Compare CloudSploit vs Proofpoint vs Code42

More Information More Information More Information

Crozscore:

62%
what is this?
33%
interest falling

Crozscore:

84%
what is this?
70%
55%
no significant changes

Crozscore:

90%
what is this?
90%
46%
no significant changes
CloudSploit screenshot Proofpoint screenshot view 4 more Code42 screenshot view 5 more

Software Description:

CloudSploit provides SaaS solutions that utilize secure, Amazon Web Services cross-account IAM roles to connect to the APIs of customer accounts, scanning for potential security risks and misconfigurations. These risks cover a breadth of AWS services, including IAM, ELB, EC2, RDS, S3, CloudTrail, and ConfigService. Each scan report contains detailed information about the risk type, affected resources, and remediation steps.


The move from traditional infrastructure to cloud providers like Amazon Web Services introduces a host of new security challenges for organizations of all sizes. Cloud providers handle the physical and network security, while the customer is responsible for designing, launching, and maintaining secure environments within that cloud platform. Amazon Web Services alone has thousands of configuration options and security settings across its suite of products. CloudSploit provides hosted software that continually audits these settings across all of a customer's accounts, producing reports that outline potential security risks and misconfigurations. CloudSploit's product helps DevOps, management, security, and legal teams maintain a secure and compliant cloud infrastructure environment.

Software Description:

Proofpoint provides a set of email security tools: policy-based email encryption, industry-specific solutions, email archiving and spam filtering. Main users of this service are large enterprises entities. When it comes to deployment, it can be either as a cloud service or on premises.

The products are developed to ensure reliable email content management and compliance for the large-scale entity. Enterprises are given both inbound and outbound spam and viruses protection, along with GLBA, HIPAA, and PCI compliance.

Policies are configured through a graphical interface designed to assist corporations with defining policies. Proofpoint controls spam, bulk "graymail" and another undesired email messages, so users are protected against impostor email (BEC) and phishing.

Software Description:

Code42 delivers its endpoint data security and recovery product to more than 47,000 organizations around the world. It protects companies' data with guaranteed high-level security regardless of their size or industry.

Using this cloud-based technology, businesses are able to protect end-user data in a single repository and from a single platform. Code 42 provides high-end security standards and significantly reduces the chance of unexpected data disasters resulting in high financial loss.

Thanks to the platform's straightforward interface and simple deployment, it is very easy for users to protect their endpoints and schedule regular backups. The whole package is easy to install, inexpensive, remarkably reliable, and takes care of the whole backup infrastructure.

Features:

  • API
  • Dashboard
  • Notifications
  • External Integrations

Features:

  • Dashboard
  • Firewall
  • API
  • File Sharing
  • File Transfer

Features:

  • Dashboard
  • Notifications
  • Data Export
  • 2-Factor Authentication
  • File Sharing
  • File Transfer
  • External Integrations
  • API

Summary:

  • Automated AWS security and configuration monitoring

Summary:

  • Impostor Email Protection

  • Granular Control of Unwanted Email

  • Business Continuity

  • Targeted Attack Protection

  • Threat Response

  • ET Intelligence

  • Mobile Defense

  • Email Encryption

  • Email Data Loss Prevention (DLP)

  • Data Discover

Summary:

  • File Versioning

  • Automatic Upgrades

  • AES Encryption

  • Bandwidth Governing

  • Reports and Alerts

  • Mobile Compatibility

  • Key Escrowing

  • File Restoration Based on Time and Size

  • Universal Networking

  • Dynamic IP Locator

Free

Free
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts

Basic

$7.17
1 user(s) / month
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 36 hours
  • Scan and risk email alerts
  • 3 months of saved results
  • Downloadable scan reports
  • Searchable results

Plus

$36.00
1 user(s) / month
Included in plan:
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 6 hours
  • Scan and risk email alerts
  • 6 months of saved results
  • Downloadable scan reports
  • Searchable results
  • Enable custom plugins
  • Unlimited sub-teams
  • unlimited on-demand scans

Premium

$99.00
1 user(s) / month
Included in plan:
  • Powerful API Access
  • 14 months of saved results
  • Enable custom plugins
  • Unlimited sub-teams
  • Auto scans every 1 hour
  • Scan and risk email alerts
  • Searchable results
  • unlimited on-demand scans
  • unlimited stored accounts
  • Downloadable scan reports
  • Assigned technical resource

The Standard Price

$8,500.00
By module
Included in plan:
  • plus annual user license fees

Standard

$4.00
1 user(s) / month
Included in plan:
  • 50GB Cloud Storage
  • Automatic & Continuous Endpoint Backup
  • Administration + Reporting
  • End-to-End Security
  • Point-in-Time Recovery
  • Supports Windows, Mac & Linux
  • Monitor Backup Completion
  • Data Protection In-Transit & Rest
  • Device Replacement Wizard
  • Unified Admin Console
  • Okta Integration (Identity Management)

Premium

$8.00
1 user(s) / month
Included in plan:
  • Unlimited Cloud Storage
  • USMT Integration (Profile Settings)
  • Rest API
  • Splunk Integration (Reporting)

FAQs:

    Who are the main user groups of this service?
  • Anyone responsible for the security of an Amazon Web Services (AWS) account.

  • What are some applications this service is commonly used in tandem with?
  • Amazon Web Services (AWS)

  • What platforms does this service support?
  • Amazon Web Services (AWS)

  • Does this service integrate with any other apps?
  • Yes

  • What is this service generally used for?
  • Automated Amazon Web Services (AWS) security and configuration monitoring.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes

  • Does this service offer guides, tutorials and or customer support?
  • Yes

  • Does this service offer an API?
  • Yes

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Knowledge Base, Technical Support, Technical Training, Email Support, Phone Support.

  • What is this service generally used for?
  • This service is generally used for digital security and data loss prevention.

  • Does this service offer an API?
  • Yes.

  • Who are the main user groups of this service?
  • Main users of Proofpoint are larger organizations with industry-specific security requirements, such as for financial, education, government, health-care, hospitality, manufacturing, and retail.

  • What platforms does this service support?
  • It can be both cloud-based or on-premise deployed.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with email clients.

FAQs:

    Does this service integrate with any other apps?
  • Integrations: Splunk Cloud, Z-Discovery.

  • What are some applications this service is commonly used in tandem with?
  • It is commonly used in tandem with Splunk Enterprise.

  • Does this service offer an API?
  • Yes, it offers REST API.

  • Does this service offer guides, tutorials and or customer support?
  • Support: FAQs, Community, Knowledge Base, Online Support, Phone Support, Video Tutorials, Webinars.

  • What platforms does this service support?
  • The platform can be both cloud-based and installed. Operating systems: Windows, Mac OS X, and Linux.

  • Who are the main user groups of this service?
  • Main users of Code42 are middle-sized and large organizations across indrustries.

  • What is this service generally used for?
  • This service is generally used for digital data backup and recovery.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
3.96k

Publisher:

Founded:
-
Based in:
Sunnyvale
Employees:
11-50
Likes:
3.47k
Followers:
23.2k

Publisher:

Founded:
-
Based in:
Minneapolis
Employees:
501-1000
Likes:
Followers:

Other:

Who uses CloudSploit
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Proofpoint
  • Enterprises
Desktop Platforms:
  • Web App
Mobile Platforms:
  • iOS
  • Android
Languages:
French, English, Spanish, German, Japanese
Regional Restrictions:
No restrictions.

Other:

Who uses Code42
  • Startups
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Languages:
English, German
Regional Restrictions:
No restrictions.
Back to top