Cohesity vs SharePoint Migration Tool
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
A SharePoint migration tool that not only solves your migration woes but takes care of the overall SharePoint management as well. The best application to migrate data from all SharePoint versions, Office 365, cloud, and file systems.
A SharePoint migration tool that not only solves your migration woes but takes care of the overall SharePoint management as well. The best application...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live rep)
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
₹2,499.00/year
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.7/ 5Features
4.6/ 5Customer Service
4.8/ 5Value for Money
4.6/ 5Features
Total features 156
- "What If" Scenarios
- AI/Machine Learning
- API
- Access Controls/Permissions
- Action Management
- Activity Dashboard
- Activity Tracking
- Ad hoc Query
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anti Virus
- Application Management
- Approval Workflow
- Archiving & Retention
- Audit Management
- Audit Trail
- Automated Containment
- Automated Scheduling
- Automatic Backup
- Backup Log
- Backup Scheduling
- Backup and Recovery
- Bare-Metal Restore
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Business Continuity Exercising
- Business Impact Analysis
- CPU Monitoring
- Capacity Analytics
- Capacity Management
- Capacity Planning
- Cloud Backup
- Cloud Encryption
- Collaboration Tools
- Compliance Management
- Compression
- Configurable Workflow
- Configuration Management
- Continuous Backup
- Continuous Monitoring
- Credential Management
- Crisis Management
- Customer Database
- Customizable Reports
- Data Analysis Tools
- Data Classification
- Data Connectors
- Data Loss Prevention Software
- Data Management
- Data Migration
- Data Recovery
- Data Replication
- Data Retention Management
- Data Security
- Data Storage Management
- Data Synchronization
- Data Verification
- Database Support
- Deduplication
- Differential Backup
- Disaster Recovery
- Duplicate Detection
- Email Alerts
- Emergency Notification
- Encryption
- Event Logs
- File Quarantining
- HIPAA Compliant
- Incident Management
- Incident Response Checklists
- Incremental Backup
- Indexing
- Information Governance
- Insider Threat Protection
- Intellectual Property Protection
- Intrusion Detection System
- Local Server Options
- Maintenance Scheduling
- Master Data Management
- Metadata Management
- Monitoring
- Multi-Cloud Management
- Multi-Factor Authentication
- Multi-Location
- Multi-OS
- Multi-User Collaboration
- Multimedia Archiving
- Multiple Data Sources
- Multiple Format Support
- Multiple Programming Languages Supported
- NOSQL Database Management
- Password Management
- Patch Management
- Performance Analysis
- Performance Management
- Performance Monitoring
- Personally Identifiable Information Protection
- Plan Development
- Policy Management
- Predictive Analytics
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Relational Database Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Scenario Planning
- Scheduled/Automated Reports
- Scheduling
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Monitoring
- Service Level Agreement (SLA) Management
- Single Sign On
- Status Tracking
- Storage Management
- Tagging
- Task Management
- Task Scheduling
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Interface
- User Management
- VM Backup
- Version Control
- Virtual Machine Monitoring
- Visual Analytics
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Access/Restoration
- Workflow Management
- eDiscovery
Total features 11
- "What If" Scenarios
- AI/Machine Learning
- API
- Access Controls/Permissions
- Action Management
- Activity Dashboard
- Activity Tracking
- Ad hoc Query
- Alerts/Escalation
- Alerts/Notifications
- Anomaly Detection
- Anti Virus
- Application Management
- Approval Workflow
- Archiving & Retention
- Audit Management
- Audit Trail
- Automated Containment
- Automated Scheduling
- Automatic Backup
- Backup Log
- Backup Scheduling
- Backup and Recovery
- Bare-Metal Restore
- Behavior Analytics
- Behavior Tracking
- Behavioral Analytics
- Business Continuity Exercising
- Business Impact Analysis
- CPU Monitoring
- Capacity Analytics
- Capacity Management
- Capacity Planning
- Cloud Backup
- Cloud Encryption
- Collaboration Tools
- Compliance Management
- Compression
- Configurable Workflow
- Configuration Management
- Continuous Backup
- Continuous Monitoring
- Credential Management
- Crisis Management
- Customer Database
- Customizable Reports
- Data Analysis Tools
- Data Classification
- Data Connectors
- Data Loss Prevention Software
- Data Management
- Data Migration
- Data Recovery
- Data Replication
- Data Retention Management
- Data Security
- Data Storage Management
- Data Synchronization
- Data Verification
- Database Support
- Deduplication
- Differential Backup
- Disaster Recovery
- Duplicate Detection
- Email Alerts
- Emergency Notification
- Encryption
- Event Logs
- File Quarantining
- HIPAA Compliant
- Incident Management
- Incident Response Checklists
- Incremental Backup
- Indexing
- Information Governance
- Insider Threat Protection
- Intellectual Property Protection
- Intrusion Detection System
- Local Server Options
- Maintenance Scheduling
- Master Data Management
- Metadata Management
- Monitoring
- Multi-Cloud Management
- Multi-Factor Authentication
- Multi-Location
- Multi-OS
- Multi-User Collaboration
- Multimedia Archiving
- Multiple Data Sources
- Multiple Format Support
- Multiple Programming Languages Supported
- NOSQL Database Management
- Password Management
- Patch Management
- Performance Analysis
- Performance Management
- Performance Monitoring
- Personally Identifiable Information Protection
- Plan Development
- Policy Management
- Predictive Analytics
- Ransomware Protection
- Real-Time Analytics
- Real-Time Data
- Real-Time Monitoring
- Real-Time Notifications
- Real-Time Reporting
- Real-Time Updates
- Relational Database Management
- Remote Access/Control
- Remote Monitoring & Management
- Remote Server Options
- Reporting & Statistics
- Reporting/Analytics
- Resource Management
- Risk Alerts
- Risk Analysis
- Risk Assessment
- Risk Management
- Role-Based Permissions
- Rules-Based Workflow
- SSL Security
- Scenario Planning
- Scheduled/Automated Reports
- Scheduling
- Search/Filter
- Secure Data Storage
- Secure Login
- Security Auditing
- Sensitive Data Identification
- Server Monitoring
- Service Level Agreement (SLA) Management
- Single Sign On
- Status Tracking
- Storage Management
- Tagging
- Task Management
- Task Scheduling
- Third-Party Integration
- Third-Party Integrations
- Threat Intelligence
- Two-Factor Authentication
- User Interface
- User Management
- VM Backup
- Version Control
- Virtual Machine Monitoring
- Visual Analytics
- Vulnerability Management
- Vulnerability Protection
- Vulnerability Scanning
- Vulnerability/Threat Prioritization
- Web Access/Restoration
- Workflow Management
- eDiscovery