Skip to main content
Version: 25.06

Cyberhaven Users Guide

The Cyberhaven Users Guide provides comprehensive documentation for security analysts, data protection officers, and end users to effectively monitor, analyze, and respond to data security events across your organization. This guide covers the essential tools and workflows needed to leverage Cyberhaven's data protection capabilities.

Core Functionality

Dataflows provide complete visibility into data movement across your environment, enabling you to track sensitive information from source to destination. Understand data lineage, identify risk patterns, and monitor compliance through comprehensive flow analysis and component mapping.

Dashboards and Analytics offer powerful visualization tools including Insights 360 for comprehensive security posture assessment, Gen AI monitoring for artificial intelligence data usage, and Visual Analytics for trend identification and pattern recognition across your data landscape.

Risk Management encompasses Risk Overview dashboards for organizational threat assessment, Insider Risk detection for internal threat monitoring, and Incident Management for investigating and responding to security events with detailed forensic capabilities.

Object Management enables configuration of Protection Policies for data loss prevention, Inspection Policies for content analysis, Datasets for data classification, and Lists for custom data groupings and exception handling.

System Administration includes Sensor Management for endpoint monitoring and Account Settings for user preferences and system configuration.

These integrated capabilities provide end-to-end data protection visibility and control.