Compare CloudSploit vs ZenMate vs AlienVault USM

You May Also Like

Featured products that are similar to the ones you selected below.

ZenMate

 (174) VPN
More Information More Information More Information

Crozscore

70%
what is this?
no significant changes

Crozscore

89%
what is this?
no significant changes

Crozscore

89%
what is this?
interest rising
CloudSploit screenshot ZenMate screenshot view 1 more AlienVault USM screenshot view 5 more

About CloudSploit

CloudSploit provides SaaS solutions that utilize secure, Amazon Web Services cross-account IAM roles to connect to the APIs of customer accounts, scanning for potential security risks and misconfigurations. These risks cover a breadth of AWS services, including IAM, ELB, EC2, RDS, S3, CloudTrail, and ConfigService. Each scan report contains detailed information about the risk type, affected resources, and remediation steps.


The move from traditional infrastructure to cloud providers like Amazon Web Services introduces a host of new security challenges for organizations of all sizes. Cloud providers handle the physical and network security, while the customer is responsible for designing, launching, and maintaining secure environments within that cloud platform. Amazon Web Services alone has thousands of configuration options and security settings across its suite of products. CloudSploit provides hosted software that continually audits these settings across all of a customer's accounts, producing reports that outline potential security risks and misconfigurations. CloudSploit's product helps DevOps, management, security, and legal teams maintain a secure and compliant cloud infrastructure environment.

About ZenMate

ZenMate is an add-on for both Chrome and Firefox that encrypts, secures and protects connections and privacy while browsing online.


ZenMate gives users open and unrestricted access to the web with absolutely no sniffing, tracking or wiretapping.

With ZenMate, it’s all about 100% security, 100% privacy.

About AlienVault USM

This unified powerful platform enables organizations to quickly detect and respond to threats by combining multiple essential security capabilities. It features asset discovery, vulnerability management, intrusion detection, behavioral monitoring, SIEM, and log management.

AlienVault is developed to protect cloud, on-premises, and hybrid infrastructure, delivering constant threat intelligence and actionable incident response. It is able to monitor Office 365, Google Suite, Amazon Web Services, and Microsoft Azure Cloud. This software stands out for its GUI, which features exemplary graphical interface, as well as customizable and interactive dashboard. There is also data visualization, with charts, graphs, maps, and other graphic elements.

AlienVault is cloud-based, so it deploys swiftly and empowers users to start identifying threats within minutes. Its core capabilities include Asset Discovery, Intrusion Detection, Security Automation, SIEM and Log Management, Threat Detection, Threat Intelligence, and Vulnerability Assessment.

Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

Features

  • API
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Malware Protection
  • DDoS Protection

Features

  • 2-Factor Authentication
  • Anti-Virus
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • External Integrations
  • File Sharing
  • File Transfer
  • Firewall
  • Multi-User
  • Notifications
  • Password & Access Management

Summary

  • Automated AWS security and configuration monitoring

Summary

  • Easy to install and use in just a matter of clicks.

  • Browse the web, as free as a bird with completely open & unrestricted access.

  • Encrypts and secures connections to give 100% privacy, 100% security.

  • Protect up to 5 devices

  • Made in Germany

  • 30 days money back guaranteed

  • Great price – Great Value!

Summary

  • Asset Discovery

  • Vulnerability Assessment

  • Intrusion Detection

  • Behavioral Monitoring

  • SIEM and Log Management

  • User Activity Monitoring

  • AWS VPC Flow Monitoring

  • Network Vulnerability Scanning

  • Cloud Vulnerability Scanning

  • Event Correlation

Pricing

Free

Free
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts

Basic

$7.17
1 user(s) / month
Included in plan:
  • unlimited on-demand scans
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 36 hours
  • Scan and risk email alerts
  • 3 months of saved results
  • Downloadable scan reports
  • Searchable results

Plus

$36.00
1 user(s) / month
Included in plan:
  • unlimited users
  • unlimited stored accounts
  • Auto scans every 6 hours
  • Scan and risk email alerts
  • 6 months of saved results
  • Downloadable scan reports
  • Searchable results
  • Enable custom plugins
  • Unlimited sub-teams
  • unlimited on-demand scans

Premium

$99.00
1 user(s) / month
Included in plan:
  • Powerful API Access
  • 14 months of saved results
  • Enable custom plugins
  • Unlimited sub-teams
  • Auto scans every 1 hour
  • Scan and risk email alerts
  • Searchable results
  • unlimited on-demand scans
  • unlimited stored accounts
  • Downloadable scan reports
  • Assigned technical resource

Pricing

Essentials

$1,075.00
1 user(s) / month
Included in plan:
  • 15 days of real-time event search
  • Asset discovery and inventory
  • Vulnerability assessment
  • Intrusion detection
  • SIEM event correlation
  • Incident response
  • Log management
  • Compliance reports
  • Email alerts
  • Federation ready

Standard

$1,695.00
1 user(s) / month
Included in plan:
  • 30 days of real-time event search
  • Integrated ticketing and alerting
  • Orchestration with security tools
  • Automated incident response and forensics
  • Dark web monitoring
  • Support for higher data volumes

Premium

$2,595.00
1 user(s) / month
Included in plan:
  • 90 days of real-time event search
  • Supports PCI log storage requirements
  • Enhanced support case response times

FAQs

    Who are the main user groups of this service?
  • Anyone responsible for the security of an Amazon Web Services (AWS) account.

  • What are some applications this service is commonly used in tandem with?
  • Amazon Web Services (AWS)

  • What platforms does this service support?
  • Amazon Web Services (AWS)

  • Does this service integrate with any other apps?
  • Yes

  • What is this service generally used for?
  • Automated Amazon Web Services (AWS) security and configuration monitoring.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes

  • Does this service offer guides, tutorials and or customer support?
  • Yes

  • Does this service offer an API?
  • Yes

FAQs

    What are some applications this service is commonly used in tandem with?
  • NetFlix, Bitrorent

  • Who are the main user groups of this service?
  • All over the world

  • What platforms does this service support?
  • Windows, Mac,iOS, Android,Kodi, Linux ,

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes , up to 5 devices.
    In addition you can buy for more devices.

  • What is this service generally used for?
  • Keep your [rivacy, streaming from many servers , P2P sharing

  • Does this service offer guides, tutorials and or customer support?
  • Yes of course

FAQs

    Does this service integrate with any other apps?
  • Integrations: Active Directory, Mcafee-epo, Office 365, and G Suite.

  • Does this service offer guides, tutorials and or customer support?
  • Support: Phone Support, Email Support, Community Support, FAQs, Videos, and Webinars.

  • Who are the main user groups of this service?
  • The main users of AlienVault are IT security teams in organizations ranging in size from 500 to 5,000 employees.

  • Does this service offer an API?
  • Yes, it offers an API.

  • What platforms does this service support?
  • This is a web-based service.

  • What is this service generally used for?
  • This service is generally used as a unified security management system.

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
6.29k

Vendor Information

Founded:
2013
Based in:
Berlin
Employees:
11-50
Likes:
Followers:
8.06k

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:
163

Other

Who uses CloudSploit
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other

Who uses ZenMate
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
  • WinPhone
  • Blackberry
Languages:
French, German, English
Regional Restrictions:
No restrictions.

Other

Who uses AlienVault USM
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.
Back to top