believe, and we know they're full of it. On the other hand, you got a guy who hacked into an Israeli bank, I think, when he was about 15 years old. They eventually hired him, and now this is his third startup. So, when you look at it that way, there's no comparison.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues."
"The most valuable aspect of this solution is that it is a complete solution, which makes cyber security very free and almost perfect. There is no such thing as perfect cyber security, but as far as it can go, sign it comes close to being perfect and holistic. Cynet is always comprehensive from the perspective of functionality, as well as from the standpoint that it encompasses not only technology but also processes and people. The triad of people, processes, and technology is crucial and should always be in place. To my knowledge, no other product or platform combines all three components into one, but Cynet does."
"I would recommend Cynet to others."
"A reliable security system that automatically quarantines anything suspicious."
"It is quite stable. I would rate the stability of the solution a nine out of ten."
"In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpoints and network data for a comprehensive view of threats."
"The interface is exceptionally clear and easy to understand."
"The product is very easy to use. Customers really appreciate that."
"It can easily identify unusual behavior or access patterns that may pose a potential threat, while operating as a unified reporting system."
"The 24/7 support is the most valuable feature. They have been able to answer support questions pretty quickly."
"The analytics would have to be our most valuable feature."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"Varonis Platform is transparent and captures everything in the environment without impacting the performance. The tool helps us unify data feeds into a single reporting system."
"The solution's classification engine is highly configurable and efficient."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"There's also a 90-day policy where if a user is not using the warehouse, it will automatically delete that username."
 

Cons

"Cynet fails to deploy the same technology in mobile devices."
"Could have better integration with other security applications."
"SIEM - Although with their Centralised Log Management Cynet has created the basis for SIEM functionality, this is to be expanded in the near future."
"I would like to see support for mobile protection and some additional reports included."
"The reporting functionality in Cynet may not be as comprehensive or flexible as desired."
"One thing to note is that I highly recommend adding a deep learning-based prevention environment as an additional layer to Cynet. However, I always advise my customers to start with Cynet or XDR, for example, and then focus on the people, technology, and processes involved. This is the best approach to ensure that you are not breached with ransomware. While Cynet can prevent most attacks, there have been cases where ransomware has been quicker than Cynet's detection capabilities. In these situations, an additional tool is necessary to ensure complete protection, and that is what I sell as well."
"In terms of what could be improved, I would say the usability of this product for new threats. Meaning, not everything which is new is properly seen by the product and not all the required actions are taken."
"There is room for improvement in terms of support. The support should be faster to respond."
"We have Microsoft Office 365. I just saw an article today which says that they're actually getting integrated with Microsoft Office 365, which would be a useful feature. For user-based reports, log on activity, and stuff like that, it doesn't seem to really be present like Log360. That could just be my inexperience with it. I've been dealing with it for only about two and a half months."
"The solution's interface is a little complicated with regard to setting up filters and reports."
"The product is very complicated."
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
"I would like it to have cloud integration."
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"For unstructured data monitoring, it's one of the top ones, if not the top one, due to its usability."
 

Pricing and Cost Advice

"Cynet is cheap."
"I don't have specific information about integration capabilities or licensing costs."
"Cynet has a pay-as-you-go pricing model."
"The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
"It gives you a high level of protection at a very good price."
"It costs us 20,000 to 28,000 per year."
"It is extremely affordable. I'll give it a five out of five in terms of price. It was half the cost of the next closest competitor, and the competitor didn't provide SOC services."
"It costs 18,000 per year, but we have the whole package with not only Cynet but also the Perception Point for emails. There are also some small security courses for our users."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"Varonis Platform wasn't certainly the cheapest solution."
"The platform is expensive. I rate the pricing a nine out of ten."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"It's expensive, kind of, really expensive."
"The pricing is good. It neither expensive nor cheap. It is average."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
report
Use our free recommendation engine to learn which Ransomware Protection solutions are best for your needs.
832,565 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
8%
Comms Service Provider
8%
Financial Services Firm
7%
Financial Services Firm
16%
Computer Software Company
11%
Manufacturing Company
9%
Insurance Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

When evaluating User Activity Monitoring, what aspect do you think is the most important to look for?
The support team that stands behind the detection and response. Is there adequate expertise and are they behind you 24x7x365? Cynet CyOps has been there for us.
What do you like most about Cynet?
In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpo...
What is your experience regarding pricing and costs for Cynet?
I think the pricing of Cynet is fair and one of the better options in the market. It's right in the middle compared to other solutions.
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components. The interface has improved with the move to a SaaS model, but aspects could s...
What is your primary use case for Varonis Platform?
Customers use the product to identify sensitive information, correlate it with access permissions, and utilize its automation engine for remediation. It includes fixing broken permissions and manag...
 

Comparisons

 

Overview

 

Sample Customers

Meuhedet, East Boston Neighborhood Health Center
Nottingham Building Society
Find out what your peers are saying about Cynet vs. Varonis Platform and other solutions. Updated: January 2025.
832,565 professionals have used our research since 2012.