Try our new research platform with insights from 80,000+ expert users

ThreatBook Threat Intelligence Platform (TIP) vs Varonis Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 7, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ThreatBook Threat Intellige...
Average Rating
9.6
Reviews Sentiment
7.6
Number of Reviews
4
Ranking in other categories
Threat Intelligence Platforms (17th)
Varonis Platform
Average Rating
8.2
Reviews Sentiment
6.4
Number of Reviews
14
Ranking in other categories
Email Security (20th), Data Loss Prevention (DLP) (9th), User Entity Behavior Analytics (UEBA) (6th), Data Governance (4th), SaaS Security Posture Management (SSPM) (5th), Data Security Posture Management (DSPM) (3rd), Compliance Management (7th), Ransomware Protection (10th), Identity Threat Detection and Response (ITDR) (7th)
 

Featured Reviews

RG
Enhancement in incident response through reduced false positives and contextual intelligence
ThreatBook has positively impacted our organization by allowing us to detect all alerts and threats effectively. In the past, we needed to search logs from various sources, including terminals, DI servers, and firewalls, collecting a lot of logs and searching the internet for contextual information about threat actors. After using ThreatBook TDP, all alerts and contexts are easily displayed on the dashboard, making it very helpful for us. During the incident response scenario, ThreatBook saves us over 80% of the time for each incident. We usually took about one day or two days for attribution and understanding how the attacker attacked us, but after using ThreatBook TDP, we usually take around one or two hours to finish all these tasks. Additionally, their AI techniques save a lot of time, allowing me to ask in natural language for explanations about the meaning and target of the attacker.
Frederic  Delos - PeerSpot reviewer
Offers the ability to identify sensitive areas, allowing you to drill down into the sensitive data
The most effective feature for me is its ability to identify sensitive areas, allowing you to drill down into the sensitive data, provided you have access, to determine whether it's a false positive or a true positive. That's the best thing for me, out of all of it. It's got everything, like other ones, but I like to be able to look at something if I'm doing forensics on the alert and say, "Okay, do I really need to do something with this?" For example, we don't want sensitive data in our OneDrive. So it identifies the sensitive data that's possibly in the OneDrive. And what I can do is look at it and identify whether it's actually sensitive data in Datalert or whether it looks like sensitive data, but I know it's a false positive. If it is a false positive, I can basically say ignore this pattern based on X, Y, and Z, you know, whether it's Redjax or keyword proximity. So I like that. With other tools, I gotta go through a whole process because it's a little bit more complex. Here, I can tag it and bag it in one shot. And the next good time I scan, it slips over it. So it helps in that.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"ThreatBook Threat Intelligence Platform (TIP) has positively impacted our organization by helping us generate the strategic threat focus reports and aiding us in decision-making, leading to improved cybersecurity operation efficiency."
"We have not suffered from any attack for the past few months, which has relatively improved our network security."
"ThreatBook saves us over 80% of time for each incident, reducing the usual time taken from one or two days for attribution to just one or two hours, thanks to their AI techniques."
"ThreatBook saves us over 80% of the time for each incident."
"It can easily identify unusual behavior or access patterns that may pose a potential threat, while operating as a unified reporting system."
"The analytics would have to be our most valuable feature."
"I also appreciate the reporting feature, which allows for the extraction of various reports based on specific needs. These reports can be used for audit purposes, such as tracking changes in file locations or deletions."
"There's also a 90-day policy where if a user is not using the warehouse, it will automatically delete that username."
"The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand what's happening in our environment."
"The solution ensures that users have not accidentally shared sensitive information with the wrong people or too many people."
"That alerting and reporting service is great."
"Technical support from Varonis is rated as nine out of ten."
 

Cons

"I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good."
"ThreatBook Threat Intelligence Platform (TIP) could be improved by providing more integrations to support additional platforms."
"We’ve seen strong ROI through reduced incident response times, increased threat visibility, and less time wasted on false positives."
"It would be great if ThreatBook could integrate with our ITSM system to streamline the tasks and incident management"
"One area for improvement is the calculation engine. When applying rules in Varonis, especially for large datasets (terabytes of data), the calculations can be slow and require time to process. Speeding up this process would be beneficial."
"The GUI should be more functional. There should be a process for connecting through Chrome, Internet Explorer, etc."
"I'd like to see automatic updates for this solution. Currently, it's a manual process to update all the keywords"
"We have Microsoft Office 365. I just saw an article today which says that they're actually getting integrated with Microsoft Office 365, which would be a useful feature. For user-based reports, log on activity, and stuff like that, it doesn't seem to really be present like Log360. That could just be my inexperience with it. I've been dealing with it for only about two and a half months."
"The product is very complicated."
"The solution's areas of improvement are the interface and the dependency on on-premises deployment for some components."
"Varonis requires more access permissions for its core functions compared to competitors, which can be a concern for companies about data safety."
"There is one thing that if I add something manually, I get so many alerts. That's the biggest bad thing."
 

Pricing and Cost Advice

Information not available
"The pricing is good. It neither expensive nor cheap. It is average."
"It's expensive, kind of, really expensive."
"I would rate the pricing an eight out of ten, with ten being the most expensive."
"You could do a subscription, where you pay yearly, or you could purchase it outright. The licensing cost is based on the number of users on the system that you are monitoring."
"Licensing is on an annual basis. Maintenance and renewal fees are separate. Varonis Datalert is quite expensive."
"Varonis Platform wasn't certainly the cheapest solution."
"The platform is expensive. I rate the pricing a nine out of ten."
report
Use our free recommendation engine to learn which Threat Intelligence Platforms solutions are best for your needs.
867,445 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Recreational Facilities/Services Company
46%
Financial Services Firm
16%
Performing Arts
7%
Real Estate/Law Firm
7%
Financial Services Firm
15%
Manufacturing Company
9%
Computer Software Company
9%
Insurance Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise11
 

Questions from the Community

What is your experience regarding pricing and costs for ThreatBook?
My experience with pricing, setup cost, and licensing is that it is cost-effective and the price is reasonable, with very good overall value and quality.
What needs improvement with ThreatBook?
I hope that ThreatBook can integrate a feature where if I detect any internal compromised hosts, I can block or isolate those compromised hosts within my internal network; that would be good. I wou...
What is your primary use case for ThreatBook?
We use ThreatBook to have overview visibility of all our assets including if there are any compromised hosts or if there are any incoming attacks from external threats. When we first deployed Threa...
What do you like most about Varonis Platform?
The solution has significantly improved data security and compliance posture by allowing us to track and monitor activities. We can see who accesses data and when files are created and understand w...
What needs improvement with Varonis Platform?
Varonis started as an on-premises solution and is transitioning to cloud. It hasn't fully moved yet, which is an area for improvement. Varonis requires more access permissions for its core function...
What is your primary use case for Varonis Platform?
The primary use case for Varonis Platform is data discovery, specifically for discovering sensitive data in our organization to protect it. We are looking for a solution that can scan our repositor...
 

Also Known As

No data available
SlashNext Complete
 

Overview

 

Sample Customers

Information Not Available
Nottingham Building Society
Find out what your peers are saying about CrowdStrike, Recorded Future, VirusTotal and others in Threat Intelligence Platforms. Updated: August 2025.
867,445 professionals have used our research since 2012.