Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Centralize the configuration for all your Azure applications in a single, hosted repository. This enables you to manage settings efficiently and consistently in real time, minimizing disruptions for users by preventing lengthy redeployments. Azure App Configuration is designed with a focus on speed, scalability, and robust security measures. You can easily toggle features using feature flags and address urgent issues immediately. The ability to sidestep expensive redeployments enhances your control during critical moments. In modern applications, particularly those utilizing cloud infrastructure, there are numerous distributed components. Distributing configuration settings across these components often results in challenging errors that can complicate application deployments. By employing a centralized configuration store, you can significantly reduce the likelihood of encountering these issues, ensuring smoother and more reliable application performance.
Description
This integrated solution can perform active, passive, and agent-based assessments. It also allows for flexibility in evaluating risk according to each business. SAINT's remarkable, flexible, and scalable scanning capabilities make it stand out from other solutions in this market. SAINT has partnered up with AWS to allow its customers to benefit from AWS's efficient scanning. SAINT also offers Windows scanning agents for subscribers. Security teams can easily schedule scans, configure them with a lot of flexibility, and fine-tune their settings with advanced options.
API Access
Has API
API Access
Has API
Integrations
Apono
Azure Marketplace
Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
Microsoft Azure
Splunk Enterprise
Integrations
Apono
Azure Marketplace
Cisco Identity Services Engine (ISE)
Dradis
IBM QRadar SIEM
Microsoft Azure
Splunk Enterprise
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$1500.00/year/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
azure.microsoft.com/en-us/products/app-configuration
Vendor Details
Company Name
Carson & SAINT
Founded
1997
Country
United States
Website
www.carson-saint.com/products/saint-security-suite/vulnerability-management/
Product Features
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Incident Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
Incident Reporting
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
IT Asset Management
Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning