Compare CloudSploit vs CarbonBlack vs Mimecast

More Information More Information More Information

Crozscore:

68%
what is this?
34%
interest falling

Crozscore:

82%
what is this?
42%
interest rising

Crozscore:

90%
what is this?
52%
interest rising
CloudSploit screenshot CarbonBlack screenshot view 5 more Mimecast screenshot view 5 more

Software Description:

CloudSploit provides SaaS solutions that utilize secure, Amazon Web Services cross-account IAM roles to connect to the APIs of customer accounts, scanning for potential security risks and misconfigurations. These risks cover a breadth of AWS services, including IAM, ELB, EC2, RDS, S3, CloudTrail, and ConfigService. Each scan report contains detailed information about the risk type, affected resources, and remediation steps.


The move from traditional infrastructure to cloud providers like Amazon Web Services introduces a host of new security challenges for organizations of all sizes. Cloud providers handle the physical and network security, while the customer is responsible for designing, launching, and maintaining secure environments within that cloud platform. Amazon Web Services alone has thousands of configuration options and security settings across its suite of products. CloudSploit provides hosted software that continually audits these settings across all of a customer's accounts, producing reports that outline potential security risks and misconfigurations. CloudSploit's product helps DevOps, management, security, and legal teams maintain a secure and compliant cloud infrastructure environment.

Software Description:

One of the most used products of this service provider is CB Defense which is one of the strongest security solutions for data centers and critical systems.

Carbon Black’s security solution is based on the central whitelist database, which consists of a registry of trusted software and their classifications/ratings. CB Defense provides its users with transparent anti-virus solution, a low impact on their systems, and provides lots of useful reporting data. The antivirus, along with EDR is presented in one cloud-delivered platform that stops all kinds of malware and ransomware.

CB Defense catches all unfiltered data from the endpoint and analyzes events in context to reveal arising threats that other platforms could miss. Unlike traditional antivirus, there are no lags behind emerging attacks and thanks to the automation of operational tasks, manual efforts are reduced to the minimum.

Software Description:

Mimecast delivers solutions related to email security, positioning itself as one of the major players in the anti-ransomware market. Moreover, this platform offers the complete email management system for recording and monitoring all emails.

The main purpose of this service is to protect organization's email communication with multi-layered detection engines and content protection. Mimecast is one of the essential security-related tools that companies must have in today's changing cybersecurity environment. It handles all email gateway functions and protection from spam, viruses, and attachment threats.

Mimecast's flagship is its sandboxing technology. The sandbox sets up a virtual environment, opens the file and executes full security examination of the content. Only If the file is considered absolutely safe, the mail is delivered to the recipient. Mimecast inspects inbound, outbound, and internal emails, as well as graymail, mailing lists, and newsletters.

Features:

  • API
  • Dashboard
  • Notifications
  • External Integrations

Features:

  • Dashboard
  • Notifications
  • Data Export
  • External Integrations
  • API
  • Firewall
  • Anti-Virus

Features:

  • Scheduling
  • Google Apps Integration
  • Contact Management
  • Email Integration
  • Dashboard
  • Notifications
  • Password & Access Management
  • Multi-User
  • 2-Factor Authentication
  • Anti-Virus
  • External Integrations
  • API
  • File Transfer
  • Data Import
  • Data Export

Summary:

  • Automated AWS security and configuration monitoring

Summary:

  • Prevents attacks automatically, online and offline

  • Stops malware, ransomware, and non-malware attacks

  • Blocks emerging, never-before-seen attacks that other solutions miss

  • Records and stores the complete data record of every endpoint, even if it is offline

  • Visualizes every stage of the attack with easy-to-follow attack chain

  • Uncovers root cause in minutes to quickly address gaps in your defenses

  • Continuous and centralized recording provides complete visibility into the attack

  • Quickly visualize the attack chain to see exactly what attackers are trying to do

  • Creates a secure shell to any endpoint on or off the network to address critical issues

  • Deploys in 15 minutes or less, with less than 1% CPU and disk space per endpoint

Summary:

  • Email Archiving

  • Email Monitoring

  • Routing

  • Spam Blocker

  • Targeted Threat Protection

  • Sending Large Files

  • Content Control and Data Leak Protection

  • Advanced Email Signature

  • Disclaimer Management

  • DNS Authentication

Free

Free
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts

Basic

$7.17
1 user(s) / month
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 36 hours
  • Scan and risk email alerts
  • 3 months of saved results
  • Downloadable scan reports
  • Searchable results

Plus

$36.00
1 user(s) / month
Included in plan:
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 6 hours
  • Scan and risk email alerts
  • 6 months of saved results
  • Downloadable scan reports
  • Searchable results
  • Enable custom plugins
  • Unlimited sub-teams
  • unlimited on-demand scans

Premium

$99.00
1 user(s) / month
Included in plan:
  • Powerful API Access
  • 14 months of saved results
  • Enable custom plugins
  • Unlimited sub-teams
  • Auto scans every 1 hour
  • Scan and risk email alerts
  • Searchable results
  • unlimited on-demand scans
  • unlimited stored accounts
  • Downloadable scan reports
  • Assigned technical resource

3-year license

$420.00
3-year license
Included in plan:
  • Single endpoint installation
  • Built entirely on open APIs and features easy integration with other tools

FAQs:

    Who are the main user groups of this service?
  • Anyone responsible for the security of an Amazon Web Services (AWS) account.

  • What are some applications this service is commonly used in tandem with?
  • Amazon Web Services (AWS)

  • What platforms does this service support?
  • Amazon Web Services (AWS)

  • Does this service integrate with any other apps?
  • Yes

  • What is this service generally used for?
  • Automated Amazon Web Services (AWS) security and configuration monitoring.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes

  • Does this service offer guides, tutorials and or customer support?
  • Yes

  • Does this service offer an API?
  • Yes

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Webinars, Training, Community Support, Phone Support, Email Support.

  • Does this service integrate with any other apps?
  • Integrations: Cyphort, Corvil, ServiceNow.

  • What is this service generally used for?
  • This service is used for anti-malware protection.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • Does this service offer an API?
  • Yes, it offers RESTful API.

  • Who are the main user groups of this service?
  • Main users of CarbonBlack are enterprise-level organizations.

  • What platforms does this service support?
  • This service supports WIndows, MacOS, Red Hat Linux, and CentOS.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Training, Webinars, Phone Support, Email.

  • What platforms does this service support?
  • This is a web-based software.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email applications.

  • What is this service generally used for?
  • This service is generally used for email security.

  • Does this service integrate with any other apps?
  • Integrations: Microsoft Outlook, Gmail, Salesforce.

  • Does this service offer an API?
  • Yes, it offers API.

  • Who are the main user groups of this service?
  • Users of Mimecast are organizations, from small ones to the Fortune 500.

  • Does this service offer multi-user capability (e.g. teams)?
  • Mimecast supports deployment in both standalone and multi-user environments.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Southborough
Employees:
51-200
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Moorgate
Employees:
1001-5000
Likes:
5.33k
Followers:
18.5k

Other:

Who uses CloudSploit
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses CarbonBlack
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Mimecast
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
German, English
Regional Restrictions:
No restrictions.
Back to top