Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
Symantec Enterprise Cloud is a cybersecurity platform that provides integrated solutions for various challenges faced by organizations. The system offers data-centric hybrid security for organizations both on-premises and in the cloud. Symantec Enterprise Cloud is designed to provide consistent compliance, secure remote work, and data and threat protection.
Symantec Enterprise Cloud is a cybersecurity platform that provides integrated solutions for various challenges faced by organizations. The system...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
No images available

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

No reviews available

Already have Trend Micro Cloud One?

Write a Review!

Overall rating

4.5 /5
(53)

Ease of Use

4.3/ 5

Features

4.4/ 5

Customer Service

4.1/ 5

Value for Money

4.4/ 5

Total features 101

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Management
  • Application Security
  • Approval Workflow
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Application Security
  • Cloud Computing
  • Cloud Security Policy Management
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customizable Reports
  • Customizable Templates
  • Dashboard
  • Data Collection
  • Data Import/Export
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Visualization
  • Document Storage
  • Email Filtering
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Management
  • File Sharing
  • File Transfer
  • Financial Data Protection
  • Firewalls
  • HIPAA Compliant
  • Historical Reporting
  • ISO Compliance
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Issue Tracking
  • Maintenance Scheduling
  • Monitoring
  • Multi-Device Support
  • Network Scanning
  • Network Security Software
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Synchronization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Reminders
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Runtime Container Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Source-Code Scanning
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Version Control
  • Virus Definition Update
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

Total features 11

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Spam
  • Anti Virus
  • Application Management
  • Application Security
  • Approval Workflow
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Application Security
  • Cloud Computing
  • Cloud Security Policy Management
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Customizable Reports
  • Customizable Templates
  • Dashboard
  • Data Collection
  • Data Import/Export
  • Data Migration
  • Data Recovery
  • Data Replication
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Visualization
  • Document Storage
  • Email Filtering
  • Endpoint Management
  • Endpoint Protection Software
  • Event Logs
  • File Management
  • File Sharing
  • File Transfer
  • Financial Data Protection
  • Firewalls
  • HIPAA Compliant
  • Historical Reporting
  • ISO Compliance
  • Incident Management
  • Intrusion Detection System
  • Issue Management
  • Issue Tracking
  • Maintenance Scheduling
  • Monitoring
  • Multi-Device Support
  • Network Scanning
  • Network Security Software
  • PCI Compliance
  • Password Management
  • Patch Management
  • Policy Management
  • Real Time Synchronization
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Reminders
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Runtime Container Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Source-Code Scanning
  • Task Management
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Version Control
  • Virus Definition Update
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management