Best Software for 2025 is now live!
Save to My Lists
Unclaimed
Unclaimed

Trend Micro Cloud App Security Features

What are the features of Trend Micro Cloud App Security?

Analysis

  • Anomoly Detection

Top Rated Trend Micro Cloud App Security Alternatives

Filter for Features

Analysis

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

Not enough data

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Anomoly Detection

As reported in 11 Trend Micro Cloud App Security reviews. Monitors acivity related to user behavior and compares activity to benchmarked patterns.
91%
(Based on 11 reviews)

Functionality

SSO

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data

Cloud Registry

Details SaaS products the cloud security product can integrate with and provide security for.

Not enough data

Mobile Device Mangement

Offers the ability to set standards for types of mobile devices and networks capable of accessing data.

Not enough data

Security

Governance

Allows users to create, edit, and relinquish user access privileges.

Not enough data

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Data Encryption/Security

Manages policies for user data access and data encryption.

Not enough data

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

Encrypted Storage

Provides some level of encryption of files and data in transit and sensitive information while it lives online.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Policy Enforcement

Allows administrators to set policies for security and data governance.

Not enough data

Administration

Reporting and Monitoring

Access pre-built and custom reports to monitor user activity and storage.

Not enough data

Breadth of Partner Applications

To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.

Not enough data

Auditing

Documents access and alterations of the database for analytics and reporting.

Not enough data

Access Control

User, Role, and Access Management

Allows administrators to provision access based on the individual user and their role.

Not enough data

Access Rights

Defines which users have access to the different modules of the software and how.

Not enough data

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

Not enough data

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data