Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed
Optimized for quick response

Cortex Cloud Features

What are the features of Cortex Cloud?

Administration

  • Policy Enforcement
  • Auditing
  • Data Discovery
  • Access Control

Security

  • Compliance Monitoring
  • Anomoly Detection
  • Cloud Gap Analytics

Compliance

  • Governance
  • Sensitive Data Compliance

Data Protection

  • Data Encryption/Security
  • Anomoly Detection
  • Sensitive Data Compliance

Analysis

  • Cloud Gap Analytics
  • Compliance Monitoring
  • User Analytics

Filter for Features

Management

Dashboards and Reports

Access pre-built and custom reports and dashboards.

Not enough data

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service.

Not enough data

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data

Operations

Governance

Allows users to create, edit, and relinquish user access privileges.

Not enough data

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Security Controls

Anomaly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Data Loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Not enough data

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Administration

Risk Scoring

Provides risk scoring for suspicious activity, vulnerabilities, and other threats.

Not enough data

Secrets Management

Provides tools for managing authentication credentials such as keys and passwords.

Not enough data

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Not enough data

Configuration Management

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Policy Enforcement

Based on 19 Cortex Cloud reviews. Allows administrators to set policies for security and data governance.
85%
(Based on 19 reviews)

Auditing

As reported in 18 Cortex Cloud reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
88%
(Based on 18 reviews)

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service. 19 reviewers of Cortex Cloud have provided feedback on this feature.
84%
(Based on 19 reviews)

Auditing

Documents access and alterations of the database for analytics and reporting. 20 reviewers of Cortex Cloud have provided feedback on this feature.
87%
(Based on 20 reviews)

Data Discovery

Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. This feature was mentioned in 20 Cortex Cloud reviews.
88%
(Based on 20 reviews)

Access Control

Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 21 Cortex Cloud reviews.
83%
(Based on 21 reviews)

Monitoring

Continuous Image Assurance

Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.

Not enough data

Behavior Monitoring

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.

Not enough data

Protection

Dynamic Image Scanning

Scans application and image source code for security flaws without executing it in a live environment

Not enough data

Runtime Protection

Monitors container activities and detects threats across containers, networks, and cloud service providers.

Not enough data

Workload Protection

Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.

Not enough data

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Security

Compliance Monitoring

As reported in 20 Cortex Cloud reviews. Monitors data quality and sends alerts based on violations or misuse.
87%
(Based on 20 reviews)

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 19 Cortex Cloud reviews.
82%
(Based on 19 reviews)

Data Loss Prevention

As reported in 18 Cortex Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
84%
(Based on 18 reviews)

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. 19 reviewers of Cortex Cloud have provided feedback on this feature.
83%
(Based on 19 reviews)

Compliance

Governance

Allows users to create, edit, and relinquish user access privileges. 20 reviewers of Cortex Cloud have provided feedback on this feature.
87%
(Based on 20 reviews)

Data Governance

Ensures user access management, data lineage, and data encryption. 19 reviewers of Cortex Cloud have provided feedback on this feature.
86%
(Based on 19 reviews)

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 19 Cortex Cloud reviews.
82%
(Based on 19 reviews)

Data Protection

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. 18 reviewers of Cortex Cloud have provided feedback on this feature.
90%
(Based on 18 reviews)

Data Encryption/Security

Manages policies for user data access and data encryption. 20 reviewers of Cortex Cloud have provided feedback on this feature.
91%
(Based on 20 reviews)

Data loss Prevention

Based on 19 Cortex Cloud reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
89%
(Based on 19 reviews)

Anomoly Detection

As reported in 20 Cortex Cloud reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
88%
(Based on 20 reviews)

Sensitive Data Compliance

As reported in 19 Cortex Cloud reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
91%
(Based on 19 reviews)

Analysis

Cloud Gap Analytics

As reported in 21 Cortex Cloud reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
88%
(Based on 21 reviews)

Compliance Monitoring

Based on 21 Cortex Cloud reviews. Monitors data quality and send alerts based on violations or misuse.
90%
(Based on 21 reviews)

User Analytics

As reported in 20 Cortex Cloud reviews. Allows for reporting and documentation of individual user behavior and privileges.
88%
(Based on 20 reviews)

Functionality - Software Composition Analysis

Language Support

Supports a useful and wide variety of programming languages.

Not enough data

Integration

Integrates seamlessly with the build environment and development tools like repositories, package managers, etc.

Not enough data

Transparency

Grants comprehensive user-friendly insight into all open source components.

Not enough data

Effectiveness - Software Composition Analysis

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection.

Not enough data

Continuous Monitoring

Monitors open source components proactively and continuously.

Not enough data

Thorough Detection

Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.

