CloudWize vs BIMA
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.5/ 5Features
4.8/ 5Customer Service
4.5/ 5Value for Money
4.5/ 5Ease of Use
5/ 5Features
5/ 5Customer Service
5/ 5Value for Money
5/ 5Features
Total features 100
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Application Management
- Assessment Management
- Asset Discovery
- Asset Tagging
- Audit Management
- Audit Trail
- Authentication
- Automated Containment
- Bandwidth Monitoring
- Behavioral Analytics
- Capacity Management
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Configuration Management
- Corrective and Preventive Actions (CAPA)
- Cost Management
- Customizable Reports
- Customizable Templates
- Dashboard
- Data Import/Export
- Data Security
- Data Storage Management
- Data Visualization
- Database Support
- Encryption
- Endpoint Management
- Environmental Compliance
- Event Logs
- Goal Setting/Tracking
- HIPAA Compliant
- IP Address Monitoring
- ISO Compliance
- IT Risk Management
- Incident Management
- Internal Controls Management
- Inventory Management
- Issue Management
- Issue Tracking
- Monitoring
- Multi-Cloud Management
- Network Analysis
- Network Scanning
- Network Security Software
- Operational Risk Management
- PCI Compliance
- Patch Management
- Penetration Testing
- Performance Analysis
- Performance Metrics
- Policy Management
- Prioritization
- Real-Time Data
- Real-Time Reporting
- Reminders
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Runtime Container Security
- SQL Injections
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Source-Code Scanning
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Version Control
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Scanning
- Web-Application Security
- Whitelisting/Blacklisting
Total features 23
- AI/Machine Learning
- API
- Access Controls/Permissions
- Activity Dashboard
- Activity Monitoring
- Activity Tracking
- Alerts/Escalation
- Alerts/Notifications
- Application Management
- Assessment Management
- Asset Discovery
- Asset Tagging
- Audit Management
- Audit Trail
- Authentication
- Automated Containment
- Bandwidth Monitoring
- Behavioral Analytics
- Capacity Management
- Cloud Application Security
- Cloud Encryption
- Cloud Security Policy Management
- Collaboration Tools
- Compliance Management
- Compliance Tracking
- Configurable Workflow
- Configuration Management
- Corrective and Preventive Actions (CAPA)
- Cost Management
- Customizable Reports
- Customizable Templates
- Dashboard
- Data Import/Export
- Data Security
- Data Storage Management
- Data Visualization
- Database Support
- Encryption
- Endpoint Management
- Environmental Compliance
- Event Logs
- Goal Setting/Tracking
- HIPAA Compliant
- IP Address Monitoring
- ISO Compliance
- IT Risk Management
- Incident Management
- Internal Controls Management
- Inventory Management
- Issue Management
- Issue Tracking
- Monitoring
- Multi-Cloud Management
- Network Analysis
- Network Scanning
- Network Security Software
- Operational Risk Management
- PCI Compliance
- Patch Management
- Penetration Testing
- Performance Analysis
- Performance Metrics
- Policy Management
- Prioritization
- Real-Time Data
- Real-Time Reporting
- Reminders
- Remote Monitoring & Management
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Runtime Container Security
- SQL Injections
- SSL Security
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Server Monitoring
- Single Sign On
- Source-Code Scanning
- Status Tracking
- Third-Party Integrations
- Threat Intelligence
- Threat Protection
- Threat Response
- Threshold Alerts
- Two-Factor Authentication
- User Management
- Version Control
- Visual Analytics
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Scanning
- Web-Application Security
- Whitelisting/Blacklisting
Integrations
- IBM QRadar Incident Forensics
- IBM Security QRadar
- Jira
- OneLogin
- ServiceNow
- Slack
- Syslog-ng
Not provided by vendor