Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed
Optimized for quick response

Calico Cloud Features

What are the features of Calico Cloud?

Administration

  • Risk Scoring
  • Security Auditing
  • Configuration Management

Monitoring

  • Continuous Image Assurance
  • Behavior Monitoring
  • Observability

Protection

  • Dynamic Image Scanning
  • Runtime Protection
  • Workload Protection
  • Network Segmentation

Filter for Features

Management

Dashboards and Reports

Access pre-built and custom reports and dashboards.

Not enough data

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service.

Not enough data

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data

Operations

Governance

Allows users to create, edit, and relinquish user access privileges.

Not enough data

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Security Controls

Anomaly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.

Not enough data

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Administration

Risk Scoring

Based on 13 Calico Cloud reviews. Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
83%
(Based on 13 reviews)

Security Auditing

Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices. 13 reviewers of Calico Cloud have provided feedback on this feature.
86%
(Based on 13 reviews)

Configuration Management

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. This feature was mentioned in 13 Calico Cloud reviews.
81%
(Based on 13 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance.

Not enough data

Auditing

Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.

Not enough data

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service.

Not enough data

Monitoring

Continuous Image Assurance

As reported in 13 Calico Cloud reviews. Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
88%
(Based on 13 reviews)

Behavior Monitoring

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. 13 reviewers of Calico Cloud have provided feedback on this feature.
82%
(Based on 13 reviews)

Observability

Generate insights across IT systems utilizing event metrics, logging, traces, and metadata. This feature was mentioned in 14 Calico Cloud reviews.
92%
(Based on 14 reviews)

Protection

Dynamic Image Scanning

As reported in 13 Calico Cloud reviews. Scans application and image source code for security flaws without executing it in a live environment
82%
(Based on 13 reviews)

Runtime Protection

As reported in 13 Calico Cloud reviews. Monitors container activities and detects threats across containers, networks, and cloud service providers.
85%
(Based on 13 reviews)

Workload Protection

Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users. This feature was mentioned in 13 Calico Cloud reviews.
88%
(Based on 13 reviews)

Network Segmentation

Allows administrative control over network components, mapping, and segmentation. 13 reviewers of Calico Cloud have provided feedback on this feature.
94%
(Based on 13 reviews)

Security

Compliance Monitoring

Monitors data quality and sends alerts based on violations or misuse.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Data Loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Compliance

Governance

Allows users to create, edit, and relinquish user access privileges.

Not enough data

Data Governance

Ensures user access management, data lineage, and data encryption.

Not enough data

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Configuration

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Unified Policy Management

Allows users to track and control security policies across cloud services and providers.

Not enough data

Adaptive Access Control

Provides a risk-based approach to determining trust within the network.

Not enough data

API / Integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Visibility

Multicloud Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Vulnerability Management

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.

Not enough data

Vulnerability Scanning

Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.

Not enough data

Vulnerability Intelligence

Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.

Not enough data

Risk-Prioritization

Allows for vulnerability ranking by customized risk and threat priorities.

Not enough data