Compare C2 ATOM vs Device42 vs CloudSploit

More Information More Information More Information

Crozscore:

60%
what is this?
24%
interest falling

Crozscore:

78%
what is this?
35%
interest rising

Crozscore:

68%
what is this?
34%
interest falling
C2 ATOM screenshot view 5 more Device42 screenshot view 1 more CloudSploit screenshot

Software Description:

C2 ATOM is an ITSM (IT Service Management) software designed for organizations seeking to deliver quality IT services. This integrated, fully web-based solution, built to ITIL® v3 2011 standards, delivers efficient services while exceeding customer expectations.

Oriented around a multi-departmental service catalog that is flexible and without programming, our C2 ATOM solution can support IT Service Center activities.

Here are the key features of the C2 ATOM application

• An ITIL structured service catalog
• Mobile version (for tablets and smartphones)
• Web solution with no installation required on a workstation
• Non-modular solution Asset Management, Configuration Items (CIs), and Inventory
• A flexible and evolutive solution allowing for growth and change in the client’s structure
• Knowledge Base Management
• Self Service Portal
• Dashboards, Built-in Reports, and Report Generation capabilities
• API-Centric solution facilitating Integration

Software Description:

Tracking and managing all of your IT and non-IT assets just got easier. Device42 software enables companies to discover, visualize, and understand their infrastructure and its interdependencies, all from a single dashboard. Track your full asset lifecycle, plus software licenses, service contracts, SSL Certificates, renewal reminders, and more. Generate mobile-friendly barcodes & QR codes, and don't forget about powerful reporting, a full audit trail, and an extensive RESTful API!

  • CMDB for the Cloud Era – A single source of truth within your organization. Get a clear view of your IT ecosystem to identify and manage all configuration items (CI) in your environment.
  • Data Center Management – Data center inventory and asset management. No more manual, decentralized Visio diagrams and/or inconsistent Excel spreadsheets.
  • IP Address Management – IPAM made easy. No more trying to make sense of multiple disparate and outdated spreadsheets. Support for IPv4 & IPv6.
  • Capacity & Power Planning – In addition to rack 'U' tracking, PDU outlet, and switch ports connections are recorded for capacity planning. Additionally, monitor power usage and control smart PDUs using SNMP.
  • App Dependency Mapping – Anticipate and understand the implications of a rack outage or downed server. Improve IT troubleshooting and MTTR with the clear network, connectivity, dependency, and impact visualizations.
  • IT Assets & QR Codes – Powerful ITAM functionality supports management and tracking of all assets featuring custom QR codes with no need for proprietary barcode readers. iOS, Android, and Windows devices are supported for inventory management.

Software Description:

CloudSploit provides SaaS solutions that utilize secure, Amazon Web Services cross-account IAM roles to connect to the APIs of customer accounts, scanning for potential security risks and misconfigurations. These risks cover a breadth of AWS services, including IAM, ELB, EC2, RDS, S3, CloudTrail, and ConfigService. Each scan report contains detailed information about the risk type, affected resources, and remediation steps.


The move from traditional infrastructure to cloud providers like Amazon Web Services introduces a host of new security challenges for organizations of all sizes. Cloud providers handle the physical and network security, while the customer is responsible for designing, launching, and maintaining secure environments within that cloud platform. Amazon Web Services alone has thousands of configuration options and security settings across its suite of products. CloudSploit provides hosted software that continually audits these settings across all of a customer's accounts, producing reports that outline potential security risks and misconfigurations. CloudSploit's product helps DevOps, management, security, and legal teams maintain a secure and compliant cloud infrastructure environment.

Features:

  • Chat
  • Lead Scoring
  • Lead Management
  • Time Management
  • Call Tracking
  • Scheduling
  • Calendar Management
  • Dashboard
  • Third-Party Plugins/Add-Ons
  • Contact Sharing
  • Data Import
  • Multi-User
  • Batch Permissions & Access
  • Customer Management
  • Organization Management
  • Password & Access Management
  • External Integrations
  • API
  • Email Integration
  • Data Export
  • Contact Management
  • Notifications
  • Project Management
  • Bug Tracking

Features:

  • Password & Access Management
  • Dashboard
  • Network Device Performance Monitoring
  • Network Visualization
  • Network Traffic Monitoring
  • Inventory Tracking
  • External Integrations
  • Data Visualization
  • Data Export

Features:

  • API
  • Dashboard
  • Notifications
  • External Integrations

Summary:

    No key features associated with this application.

