CloudJacket vs Trend Micro Cloud One
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
US$10.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
5/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Features
Total features 82
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Management
- Application Security
- Approval Workflow
- Archiving & Retention
- Assessment Management
- Asset Discovery
- Audit Management
- Audit Trail
- Authentication
- Backup and Recovery
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Computing
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Collection
- Data Import/Export
- Data Migration
- Data Recovery
- Data Replication
- Data Security
- Data Storage Management
- Data Synchronization
- Data Visualization
- Document Storage
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- File Management
- File Sharing
- File Transfer
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- Historical Reporting
- IP Address Monitoring
- ISO Compliance
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Issue Management
- Issue Tracking
- Log Collection
- Log Management
- Log Parsing
- Maintenance Scheduling
- Monitoring
- Multi-Device Support
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Password Management
- Patch Management
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Real Time Synchronization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Reminders
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Runtime Container Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Source-Code Scanning
- Status Tracking
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Version Control
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Total features 101
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Spam
- Anti Virus
- Application Management
- Application Security
- Approval Workflow
- Archiving & Retention
- Assessment Management
- Asset Discovery
- Audit Management
- Audit Trail
- Authentication
- Backup and Recovery
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Computing
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Customizable Reports
- Customizable Templates
- Dashboard
- Dashboard Creation
- Data Collection
- Data Import/Export
- Data Migration
- Data Recovery
- Data Replication
- Data Security
- Data Storage Management
- Data Synchronization
- Data Visualization
- Document Storage
- Endpoint Management
- Endpoint Protection Software
- Event Logs
- Event Tracking
- File Integrity Monitoring
- File Management
- File Sharing
- File Transfer
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- Historical Reporting
- IP Address Monitoring
- ISO Compliance
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Issue Management
- Issue Tracking
- Log Collection
- Log Management
- Log Parsing
- Maintenance Scheduling
- Monitoring
- Multi-Device Support
- Network Monitoring
- Network Provisioning
- Network Scanning
- Network Security Software
- PCI Compliance
- Password Management
- Patch Management
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Real Time Synchronization
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Reminders
- Remote Access/Control
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Runtime Container Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Source-Code Scanning
- Status Tracking
- Task Management
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Version Control
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Integrations
- Google Cloud
- Microsoft Azure
Not provided by vendor