Company Website

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 86 Ratings

What is Unisys CloudForte?

In the rapidly changing digital world we live in, companies are increasingly leveraging the cloud as a crucial element for driving transformation. It is vital to reassess your existing cloud strategy to see if you are fully capitalizing on the advantages that cloud technology can offer. What further benefits can you unlock from its potential? Moreover, can these benefits be realized without compromising security and adhering to compliance requirements? The solution can be found in Unisys Cloud and Infrastructure Solutions. By adopting a completely vendor-neutral stance, we enable access to the best functionalities from a wide variety of platforms and service providers, thus fostering a cloud transformation that prioritizes both cost-effectiveness and security. The cloud presents extraordinary advantages like agility, scalability, and innovation; however, to effectively tap into these benefits, a strategic plan and a skilled team are essential for successful implementation. Unisys is prepared to support you on this path, leveraging our extensive international cloud expertise gained from working in 110 countries and across multiple sectors, which equips us to deploy the right skills and resources to achieve your objectives. Through collaboration with us, organizations can successfully navigate the intricate process of cloud integration and unlock the full potential of their digital transformation efforts, ultimately positioning themselves for sustained success in the digital era.

What is Satori?

Satori is an innovative Data Security Platform (DSP) designed to facilitate self-service data access and analytics for businesses that rely heavily on data. Users of Satori benefit from a dedicated personal data portal, where they can effortlessly view and access all available datasets, resulting in a significant reduction in the time it takes for data consumers to obtain data from weeks to mere seconds. The platform smartly implements the necessary security and access policies, which helps to minimize the need for manual data engineering tasks. Through a single, centralized console, Satori effectively manages various aspects such as access control, permissions, security measures, and compliance regulations. Additionally, it continuously monitors and classifies sensitive information across all types of data storage—including databases, data lakes, and data warehouses—while dynamically tracking how data is utilized and enforcing applicable security policies. As a result, Satori empowers organizations to scale their data usage throughout the enterprise, all while ensuring adherence to stringent data security and compliance standards, fostering a culture of data-driven decision-making.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Amazon Redshift
Amazon S3
Azure SQL Database
CockroachDB
Collibra
Google Cloud BigQuery
MariaDB
Microsoft Entra ID Protection
Microsoft Power BI
MongoDB
MySQL
Okta
OpenSearch
Preset
Sisense
Snowflake
Tableau

Integrations Supported

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Amazon Redshift
Amazon S3
Azure SQL Database
CockroachDB
Collibra
Google Cloud BigQuery
MariaDB
Microsoft Entra ID Protection
Microsoft Power BI
MongoDB
MySQL
Okta
OpenSearch
Preset
Sisense
Snowflake
Tableau

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Unisys

Company Location

United States

Company Website

www.unisys.com/solutions/cloud-and-infrastructure-solutions/

Company Facts

Organization Name

Satori

Date Founded

2019

Company Location

California, USA

Company Website

satoricyber.com

Categories and Features

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Categories and Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Compliance

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Quality

Address Validation
Data Deduplication
Data Discovery
Data Profililng
Master Data Management
Match & Merge
Metadata Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

CLEAR Reviews & Ratings

CLEAR

Quantum Knight
Morpheus Reviews & Ratings

Morpheus

Morpheus Data