+
+

Related Products

  • Wiz
    1,439 Ratings
    Visit Website
  • Orca Security
    522 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • phoenixNAP
    6 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • FuelCloud
    28 Ratings
    Visit Website

About

An API based cloud security posture management and compliance assurance platform that offers enterprises complete cloud control through actionable cloud security intelligence across cloud infrastructure. Take complete control of your cloud using our intelligent security automation. Total compliance assurance for security standards and regulations using our out-of-the-box-policies. Manage identity privilege across your cloud and avoid compromised credentials and insider threats. Gain enhanced visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.

About

A powerful yet lightweight security platform that provides insightful observability, proactive controls, threat detection and response for your Linux infrastructure in the cloud or datacenter. Your cloud infrastructure is a massive multi-user environment. Don’t protect it with security solutions originally built for endpoints. Think beyond logging and analytics solutions that lack the necessary context and workflows for true infrastructure security. Cmd’s infrastructure detection and response platform is optimized for the needs of today’s agile security teams. View system activity in real time or search through retained data, aided by rich filters and triggers. Leverage our eBPF sensors, contextual data model and intuitive workflows to gain insight into user activity, running processes and access to sensitive resources. No advanced degree in Linux administration required. Create guardrails and controls around sensitive actions to complement traditional access management.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes

Audience

IT departments and enterprises looking for a security platform that provides insightful observability, proactive controls, and threat detection

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

C3M
Founded: 2018
United States
c3m.io

Company Information

Cmd
Founded: 2016
Canada
cmd.com

Alternatives

Alternatives

Horangi Warden

Horangi Warden

Horangi Cyber Security
Fidelis Halo

Fidelis Halo

Fidelis Security

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Integrations

Chef
Cisco Duo
Emerge Cyber Security
Lyftrondata
Okta
PagerDuty
Puppet Enterprise
Slack
Thunder Compute
Yubico YubiKey
Zuar Runner

Integrations

Chef
Cisco Duo
Emerge Cyber Security
Lyftrondata
Okta
PagerDuty
Puppet Enterprise
Slack
Thunder Compute
Yubico YubiKey
Zuar Runner
Claim C3M Cloud Control and update features and information
Claim C3M Cloud Control and update features and information
Claim Cmd and update features and information
Claim Cmd and update features and information