CLOUDACCESS in Security as a Service Startups

CloudSOC provides a number of components in a fully integrated suite along with 24/7 team of analysts to provide a managed SOC-in-a-Box. Managed Security Operation Center Service (Managed SOC) provides a team of security analysts and a comprehensive security platform to monitor internal and external threats, assess threats, report incidents and recommend action. REACT (Realtime Event & Access Correlation Technology) is a game-changing security intelligence platform which collects data from virtually any infrastructure security product and application, analyzes that data for behavioral anomalies, applies and enforces organizational security policies and secures the data in real time. Identity Management offers automated provisioning, greater control and a secure and easy way to manage and synchronize credentials throughout the enterprise.

USP : CloudSOC can address the needs of an expanded group of network sizes. The hierarchical architecture of CloudAccess SIEM engines, CloudAccess Log Management (CloudLogger) forensic archives, and the CloudAccess Sensors allow seamless communication over encrypted connections to address even the largest and most complex networks. The true and unique value of REACT is it works with existing security tool investments and can add the necessary solutions to close the circle. So, if an organization already has an investment (for example Identity Management), REACT leverages the investment with the other modules.

BUYERS
VENDORS
EXPERTS
1.6
ANALYSTS
 

CLOUDACCESS detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support
2.45
3.70
2.45
Feature and Functionality
1.90
3.25
3.15
Deployment
5.00
3.70
5.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

CLOUDACCESS has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-North America

    17 Participants

  • Niche Quadrant

    BFSI-All

    17 Participants

STRENGTHS
  • Product Maturity / Product Applications
    Database and Cloud Security
  • Product Maturity / Regulations compliance
    GLBA
  • Product Maturity / Types of support services offered
    Customer Support
  • Product Maturity / Delivery Model
    Directly
  • Product Maturity / Deployment Model
    Hosted / On-Cloud
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Types of support services offered
    Technical Support
  • Product Maturity / Delivery Model
    Through Partners / Third-Party Vendors / MSSPs
  • Product Maturity / Type of solutions offered
    Data Loss Prevention
  • Product Maturity / Type of solutions offered
    Email Security 
  • Product Maturity / Type of solutions offered
    Identity and Access Management
  • Product Maturity / Product Applications
    Pricing Strategy
  • Product Maturity / Product Applications
    Security as a service offerings
  • Product Maturity / Organization size
    Number of end users
  • Product Maturity / Product Applications
    Application Security
  • Product Maturity / Product Applications
    Endpoint Security
  • Product Maturity / Regulations compliance
    FISMA
  • Product Maturity / Regulations compliance
    GDPR
  • Product Maturity / Regulations compliance
    HIPAA
  • Product Maturity / Product Applications
    Network Security
WEAKNESSES
  • Product Maturity / Regulations compliance
    PCI DSS
  • Product Maturity / Regulations compliance
    SOX
  • Product Maturity / Product Applications
    Web and Email Security
  • Product Maturity / Organization size
    Large Enterprises
  • Product Maturity / Types of support services offered
    Others, please specify
  • Product Maturity / Types of support services offered
    Post Purchase Support
  • Product Maturity / Organization size
    Small and Medium Enterprises
  • Product Maturity / Type of solutions offered
    Business Continuity and Disaster Recovery
  • Product Maturity / Type of solutions offered
    Continuous Monitoring
  • Product Maturity / Type of solutions offered
    Encryption
  • Product Maturity / Type of solutions offered
    Intrusion Management
  • Product Maturity / Type of solutions offered
    Security Information and Event Management
  • Product Maturity / Type of solutions offered
    Vulnerability Scanning
See More

Have you EVER used CLOUDACCESS Products?

Share your experience with potential buyers.

TOP FEATURES
  • Type of solutions offered
    Data Loss Prevention
  • Type of solutions offered
    Identity and Access Management
  • Regulations compliance
    GLBA
  • Deployment Model
    On-Premise
  • Types of support services offered
    Customer Support
  • Delivery Model
    Directly
  • Deployment Model / Hosted
    On-Cloud
  • Types of support services offered
    Technical Support
  • Type of solutions offered
    Email Security 
  • Delivery Model / Through Partners / Third-Party Vendors
    MSSPs

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

CLOUDACCESS Presence in Security as a Service Startups

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com