Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Wiz Reviews & Ratings
    1,446 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    531 Ratings
    Company Website
  • Guardz Reviews & Ratings
    117 Ratings
    Company Website
  • Cloudflare Reviews & Ratings
    2,002 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website
  • ZeroPath Reviews & Ratings
    2 Ratings
    Company Website
  • PathSolutions TotalView Reviews & Ratings
    43 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    29 Ratings
    Company Website
  • Google Cloud BigQuery Reviews & Ratings
    2,008 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    104 Ratings
    Company Website

What is Google Cloud Security Command Center?

Google Cloud's security and risk management solution provides valuable insights into your project management, resource oversight, and the ability to manage service accounts effectively. This platform is instrumental in identifying security misconfigurations and compliance concerns within your Google Cloud setup, offering practical recommendations to resolve these issues. Additionally, it helps you unearth potential threats to your resources through log analysis, leveraging Google's advanced threat intelligence and employing kernel-level instrumentation to detect possible container vulnerabilities. Moreover, you can keep track of your assets in near real-time across various services, including App Engine, BigQuery, Cloud SQL, Cloud Storage, Compute Engine, Cloud Identity and Access Management, and Google Kubernetes Engine. By examining historical discovery scans, you gain insights into any new, modified, or removed assets, which contributes to a thorough understanding of your security posture. Furthermore, the platform also identifies common web application vulnerabilities, such as cross-site scripting and outdated libraries, thereby strengthening your security measures. This proactive stance not only protects your assets but also facilitates compliance in a constantly changing digital environment, ultimately ensuring that your cloud infrastructure remains resilient against emerging threats. With continuous monitoring and robust analytics, you can stay one step ahead of potential security challenges.

What is Cortex Xpanse?

Cortex Xpanse effectively tracks and manages assets across the entire internet, guaranteeing that your security operations team remains vigilant against any potential exposure gaps. It provides an extensive view of your possible attack surface, enabling you to accurately identify and attribute all internet-connected assets while revealing both authorized and unauthorized ones. The platform monitors changes and maintains a unified repository of information. By identifying dangerous communications within the global data stream, it assists in preventing breaches and ensuring compliance with regulations. Additionally, it addresses third-party risks by identifying vulnerabilities that might stem from configuration errors. This helps you avoid inheriting security challenges through mergers and acquisitions. Xpanse offers a detailed, accurate, and continuously updated catalog of all assets visible on the global internet, giving you the tools to identify, evaluate, and reduce risks linked to your attack surface. Moreover, it allows you to emphasize risky communications, assess supplier threats, and examine the security status of organizations you acquire. By staying ahead of potential exposures and misconfigurations, you can prevent breaches from occurring, thereby enhancing the robustness of your overall security strategy. This proactive approach not only protects your assets but also fosters a culture of vigilance within your security operations.

Media

Media

Integrations Supported

Agile CRM
Cloudamize
DataMetrics
Dito CRM
FreshBooks
Google Cloud BigQuery
Google Cloud Identity
Google Cloud Platform
Google Cloud SQL
Google Compute Engine
HPE Ezmeral
HPE Industrial IoT
HPE SimpliVity 380
HPE vLabs
LogicMonitor
Moobidesk
Seemplicity
Tamnoon

Integrations Supported

Agile CRM
Cloudamize
DataMetrics
Dito CRM
FreshBooks
Google Cloud BigQuery
Google Cloud Identity
Google Cloud Platform
Google Cloud SQL
Google Compute Engine
HPE Ezmeral
HPE Industrial IoT
HPE SimpliVity 380
HPE vLabs
LogicMonitor
Moobidesk
Seemplicity
Tamnoon

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Google

Date Founded

1998

Company Location

United States

Company Website

cloud.google.com/security-command-center

Company Facts

Organization Name

Cortex

Date Founded

2014

Company Location

United States

Company Website

www.paloaltonetworks.com/cortex/cortex-xpanse

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

Tenable One Reviews & Ratings

Tenable One

Tenable
Tenable One Reviews & Ratings

Tenable One

Tenable