CloudJacket vs TEHTRIS XDR Platform
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
Images
Pricing
Starting from
US$10.00/month
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
5/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Ease of Use
4/ 5Features
4.7/ 5Customer Service
3.3/ 5Value for Money
4.3/ 5Features
Total features 82
- AI/Machine Learning
- API
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Virus
- App Management
- Application Security
- Archiving & Retention
- Asset Discovery
- Audit Management
- Audit Trail
- Authentication
- BYOD Management
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Backup
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configuration Management
- Continuous Monitoring
- Customizable Reports
- Customization
- DDoS Protection Software
- Dashboard
- Dashboard Creation
- Data Analysis Tools
- Data Collection
- Data Import/Export
- Data Security
- Data Visualization
- Deployment Management
- Device Management
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Filtering
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- IP Address Monitoring
- IT Asset Management
- IT Reporting
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Load Balancing Tools
- Log Access
- Log Collection
- Log Management
- Log Parsing
- Mobile Access
- Mobile Content Management
- Mobile Device Management
- Monitoring
- Network Analysis
- Network Monitoring
- Network Provisioning
- Network Resource Management
- Network Scanning
- Network Security Software
- Next-Generation Firewall
- PCI Compliance
- Patch Management
- Performance Metrics
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Root Cause Analysis
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Simple Network Management Protocol (SNMP)
- Status Tracking
- Summary Reports
- Support Ticket Management
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Uptime Reporting
- User Management
- VPN Software
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Total features 105
- AI/Machine Learning
- API
- Access Controls/Permissions
- Access Management
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anomaly/Malware Detection
- Anti Virus
- App Management
- Application Security
- Archiving & Retention
- Asset Discovery
- Audit Management
- Audit Trail
- Authentication
- BYOD Management
- Bandwidth Monitoring
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Cloud Application Security
- Cloud Backup
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configuration Management
- Continuous Monitoring
- Customizable Reports
- Customization
- DDoS Protection Software
- Dashboard
- Dashboard Creation
- Data Analysis Tools
- Data Collection
- Data Import/Export
- Data Security
- Data Visualization
- Deployment Management
- Device Management
- Encryption
- Endpoint Management
- Endpoint Protection Software
- Event Analysis
- Event Logs
- Event Tracking
- File Integrity Monitoring
- Filtering
- Financial Data Protection
- Firewalls
- HIPAA Compliant
- IP Address Monitoring
- IT Asset Management
- IT Reporting
- Incident Management
- Incident Reporting
- Intrusion Detection System
- Load Balancing Tools
- Log Access
- Log Collection
- Log Management
- Log Parsing
- Mobile Access
- Mobile Content Management
- Mobile Device Management
- Monitoring
- Network Analysis
- Network Monitoring
- Network Provisioning
- Network Resource Management
- Network Scanning
- Network Security Software
- Next-Generation Firewall
- PCI Compliance
- Patch Management
- Performance Metrics
- Performance Monitoring
- Policy Management
- Predictive Analytics
- Prioritization
- Process/Workflow Automation
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-time Alerts
- Remediation Management
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Root Cause Analysis
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Logs
- Server Monitoring
- Service Level Agreement (SLA) Management
- Simple Network Management Protocol (SNMP)
- Status Tracking
- Summary Reports
- Support Ticket Management
- Threat Intelligence
- Threat Response
- Threshold Alerts
- Uptime Reporting
- User Management
- VPN Software
- Virus Definition Update
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Threat Management
- Web Traffic Reporting
- Whitelisting/Blacklisting
- Workflow Management
Integrations
- Google Cloud
- Microsoft Azure
- Proofpoint Email Protection
- Zscaler
- Google Cloud
- Microsoft Azure
- Proofpoint Email Protection
- Zscaler