Trend Micro Cloud App Security Features
What are the features of Trend Micro Cloud App Security?
Analysis
- Anomoly Detection
Top Rated Trend Micro Cloud App Security Alternatives
(37)
4.7 out of 5
Visit Website
Sponsored
Trend Micro Cloud App Security Categories on G2
Filter for Features
Analysis
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Anomoly Detection | As reported in 11 Trend Micro Cloud App Security reviews. Monitors acivity related to user behavior and compares activity to benchmarked patterns. | 91% (Based on 11 reviews) |
Functionality
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
Cloud Registry | Details SaaS products the cloud security product can integrate with and provide security for. | Not enough data | |
Mobile Device Mangement | Offers the ability to set standards for types of mobile devices and networks capable of accessing data. | Not enough data |
Security
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data | |
Encrypted Storage | Provides some level of encryption of files and data in transit and sensitive information while it lives online. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and data governance. | Not enough data |
Administration
Reporting and Monitoring | Access pre-built and custom reports to monitor user activity and storage. | Not enough data | |
Breadth of Partner Applications | To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product. | Not enough data | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data |
Access Control
User, Role, and Access Management | Allows administrators to provision access based on the individual user and their role. | Not enough data | |
Access Rights | Defines which users have access to the different modules of the software and how. | Not enough data | |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data |