Summary:

  • Data Center Asset Management

  • Data Center Visualization

  • Structured Cable Management

  • IT Asset & Inventory Management

  • Device & IP Discovery

  • Asset Lifecycle Management

  • IP Address Management

  • Password Management

  • Services Auto-Discovery

  • Software License Management

Summary:

  • Automated AWS security and configuration monitoring

Core

$1,499.00
1 user(s) / year
Included in plan:
  • Data Center Asset Management
  • Data Center Visualization
  • Structured Cable Management
  • IT Asset & Inventory Management
  • Device & IP Discovery
  • Spare Parts Management
  • QR Codes and Asset Tags
  • Asset Lifecycle Management
  • IP Address Management
  • Role-Based Management
  • Contract & Purchase Management
  • Password Management
  • REST APIs

Free

Free
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts

Basic

$7.17
1 user(s) / month
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 36 hours
  • Scan and risk email alerts
  • 3 months of saved results
  • Downloadable scan reports
  • Searchable results

Plus

$36.00
1 user(s) / month
Included in plan:
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 6 hours
  • Scan and risk email alerts
  • 6 months of saved results
  • Downloadable scan reports
  • Searchable results
  • Enable custom plugins
  • Unlimited sub-teams
  • unlimited on-demand scans

Premium

$99.00
1 user(s) / month
Included in plan:
  • Powerful API Access
  • 14 months of saved results
  • Enable custom plugins
  • Unlimited sub-teams
  • Auto scans every 1 hour
  • Scan and risk email alerts
  • Searchable results
  • unlimited on-demand scans
  • unlimited stored accounts
  • Downloadable scan reports
  • Assigned technical resource

FAQs:

    No FAQs associated with this application.

FAQs:

    What is this service generally used for?
  • Maintaining and auto-discovering the network, some of the highlights include Cloud Migration, Data Center Power Management, IP Address Tracking Software, Inventory Management Software, Patch Panel Cable Management, SSL Certificate Management, Savings Calculator, and ISO27001 Compliance.

  • Does this service integrate with any other apps?
  • Integrations include Jira, Cherwell, Infoblox, Hp Service Manager, Foreman, ZenDesk, Servicenow, BMC, Puppet, Logstash, Chef, Rundeck, Ansible, Vmware, Samanage, Saltstack, and Zapier.

  • Does this service offer guides, tutorials and or customer support?
  • We have extensive documentation available but we also have a customer support team that will help you install and maintain our software.

  • What are some applications this service is commonly used in tandem with?
  • Jira, ZenDesk, Servicenow, BMC, Puppety, Chef, Ansible, Saltstack, Zapier, and many more.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Companies and enterprises in need of an CMDB, Application Dependency Mapping (ADM), and DCIM Software Marketplace, that delivers comprehensive, low-cost solutions that help companies automatically maintain an up-to-date inventory of their IP-based Devices and non-IP Assets, whether physical, logical, or virtual.

FAQs:

    Who are the main user groups of this service?
  • Anyone responsible for the security of an Amazon Web Services (AWS) account.

  • What are some applications this service is commonly used in tandem with?
  • Amazon Web Services (AWS)

  • What platforms does this service support?
  • Amazon Web Services (AWS)

  • Does this service integrate with any other apps?
  • Yes

  • What is this service generally used for?
  • Automated Amazon Web Services (AWS) security and configuration monitoring.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes

  • Does this service offer guides, tutorials and or customer support?
  • Yes

  • Does this service offer an API?
  • Yes

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
250

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Other:

Who uses C2 ATOM
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
French, English
Regional Restrictions:
No restrictions.

Other:

Who uses Device42
  • Startups
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses CloudSploit
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.
Back to top