CloudJacket vs Cynet 360
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$10.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
5/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Ease of Use
4.8/ 5Features
5/ 5Customer Service
4.6/ 5Value for Money
4.4/ 5Features
Total features 82
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Archiving & Retention
- Assessment Management
- Asset Discovery
- Audit Management
- Audit Trail
- Automatic Scans
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Continuous Monitoring
- Corrective and Preventive Actions (CAPA)
- Customizable Templates
- Customization
- Dashboard
- Dashboard Creation
- Data Analysis Tools
- Data Collection
- Data Import/Export
- Data Security
- Data Visualization
- Device Management
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Financial Data Protection
- Firewalls
- For MSPs
- HIPAA Compliant
- IOC Verification
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Investigation Management
- Issue Management
- Log Collection
- Log Management
- Log Parsing
- Mobile Device Management
- Monitoring
- Multi-Channel Communication
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Patch Management
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Root Cause Analysis
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Status Tracking
- Summary Reports
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- User Management
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Whitelisting/Blacklisting
- Workflow Management
Total features 80
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Archiving & Retention
- Assessment Management
- Asset Discovery
- Audit Management
- Audit Trail
- Automatic Scans
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Security Policy Management
- Compliance Management
- Compliance Tracking
- Continuous Monitoring
- Corrective and Preventive Actions (CAPA)
- Customizable Templates
- Customization
- Dashboard
- Dashboard Creation
- Data Analysis Tools
- Data Collection
- Data Import/Export
- Data Security
- Data Visualization
- Device Management
- Email Alerts
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Financial Data Protection
- Firewalls
- For MSPs
- HIPAA Compliant
- IOC Verification
- IP Address Monitoring
- IT Incident Management
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Investigation Management
- Issue Management
- Log Collection
- Log Management
- Log Parsing
- Mobile Device Management
- Monitoring
- Multi-Channel Communication
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Patch Management
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Root Cause Analysis
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Security Tools
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Status Tracking
- Summary Reports
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- User Management
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Whitelisting/Blacklisting
- Workflow Management
Integrations
- AWS AppSync
- Active Directory Health Profiler
- Atera
- Autotask PSA
- ConnectWise CPQ
- ConnectWise MDR
- ConnectWise PSA
- ConnectWise ScreenConnect
- Datto Workplace
- Google Cloud
- Microsoft Azure
- N-Able Projects Portal
- AWS AppSync
- Active Directory Health Profiler
- Atera
- Autotask PSA
- ConnectWise CPQ
- ConnectWise MDR
- ConnectWise PSA
- ConnectWise ScreenConnect
- Datto Workplace
- Google Cloud
- Microsoft Azure
- N-Able Projects Portal