Average Ratings 0 Ratings
Average Ratings 8 Ratings
Description
                    A growing number of companies are shifting their operations to cloud platforms to enhance their digital transformation efforts. This transition necessitates a novel security solution that offers centralized oversight and administration for workloads within these cloud environments. AhnLab CPP serves as a cohesive cloud workload protection platform that emphasizes delivering tailored security, streamlined management, and adaptability for workloads across hybrid settings. It ensures extensive visibility and straightforward management for workloads operating on both on-premise and cloud servers, including AWS and Azure environments. The platform facilitates effortless operation through a single web-based management interface. With its modular CPP management, it allows for flexible configurations based on specific business needs. Additionally, it helps reduce costs by permitting targeted installation and utilization of security solutions. Moreover, it offers real-time malware scanning capabilities for both Windows and Linux servers while maintaining minimal resource and performance impact, ensuring that businesses can operate efficiently in a secure environment. Ultimately, AhnLab CPP represents a critical tool for organizations striving to safeguard their cloud workloads while embracing the advantages of digital innovation.
                
            
        
            Description
                    CrowdStrike Falcon is a cutting-edge cybersecurity platform that operates in the cloud, delivering robust defenses against a variety of cyber threats such as malware, ransomware, and complex attacks. By utilizing artificial intelligence and machine learning technologies, it enables real-time detection and response to potential security incidents, while offering features like endpoint protection, threat intelligence, and incident response. The system employs a lightweight agent that consistently scans endpoints for any indicators of malicious behavior, ensuring visibility and security with minimal effect on overall system performance. Falcon's cloud-based framework facilitates quick updates, adaptability, and swift threat responses across extensive and distributed networks. Its extensive suite of security functionalities empowers organizations to proactively prevent, identify, and address cyber risks, establishing it as an essential resource for contemporary enterprise cybersecurity. Additionally, its seamless integration with existing infrastructures enhances overall security posture while minimizing operational disruptions.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    BeyondCorp Enterprise
            
            
        
        
    
        
        
            
                
    BlueCat Gateway
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    CnSight
            
            
        
        
    
        
        
            
                
    Coalfire
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    CyberArk Secure Cloud Access
            
            
        
        
    
        
        
            
                
    Falcon Discover
            
            
        
        
    
        
        
            
                
    Falcon Spotlight
            
            
        
        
    
        
        
            
                
    Falcon X Recon
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    BeyondCorp Enterprise
            
            
        
        
    
        
        
            
                
    BlueCat Gateway
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    CnSight
            
            
        
        
    
        
        
            
                
    Coalfire
            
            
        
        
    
        
        
            
                
    Coralogix
            
            
        
        
    
        
        
            
                
    CyberArk Secure Cloud Access
            
            
        
        
    
        
        
            
                
    Falcon Discover
            
            
        
        
    
        
        
            
                
    Falcon Spotlight
            
            
        
        
    
        
        
            
                
    Falcon X Recon
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
AhnLab
Country
South Korea
Website
global.ahnlab.com/site/product/productSubDetail.do
Vendor Details
Company Name
CrowdStrike
Founded
2011
Country
United States
Website
www.crowdstrike.com/platform/
Product Features
Cloud Workload Protection
                                        Anomaly Detection
                                        
                                    
                                    
                                    
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Cloud Gap Analysis
                                        
                                    
                                    
                                    
                                        Cloud Registry
                                        
                                    
                                    
                                    
                                        Data Loss Prevention (DLP)
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Governance
                                        
                                    
                                    
                                    
                                        Logging & Reporting
                                        
                                    
                                    
                                    
                                        Machine Learning
                                        
                                    
                                    
                                    
                                        Security Audit
                                        
                                    
                                    
                                    
                                        Workload Diversity
                                        
                                    
                            
                        Product Features
Artificial Intelligence
                                        Chatbot
                                        
                                    
                                    
                                    
                                        For Healthcare
                                        
                                    
                                    
                                    
                                        For Sales
                                        
                                    
                                    
                                    
                                        For eCommerce
                                        
                                    
                                    
                                    
                                        Image Recognition
                                        
                                    
                                    
                                    
                                        Machine Learning
                                        
                                    
                                    
                                    
                                        Multi-Language
                                        
                                    
                                    
                                    
                                        Natural Language Processing
                                        
                                    
                                    
                                    
                                        Predictive Analytics
                                        
                                    
                                    
                                    
                                        Process/Workflow Automation
                                        
                                    
                                    
                                    
                                        Rules-Based Automation
                                        
                                    
                                    
                                    
                                        Virtual Personal Assistant (VPA)
                                        
                                    
                            
                        Brand Protection
                                        Case Management
                                        
                                    
                                    
                                    
                                        Domain Monitoring
                                        
                                    
                                    
                                    
                                        Investigation Management
                                        
                                    
                                    
                                    
                                        Marketplace Monitoring
                                        
                                    
                                    
                                    
                                        Mobile App Monitoring
                                        
                                    
                                    
                                    
                                        Paid Search Monitoring
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Social Media Monitoring
                                        
                                    
                            
                        Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Cloud Workload Protection
                                        Anomaly Detection
                                        
                                    
                                    
                                    
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Cloud Gap Analysis
                                        
                                    
                                    
                                    
                                        Cloud Registry
                                        
                                    
                                    
                                    
                                        Data Loss Prevention (DLP)
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Governance
                                        
                                    
                                    
                                    
                                        Logging & Reporting
                                        
                                    
                                    
                                    
                                        Machine Learning
                                        
                                    
                                    
                                    
                                        Security Audit
                                        
                                    
                                    
                                    
                                        Workload Diversity
                                        
                                    
                            
                        Computer Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Audit Trail
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Database Security Audit
                                        
                                    
                                    
                                    
                                        File Access Control
                                        
                                    
                                    
                                    
                                        Financial Data Protection
                                        
                                    
                                    
                                    
                                        Maintenance Scheduling
                                        
                                    
                                    
                                    
                                        Real Time Monitoring
                                        
                                    
                                    
                                    
                                        Security Event Log
                                        
                                    
                                    
                                    
                                        Virus Definition Update
                                        
                                    
                                    
                                    
                                        Vulnerability Protection
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Endpoint Detection and Response (EDR)
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Blacklisting/Whitelisting
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Malware/Anomaly Detection
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Root Cause Analysis
                                        
                                    
                            
                        Endpoint Protection
                                        Activity Log
                                        
                                    
                                    
                                    
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Device Management
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Signature Matching
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting