Runecast

Runecast

Runecast Solutions
+
+

Related Products

  • Wiz
    1,101 Ratings
    Visit Website
  • phoenixNAP
    6 Ratings
    Visit Website
  • Orca Security
    493 Ratings
    Visit Website
  • Kasm Workspaces
    125 Ratings
    Visit Website
  • Google Compute Engine
    1,151 Ratings
    Visit Website
  • cside
    23 Ratings
    Visit Website
  • ConnectWise Automate
    508 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • Chainguard
    46 Ratings
    Visit Website
  • Carbide
    88 Ratings
    Visit Website

About

Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.

About

Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Proactive Best Practice & Security Analysis for AWS, Azure, Kubernetes, VMware & Windows & Linux OS.

Audience

Companies requiring a solution to detect and respond to cloud threats

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$8,000 per year
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Runecast Solutions
Founded: 2014
United Kingdom
www.runecast.com

Company Information

Stream Security
United States
www.stream.security/

Alternatives

Alternatives

Upwind

Upwind

Upwind Security
Sunbird DCIM

Sunbird DCIM

Sunbird Software Inc.
Aqua

Aqua

Aqua Security
Fidelis Halo

Fidelis Halo

Fidelis Security

Categories

Categories

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection Features

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Security Features

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Center Management Features

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

GDPR Compliance Features

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance Features

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Network Monitoring Features

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting

PCI Compliance Features

Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management

Server Virtualization Features

Audit Management
Health Monitoring
Live Machine Migration
Multi-OS Virtual Machines
Patching / Backup
Performance Log
Performance Optimization
Rapid Provisioning
Security Management
Type 1 / Type 2 Hypervisor

Virtualization Features

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Vulnerability Scanners Features

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Integrations

Amazon Web Services (AWS)
Aqua
CloudGuard AppSec
CrowdStrike Falcon
HPE Ezmeral
InsightCloudSec
Jira Align
Lacework
Okta
Orca Security
Qualys Container Security
ServiceNow
Slack
Sumo Logic
Sysdig Secure
Tenable One
Terraform
Uptycs
VMware vSphere
Wiz

Integrations

Amazon Web Services (AWS)
Aqua
CloudGuard AppSec
CrowdStrike Falcon
HPE Ezmeral
InsightCloudSec
Jira Align
Lacework
Okta
Orca Security
Qualys Container Security
ServiceNow
Slack
Sumo Logic
Sysdig Secure
Tenable One
Terraform
Uptycs
VMware vSphere
Wiz
Claim Runecast and update features and information
Claim Runecast and update features and information
Claim Stream Security and update features and information
Claim Stream Security and update features and information