Cortex Cloud Features
What are the features of Cortex Cloud?
Administration
- Policy Enforcement
- Auditing
- Data Discovery
- Access Control
Security
- Compliance Monitoring
- Anomoly Detection
- Cloud Gap Analytics
Compliance
- Governance
- Sensitive Data Compliance
Data Protection
- Data Encryption/Security
- Anomoly Detection
- Sensitive Data Compliance
Analysis
- Cloud Gap Analytics
- Compliance Monitoring
- User Analytics
Top Rated Cortex Cloud Alternatives
Filter for Features
Management
Dashboards and Reports | Access pre-built and custom reports and dashboards. | Not enough data | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | Not enough data |
Operations
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data | |
Logging and Reporting | Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | Not enough data | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data |
Security Controls
Anomaly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data |
Administration
Risk Scoring | Provides risk scoring for suspicious activity, vulnerabilities, and other threats. | Not enough data | |
Secrets Management | Provides tools for managing authentication credentials such as keys and passwords. | Not enough data | |
Security Auditing | Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. | Not enough data | |
Configuration Management | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data | |
Policy Enforcement | Based on 19 Cortex Cloud reviews. Allows administrators to set policies for security and data governance. | 85% (Based on 19 reviews) | |
Auditing | As reported in 18 Cortex Cloud reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. | 88% (Based on 18 reviews) | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. 19 reviewers of Cortex Cloud have provided feedback on this feature. | 84% (Based on 19 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. 20 reviewers of Cortex Cloud have provided feedback on this feature. | 87% (Based on 20 reviews) | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. This feature was mentioned in 20 Cortex Cloud reviews. | 88% (Based on 20 reviews) | |
Access Control | Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 21 Cortex Cloud reviews. | 83% (Based on 21 reviews) |
Monitoring
Continuous Image Assurance | Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats. | Not enough data | |
Behavior Monitoring | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data | |
Observability | Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. | Not enough data |
Protection
Dynamic Image Scanning | Scans application and image source code for security flaws without executing it in a live environment | Not enough data | |
Runtime Protection | Monitors container activities and detects threats across containers, networks, and cloud service providers. | Not enough data | |
Workload Protection | Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users. | Not enough data | |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data |
Security
Compliance Monitoring | As reported in 20 Cortex Cloud reviews. Monitors data quality and sends alerts based on violations or misuse. | 87% (Based on 20 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 19 Cortex Cloud reviews. | 82% (Based on 19 reviews) | |
Data Loss Prevention | As reported in 18 Cortex Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 84% (Based on 18 reviews) | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 19 reviewers of Cortex Cloud have provided feedback on this feature. | 83% (Based on 19 reviews) |
Compliance
Governance | Allows users to create, edit, and relinquish user access privileges. 20 reviewers of Cortex Cloud have provided feedback on this feature. | 87% (Based on 20 reviews) | |
Data Governance | Ensures user access management, data lineage, and data encryption. 19 reviewers of Cortex Cloud have provided feedback on this feature. | 86% (Based on 19 reviews) | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 19 Cortex Cloud reviews. | 82% (Based on 19 reviews) |
Data Protection
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. 18 reviewers of Cortex Cloud have provided feedback on this feature. | 90% (Based on 18 reviews) | |
Data Encryption/Security | Manages policies for user data access and data encryption. 20 reviewers of Cortex Cloud have provided feedback on this feature. | 91% (Based on 20 reviews) | |
Data loss Prevention | Based on 19 Cortex Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 89% (Based on 19 reviews) | |
Anomoly Detection | As reported in 20 Cortex Cloud reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 88% (Based on 20 reviews) | |
Sensitive Data Compliance | As reported in 19 Cortex Cloud reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 91% (Based on 19 reviews) |
Analysis
Cloud Gap Analytics | As reported in 21 Cortex Cloud reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 88% (Based on 21 reviews) | |
Compliance Monitoring | Based on 21 Cortex Cloud reviews. Monitors data quality and send alerts based on violations or misuse. | 90% (Based on 21 reviews) | |
User Analytics | As reported in 20 Cortex Cloud reviews. Allows for reporting and documentation of individual user behavior and privileges. | 88% (Based on 20 reviews) |
Functionality - Software Composition Analysis
Language Support | Supports a useful and wide variety of programming languages. | Not enough data | |
Integration | Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. | Not enough data | |
Transparency | Grants comprehensive user-friendly insight into all open source components. | Not enough data |
Effectiveness - Software Composition Analysis
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. | Not enough data | |
Continuous Monitoring | Monitors open source components proactively and continuously. | Not enough data | |
Thorough Detection | Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. | Not enough data |
Risk Analysis
Risk Scoring | Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches. | Not enough data | |
