+
+

Related Products

  • Wiz
    1,439 Ratings
    Visit Website
  • Orca Security
    522 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • phoenixNAP
    6 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • FuelCloud
    28 Ratings
    Visit Website

About

An API based cloud security posture management and compliance assurance platform that offers enterprises complete cloud control through actionable cloud security intelligence across cloud infrastructure. Take complete control of your cloud using our intelligent security automation. Total compliance assurance for security standards and regulations using our out-of-the-box-policies. Manage identity privilege across your cloud and avoid compromised credentials and insider threats. Gain enhanced visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.

About

Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes

Audience

Enterprise organizations and IT teams looking for a solution to manage policy and track users, devices, security state and access activity

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

C3M
Founded: 2018
United States
c3m.io

Company Information

Ivanti
Founded: 2014
United States
www.ivanti.com/products/connect-secure-vpn

Alternatives

Alternatives

Horangi Warden

Horangi Warden

Horangi Cyber Security
Forescout

Forescout

Forescout Technologies
Fidelis Halo

Fidelis Halo

Fidelis Security
UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Compliance Features

Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Integrations

A10 Defend DDoS Mitigator
AuthControl Sentry
Axonius
ConnectProtect Managed Detection and Response
ConverSense
GigaSECURE
Ivanti
Ivanti Neurons for Secure Access
Junos Traffic Vision
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM
SmartShare
SparkView
Spoom
ThreatAware
TrustBuilder

Integrations

A10 Defend DDoS Mitigator
AuthControl Sentry
Axonius
ConnectProtect Managed Detection and Response
ConverSense
GigaSECURE
Ivanti
Ivanti Neurons for Secure Access
Junos Traffic Vision
SecureIdentity DLP
SecureIdentity IAM
SecureIdentity IRAD
SecureIdentity MFA
SecureIdentity PAM
SmartShare
SparkView
Spoom
ThreatAware
TrustBuilder
Claim C3M Cloud Control and update features and information
Claim C3M Cloud Control and update features and information
Claim Ivanti Connect Secure and update features and information
Claim Ivanti Connect Secure and update features and information