Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects the inside with unified visibility, microsegmentation and zero-trust network access. It also protects endpoints, workloads, and endpoints with endpoint protection. Visibility across multiclouds and on-premise. Protection of cloud workloads via micro-segment Stop ransomware taking control of your endpoints. You can see all communications between processes, files and users. With built-in vulnerability and threat assessment, you can identify security gaps. Simpler and quicker time-to-compliance for HIPAA, PCI and GDPR. You can easily create ZeroTrust Zones™ and dramatically reduce the attack surface. Dynamic policies that protect cloud workloads. Without the need for cumbersome firewall rules or VLANs/ACLs, you can block lateral threats. By allowing only whitelisted processes, you can lock down any endpoint. Stop communication to C&C servers and block zero-day exploits.

Description

NCM Security Central integrates cloud security operations for workloads and data across various cloud environments while automating incident response through intelligent analysis and adherence to regulatory requirements. Create a comprehensive, automated multi-cloud response platform that supports essential strategies such as defense-in-depth and Zero Trust Architecture (ZTA). Evaluate your risk of a security breach swiftly by identifying vulnerabilities within your applications and data before they can be exploited. Achieve immediate compliance with industry benchmarks through tailored audits spanning from public clouds to on-premises solutions without incurring significant management overhead. Utilize Qualys’ scanning integration to link potential security threats, and harness the capabilities of Nutanix X-Play to streamline incident response or to develop micro-segmentation workflows. Enhance your asset visibility across all workloads, and compare these insights against compliance standards like CIS, NIST CSF v1.1, PCI-DSS v3.2.1, and HIPAA for public cloud environments, as well as PCI-DSS v3.2.1 and DISA STIG for Nutanix on-premises setups. By implementing these strategies, organizations can significantly bolster their security posture in an increasingly complex digital landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Citrix Analytics
HYCU
Microsoft 365
Microsoft Azure
Nutanix Cloud Manager
Qualys TruRisk Platform
SAP Cloud Platform

Integrations

Amazon Web Services (AWS)
Citrix Analytics
HYCU
Microsoft 365
Microsoft Azure
Nutanix Cloud Manager
Qualys TruRisk Platform
SAP Cloud Platform

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

ColorTokens

Founded

2001

Country

United States

Website

colortokens.com/xtended-zerotrust-security-platform/

Vendor Details

Company Name

Nutanix

Country

United States

Website

www.nutanix.com/products/cloud-manager/security-central

Product Features

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Alternatives

Alternatives

RidgeShield Reviews

RidgeShield

Ridge Security
Fidelis Halo Reviews

Fidelis Halo

Fidelis Security
Runecast  Reviews

Runecast

Runecast Solutions