Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.5 /5
(4)

Ease of Use

4.5/ 5

Features

4.8/ 5

Customer Service

4.5/ 5

Value for Money

4.5/ 5

Overall rating

5 /5
(4)

Ease of Use

5/ 5

Features

5/ 5

Customer Service

5/ 5

Value for Money

5/ 5

Total features 100

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Management
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Automated Containment
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Capacity Management
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Configuration Management
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Customizable Reports
  • Customizable Templates
  • Dashboard
  • Data Import/Export
  • Data Security
  • Data Storage Management
  • Data Visualization
  • Database Support
  • Encryption
  • Endpoint Management
  • Environmental Compliance
  • Event Logs
  • Goal Setting/Tracking
  • HIPAA Compliant
  • IP Address Monitoring
  • ISO Compliance
  • IT Risk Management
  • Incident Management
  • Internal Controls Management
  • Inventory Management
  • Issue Management
  • Issue Tracking
  • Monitoring
  • Multi-Cloud Management
  • Network Analysis
  • Network Scanning
  • Network Security Software
  • Operational Risk Management
  • PCI Compliance
  • Patch Management
  • Penetration Testing
  • Performance Analysis
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Reporting
  • Reminders
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Runtime Container Security
  • SQL Injections
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Source-Code Scanning
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • User Management
  • Version Control
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Scanning
  • Web-Application Security
  • Whitelisting/Blacklisting

Total features 23

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Escalation
  • Alerts/Notifications
  • Application Management
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Automated Containment
  • Bandwidth Monitoring
  • Behavioral Analytics
  • Capacity Management
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Configuration Management
  • Corrective and Preventive Actions (CAPA)
  • Cost Management
  • Customizable Reports
  • Customizable Templates
  • Dashboard
  • Data Import/Export
  • Data Security
  • Data Storage Management
  • Data Visualization
  • Database Support
  • Encryption
  • Endpoint Management
  • Environmental Compliance
  • Event Logs
  • Goal Setting/Tracking
  • HIPAA Compliant
  • IP Address Monitoring
  • ISO Compliance
  • IT Risk Management
  • Incident Management
  • Internal Controls Management
  • Inventory Management
  • Issue Management
  • Issue Tracking
  • Monitoring
  • Multi-Cloud Management
  • Network Analysis
  • Network Scanning
  • Network Security Software
  • Operational Risk Management
  • PCI Compliance
  • Patch Management
  • Penetration Testing
  • Performance Analysis
  • Performance Metrics
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Real-Time Reporting
  • Reminders
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Runtime Container Security
  • SQL Injections
  • SSL Security
  • Search/Filter
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Source-Code Scanning
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Threshold Alerts
  • Two-Factor Authentication
  • User Management
  • Version Control
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Scanning
  • Web-Application Security
  • Whitelisting/Blacklisting
  • IBM QRadar Incident Forensics
  • IBM Security QRadar
  • Jira
  • OneLogin
  • ServiceNow
  • Slack
  • Syslog-ng
Not provided by vendor