STORM vs GoodAccess
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
US$7.00/month
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.9/ 5Features
4.7/ 5Customer Service
4.8/ 5Value for Money
4.7/ 5Features
Total features 33
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Application Access Control
- Application Management
- Application Security
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Communications Management
- Compliance Management
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Investigation Management
- Issue Auditing
- Issue Management
- Live Chat
- Log Access
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Channel Communication
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- On Call Scheduling
- PCI Compliance
- Patch Management
- Policy Management
- Privileged Account Management
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Monitoring
- Real-Time Notifications
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Safety Incident Management
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
- Workflow Management
Total features 120
- AI/Machine Learning
- API
- Access Certification
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Ad Blocker
- Alerts/Escalation
- Alerts/Notifications
- Anomaly/Malware Detection
- Anonymous Browsing
- Application Access Control
- Application Management
- Application Security
- Audit Management
- Audit Trail
- Authentication
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Chat/Messaging
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Communications Management
- Compliance Management
- Configuration Management
- Content Filtering
- Credential Management
- Customizable Reports
- DNS Leak Protection
- Dashboard
- Dashboard Creation
- Data Import/Export
- Data Loss Prevention Software
- Data Security
- Data Visualization
- Employee Activity Monitoring
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Filtering
- Firewalls
- For MSPs
- Geo-spoofing
- HIPAA Compliant
- IP Filtering
- IP Masking
- IT Incident Management
- IT Reporting
- Incident Management
- Incident Reporting
- Insider Threat Protection
- Intrusion Detection System
- Investigation Management
- Issue Auditing
- Issue Management
- Live Chat
- Log Access
- Member Accounts
- Mobile Access
- Monitoring
- Multi-Channel Communication
- Multi-Device Support
- Multi-Factor Authentication
- Multi-Language
- Multi-Protocol
- Multiple User Accounts
- Network Monitoring
- Network Provisioning
- Network Security Software
- Next-Generation Firewall
- No-log VPN
- On Call Scheduling
- PCI Compliance
- Patch Management
- Policy Management
- Privileged Account Management
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Monitoring
- Real-Time Notifications
- Remote Access Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Support Software
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Safety Incident Management
- Search/Filter
- Secure Browsing
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Self Service Portal
- Server Monitoring
- Single Sign On
- Spam Blocker
- Status Tracking
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Response
- Two-Factor Authentication
- Uptime Reporting
- Usage Tracking/Analytics
- User Activity Monitoring
- User Management
- User Provisioning
- User Session Management
- VPN Software
- VPN Tunneling
- Visual Analytics
- Vulnerability Protection
- Vulnerability Scanning
- Web Inspection
- Web Threat Management
- Web Traffic Reporting
- Web-Application Security
- Whitelisting/Blacklisting
- Workflow Management
Integrations
- Auth0
- Bugzilla
- OTRS
- Okta
- OneLogin
- Ping Identity
- VMRay Analyzer
- baramundi Management Suite
- Auth0
- Bugzilla
- OTRS
- Okta
- OneLogin
- Ping Identity
- VMRay Analyzer
- baramundi Management Suite