CORONET in Security as a Service Startups

Coronet offers Access Control and Cloud Control, two security solutions that protect cloud applications and data. Coronet Access Control provides real-time visibility and control over who has access to cloud apps and data, granting access only to authenticated users who are using secure devices that are connected through safe networks. Once access is granted, Cloud Control monitors user activity in the cloud and identifies and blocks abnormal behavior, prevents information theft and data leakage, and counters malware and ransomware.Coronet leverages AI to automatically identify and mitigate risks, provide extensive visibility into user actions, and log responses by its solutions—with no need for humans monitoring or handling security events.

USP : Coronet Access Control allows users to exercise control over anything that tries to access their data and services. It offers full visibility into the security of user services and works with all popular SaaS applications. The secure analysis of its application code is based on the OWASP 10 and compliance objectives such as PCI, SSAE18 SOC1/2, and FISMA/FedRAMP.

BUYERS
VENDORS
EXPERTS
1.3
ANALYSTS
 

CORONET detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support
1.95
3.70
2.45
Feature and Functionality
1.55
3.25
3.15
Deployment
3.30
3.70
5.00
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

CORONET has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Europe

    9 Participants

  • Niche Quadrant

    All-Asia-Pacific

    7 Participants

  • Niche Quadrant

    All-North America

    17 Participants

SECTORS
REGIONS
Europe North America Asia-Pacific
STRENGTHS
  • Product Maturity / Product Applications
    Database and Cloud Security
  • Product Maturity / Regulations compliance
    GDPR
  • Product Maturity / Types of support services offered
    Customer Support
  • Product Maturity / Delivery Model
    Directly
  • Product Maturity / Deployment Model
    Hosted / On-Cloud
  • Product Maturity / Organization size
    Small and Medium Enterprises
  • Product Maturity / Types of support services offered
    Technical Support
  • Product Maturity / Delivery Model
    Through Partners / Third-Party Vendors / MSSPs
  • Product Maturity / Type of solutions offered
    Identity and Access Management
  • Product Maturity / Type of solutions offered
    Vulnerability Scanning
  • Product Maturity / Product Applications
    Pricing Strategy
  • Product Maturity / Product Applications
    Security as a service offerings
  • Product Maturity / Organization size
    Number of end users
  • Product Maturity / Product Applications
    Application Security
  • Product Maturity / Product Applications
    Endpoint Security
  • Product Maturity / Regulations compliance
    FISMA
  • Product Maturity / Regulations compliance
    GLBA
  • Product Maturity / Regulations compliance
    HIPAA
  • Product Maturity / Product Applications
    Network Security
  • Product Maturity / Regulations compliance
    PCI DSS
WEAKNESSES
  • Product Maturity / Regulations compliance
    SOX
  • Product Maturity / Product Applications
    Web and Email Security
  • Product Maturity / Organization size
    Large Enterprises
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Types of support services offered
    Others, please specify
  • Product Maturity / Types of support services offered
    Post Purchase Support
  • Product Maturity / Type of solutions offered
    Business Continuity and Disaster Recovery
  • Product Maturity / Type of solutions offered
    Continuous Monitoring
  • Product Maturity / Type of solutions offered
    Data Loss Prevention
  • Product Maturity / Type of solutions offered
    Email Security 
  • Product Maturity / Type of solutions offered
    Encryption
  • Product Maturity / Type of solutions offered
    Intrusion Management
  • Product Maturity / Type of solutions offered
    Security Information and Event Management
See More

Have you EVER used CORONET Products?

Share your experience with potential buyers.

TOP FEATURES
  • Regulations compliance
    GDPR
  • Type of solutions offered
    Identity and Access Management
  • Types of support services offered
    Customer Support
  • Delivery Model
    Directly
  • Types of support services offered
    Technical Support
  • Type of solutions offered
    Vulnerability Scanning
  • Organization size
    Small and Medium Enterprises
  • Delivery Model / Through Partners / Third-Party Vendors
    MSSPs
  • Product Applications
    Database and Cloud Security
  • Deployment Model / Hosted
    On-Cloud

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

CORONET Presence in Security as a Service Startups

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com