or
Continue with LinkedIn
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

Trend Micro Cloud One

Tekpon Score
9

Trend Micro Cloud One Reviews

& Product Details

What is Trend Micro Cloud One?

For cloud architects, Trend Micro Cloud One is a complete security services platform offering seven services to address all cloud security requirements. It provides automated deployment, root-cause analysis, compliance with numerous rules and norms, and workload security functionality.

The all-in-one solution offers integrated protection across the entire cloud environment, along with actionable intelligence for security teams and developers when they need it. Its automated deployment and discovery capabilities produce operational efficiencies and simplified compliance.

With it, companies can save time, gain total visibility and control, and achieve commercial value through security. It enables smart application security from commit through runtime, integrating with the DevOps technologies that businesses already use.

Use cases include root-cause analysis, container protection, health checks, compliance reports, open-source security, file storage security, and more.

All things considered, Trend Micro Cloud One offers strong security while using the advantages and efficiency of the cloud.

Best For

Securing the Hybrid Cloud.
  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization
  • Personal
  • Cloud, SaaS, Web-Based
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Company Name

    Trend Micro

  • Located In

    Japan

  • Website

    trendmicro.com

Starting from:

Custom

Pricing Model: Subscription

Pricing Details:

Trend Micro Cloud One doesn't have public pricing - talk to sales to get a Custom Quote. A Free 30-day trial is available for all tools included.

  • API
  • AI/Machine Learning
  • Access Controls/Permissions
  • Active Directory Integration
  • Alerts/Escalation
  • Anomaly/Malware Detection
  • Antivirus
  • Application Security
  • Audit Management
  • Cloud Application Security
  • Dashboard
  • Data Security
  • Endpoint Management
  • Event Logs
  • Incident Management
  • Intrusion Detection System
  • Password Management
  • Patch Management
  • Real Time Monitoring
  • Remote Monitoring & Management
  • Risk Management
  • Server Monitoring
  • Threat Intelligence
  • User Management
  • Vulnerability Protection
  • Whitelisting/Blacklisting

Additional Features

  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Notifications
  • Activity Tracking
  • Anti Spam
  • Application Management
  • Approval Workflow
  • Assessment Management
  • Audit Trail
  • Authentication
  • Backup and Recovery
  • Cloud Computing
  • Cloud Security Policy Management
  • Collaboration Tools
  • Compliance Management
  • Compliance Tracking
  • Configurable Workflow
  • Data Collection
  • Data Import/Export
  • Controls Audit
  • Data Migration
  • Data Recovery
  • Customizable Reports
  • Data Replication
  • Data Storage Management
  • Customizable Templates
  • Data Synchronization
  • Data Visualization
  • Document Storage
  • File Management
  • File Sharing
  • Endpoint Protection
  • File Transfer
  • Financial Data Protection
  • Firewalls
  • HIPAA Compliant
  • Historical Reporting
  • ISO Compliance
  • Issue Management
  • Issue Tracking
  • Maintenance Scheduling
  • Monitoring
  • Multi-Device Support
  • Network Scanning
  • Network Security
  • PCI Compliance
  • Real-Time Analytics
  • Real-Time Data
  • Policy Management
  • Real-Time Notifications
  • Real-Time Reporting
  • Process/Workflow Automation
  • Real-Time Synchronization
  • Reminders
  • Remote Access/Control
  • Reporting & Statistics
  • Risk Alerts
  • Risk Analysis
  • Reporting/Analytics
  • Risk Assessment
  • Role-Based Permissions
  • Runtime Container Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Source-Code Scanning
  • Task Management
  • Third-Party Integrations
  • Threat Protection
  • Threat Response
  • Two-Factor Authentication
  • Version Control
  • Virus Definition Update
  • Visual Analytics
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

ESET Cloud Office Security

Tekpon Score
COMPARE

Tell us your opinion about Trend Micro Cloud One and help others.

GoodAccess

Tekpon Score

Anchor

Tekpon Score

Cloudflare

Tekpon Score

Virtru

Tekpon Score

Sprinto

Tekpon Score

Blink Ops

Tekpon Score

Ermetic

Tekpon Score

Nightfall

Tekpon Score

Duo Security

Tekpon Score

Coro

Tekpon Score

Spin.Ai

Tekpon Score

Wiz

Tekpon Score

Lacework

Tekpon Score

Orca Security

Tekpon Score

Safetica

Tekpon Score

SentinelOne

Tekpon Score

LogicMonitor

Tekpon Score

Dynatrace

Tekpon Score

Defendify

Tekpon Score

This website uses cookies

Cookies are small text files that can be used by websites to make a user’s experience more efficient.

The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This means that cookies which are categorized as necessary, are processed based on GDPR Art. 6 (1) (f). All other cookies, meaning those from the categories preferences and marketing, are processed based on GDPR Art. 6 (1) (a) GDPR.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

You can read more about all this at the following links.

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

These trackers help us to measure traffic and analyze your behavior to improve our service.

These trackers help us to deliver personalized ads or marketing content to you, and to measure their performance.