Not enough data

Risk Analysis

Risk Scoring

Identifies and scores potential network security risks, vulnerabilities, and compliance impacts of attacks and breaches.

Not enough data

Reporting

Creates reports outlining log activity and relevant metrics.

Not enough data

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data

Vulnerability Assesment

Vulnerability Scanning

Analyzes your existing network and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Vulnerability Intelligence

Stores information related to common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Contextual Data

Identify risk data attributes such as description, category, owner, or hierarchy.

Not enough data

Dashboards

Provides the ability to create custom reporting dashboards to further explore vulnerability and risk data.

Not enough data

Automation

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Workflow Automation

Streamlines the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Security Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted vulnerability scans and security tests without requiring manual work.

Not enough data

API Management

API Discovery

Detects new and undocumented assets as they enter a network and add them to asset inventory.

Not enough data

API Monitoring

Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Reporting

Provides results of the simulation and reveals potential security gaps or vulnerabilitites.

Not enough data

Change Management

Tools to track and implement required security policy changes.

Not enough data

Security Testing

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

API Verification

Allows users to set customizable API verification settings to improve security requirements.

Not enough data

API Testing

Runs pre-scripted security tests without requiring manual work.

Not enough data

Security Management

Security and Policy Enforcement

Abilities to set standards for network, application, and API security risk management.

Not enough data

Anomoly Detection

Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Bot Detection

Monitors for and rids systems of bots suspected of committing fraud or abusing applications.

Not enough data

Configuration

DLP Configuration

As reported in 15 Cortex Cloud reviews. Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
76%
(Based on 15 reviews)

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. 16 reviewers of Cortex Cloud have provided feedback on this feature.
77%
(Based on 16 reviews)

Unified Policy Management

Allows users to track and control security policies across cloud services and providers. This feature was mentioned in 17 Cortex Cloud reviews.
76%
(Based on 17 reviews)

Adaptive Access Control

Based on 14 Cortex Cloud reviews. Provides a risk-based approach to determining trust within the network.
79%
(Based on 14 reviews)

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 16 Cortex Cloud reviews.
73%
(Based on 16 reviews)

Visibility

Multicloud Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks. This feature was mentioned in 17 Cortex Cloud reviews.
80%
(Based on 17 reviews)

Asset Discovery

Detect new assets as they enter a cloud environments and networks to add to asset inventory. This feature was mentioned in 17 Cortex Cloud reviews.
75%
(Based on 17 reviews)

Vulnerability Management

Threat Hunting

Based on 13 Cortex Cloud reviews. Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
77%
(Based on 13 reviews)

Vulnerability Scanning

Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised. 16 reviewers of Cortex Cloud have provided feedback on this feature.
78%
(Based on 16 reviews)

Vulnerability Intelligence

Based on 14 Cortex Cloud reviews. Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
82%
(Based on 14 reviews)

Risk-Prioritization

Based on 16 Cortex Cloud reviews. Allows for vulnerability ranking by customized risk and threat priorities.
77%
(Based on 16 reviews)

Access control - Cloud Infrastructure Entitlement Management (CIEM)

Policy Management

Helps define policies for access management

Not enough data

Fine-Grained Access Control

Uses principle of least privilege to ensure access control at granular level of specific resources and apps

Not enough data

Role-Based Access Control (RBAC)

Enables organization to define roles and assign access based on these roles

Not enough data

AI-driven access control

Streamlines the management of user access through AI

Not enough data

Monitoring - Cloud Infrastructure Entitlement Management (CIEM)

Monitoring

Tracks and logs user activities, access requests, and changes to entitlements

Not enough data

AI-based detection

Detects and remediates risky, misconfigured permissions for human and machine identities using AI

Not enough data

Auditing - Cloud Infrastructure Entitlement Management (CIEM)

Visibility

Provides visibility into all users and identities across the system

Not enough data

Compliance Reporting

Provides reporting capabilities to demonstrate compliance

Not enough data

AI Compliance

Regulatory Reporting

Generates reports to demonstrate AI compliance with local and international frameworks.

Not enough data

Automated Compliance

Helps AI systems to comply with the regulations.

Not enough data

Audit Trails

Maintains detailed logs of activities and changes to AI models.

Not enough data

Risk Management & Monitoring

AI Risk Management

Evaluates legal, operational and ethical risks posed by AI systems.

Not enough data

Real-time Monitoring

Monitors AI models for anomalies continuously.

Not enough data

AI Lifecycle Management

Lifecycle Automation

Automates retraining, version updates and decomissioning when the models are outdated.

Not enough data

Access Control and Security

Pole-based Access Control (RBAC)

Restricts access to AI models and sensitive data to authorized users.

Not enough data

Collaboration and Communication

Model Sharing and Reuse

Helps sharing AI models and best practices.

Not enough data