Reporting | Creates reports outlining log activity and relevant metrics. | Not enough data | |
Risk-Prioritization | Allows for vulnerability ranking by customized risk and threat priorities. | Not enough data |
Vulnerability Assesment
Vulnerability Scanning | Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised. | Not enough data | |
Vulnerability Intelligence | Stores information related to common vulnerabilities and how to resolve them once incidents occur. | Not enough data | |
Contextual Data | Identify risk data attributes such as description, category, owner, or hierarchy. | Not enough data | |
Dashboards | Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data. | Not enough data |
Automation
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Workflow Automation | Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. | Not enough data | |
Security Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted vulnerability scans and security tests without requiring manual work. | Not enough data |
API Management
API Discovery | Detects new and undocumented assets as they enter a network and add them to asset inventory. | Not enough data | |
API Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Reporting | Provides results of the simulation and reveals potential security gaps or vulnerabilitites. | Not enough data | |
Change Management | Tools to track and implement required security policy changes. | Not enough data |
Security Testing
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
API Verification | Allows users to set customizable API verification settings to improve security requirements. | Not enough data | |
API Testing | Runs pre-scripted security tests without requiring manual work. | Not enough data |
Security Management
Security and Policy Enforcement | Abilities to set standards for network, application, and API security risk management. | Not enough data | |
Anomoly Detection | Constantly monitors activity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Bot Detection | Monitors for and rids systems of bots suspected of committing fraud or abusing applications. | Not enough data |
Configuration
DLP Configuration | As reported in 15 Cortex Cloud reviews. Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | 76% (Based on 15 reviews) | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 16 reviewers of Cortex Cloud have provided feedback on this feature. | 77% (Based on 16 reviews) | |
Unified Policy Management | Allows users to track and control security policies across cloud services and providers. This feature was mentioned in 17 Cortex Cloud reviews. | 76% (Based on 17 reviews) | |
Adaptive Access Control | Based on 14 Cortex Cloud reviews. Provides a risk-based approach to determining trust within the network. | 79% (Based on 14 reviews) | |
API / Integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 16 Cortex Cloud reviews. | 73% (Based on 16 reviews) |
Visibility
Multicloud Visibility | Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 17 Cortex Cloud reviews. | 80% (Based on 17 reviews) | |
Asset Discovery | Detect new assets as they enter a cloud environments and networks to add to asset inventory. This feature was mentioned in 17 Cortex Cloud reviews. | 75% (Based on 17 reviews) |
Vulnerability Management
Threat Hunting | Based on 13 Cortex Cloud reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks. | 77% (Based on 13 reviews) | |
Vulnerability Scanning | Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. 16 reviewers of Cortex Cloud have provided feedback on this feature. | 78% (Based on 16 reviews) | |
Vulnerability Intelligence | Based on 14 Cortex Cloud reviews. Stores information related to new and common vulnerabilities and how to resolve them once incidents occur. | 82% (Based on 14 reviews) | |
Risk-Prioritization | Based on 16 Cortex Cloud reviews. Allows for vulnerability ranking by customized risk and threat priorities. | 77% (Based on 16 reviews) |
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Policy Management | Helps define policies for access management | Not enough data | |
Fine-Grained Access Control | Uses principle of least privilege to ensure access control at granular level of specific resources and apps | Not enough data | |
Role-Based Access Control (RBAC) | Enables organization to define roles and assign access based on these roles | Not enough data | |
AI-driven access control | Streamlines the management of user access through AI | Not enough data |
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Monitoring | Tracks and logs user activities, access requests, and changes to entitlements | Not enough data | |
AI-based detection | Detects and remediates risky, misconfigured permissions for human and machine identities using AI | Not enough data |
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Visibility | Provides visibility into all users and identities across the system | Not enough data | |
Compliance Reporting | Provides reporting capabilities to demonstrate compliance | Not enough data |
AI Compliance
Regulatory Reporting | Generates reports to demonstrate AI compliance with local and international frameworks. | Not enough data | |
Automated Compliance | Helps AI systems to comply with the regulations. | Not enough data | |
Audit Trails | Maintains detailed logs of activities and changes to AI models. | Not enough data |
Risk Management & Monitoring
AI Risk Management | Evaluates legal, operational and ethical risks posed by AI systems. | Not enough data | |
Real-time Monitoring | Monitors AI models for anomalies continuously. | Not enough data |
AI Lifecycle Management
Lifecycle Automation | Automates retraining, version updates and decomissioning when the models are outdated. | Not enough data |
Access Control and Security
Pole-based Access Control (RBAC) | Restricts access to AI models and sensitive data to authorized users. | Not enough data |
Collaboration and Communication
Model Sharing and Reuse | Helps sharing AI models and best practices. | Not enough data |