Coro Cybersecurity Features
What are the features of Coro Cybersecurity?
Administration
- Intelligence Reporting
- Email Integration Suppor
- Access Management
- Data Loss Prevention
- Data Discovery
Security
- Anti-Malware/Anti-Spam
- Encryption
- Quarantine
- Advanced Threat Protection (ATP)
- Anti-Phishing
- Account takeover prevention
Maintenance
- Auditing
- Allow and block lists
- Compliance
Data Protection
- Data Encryption/Security
Coro Cybersecurity Categories on G2
Filter for Features
Data
Data Protection | As reported in 10 Coro Cybersecurity reviews. Enable users to protect their data from potential outside attacks. | 92% (Based on 10 reviews) | |
Remote Access | Allow users to control access to their information from a central point. | Not enough data | |
Network Access | Allow users to implement policies for controlling access to their business's infrastructure. | Not enough data |
Network
Security | Secure access to your network for both guests and internal users 10 reviewers of Coro Cybersecurity have provided feedback on this feature. | 83% (Based on 10 reviews) | |
Scaling | Scale network visibility to whatever your businesss requires. This feature was mentioned in 11 Coro Cybersecurity reviews. | 95% (Based on 11 reviews) |
Logistics
Blockage | Ability to block unwanted outside access. 10 reviewers of Coro Cybersecurity have provided feedback on this feature. | 83% (Based on 10 reviews) |
Administration
Incident Logs | Based on 45 Coro Cybersecurity reviews. Information on each incident is stored in databases for user reference and analytics. | 87% (Based on 45 reviews) | |
Reporting | Based on 45 Coro Cybersecurity reviews. Produces reports detailing trends and vulnerabilities related to bot management and performance. | 84% (Based on 45 reviews) | |
Intelligence Reporting | Based on 108 Coro Cybersecurity reviews. Actively gathers data on suspicious sources and characteristics of potentially malicious content | 91% (Based on 108 reviews) | |
Email Integration Suppor | Supports secure implementation with popular email applications and clients. 117 reviewers of Coro Cybersecurity have provided feedback on this feature. | 95% (Based on 117 reviews) | |
Access Management | As reported in 107 Coro Cybersecurity reviews. Allows administrators to set user access privileges to permit approved parties to access sensitive data. | 91% (Based on 107 reviews) | |
Data Loss Prevention | Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. This feature was mentioned in 106 Coro Cybersecurity reviews. | 93% (Based on 106 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance. This feature was mentioned in 35 Coro Cybersecurity reviews. | 92% (Based on 35 reviews) | |
Auditing | Based on 34 Coro Cybersecurity reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices. | 89% (Based on 34 reviews) | |
Workflow Management | Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 30 Coro Cybersecurity reviews. | 85% (Based on 30 reviews) | |
Auditing | Documents access and alterations of the database for analytics and reporting. 74 reviewers of Coro Cybersecurity have provided feedback on this feature. | 88% (Based on 74 reviews) | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. 75 reviewers of Coro Cybersecurity have provided feedback on this feature. | 90% (Based on 75 reviews) | |
Access Control | Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 70 Coro Cybersecurity reviews. | 86% (Based on 70 reviews) | |
Compliance | Monitors assets and enforces security policies to audit assets and infrastructure security. | Not enough data | |
Web Control | Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | Not enough data | |
Application Control | Blocks endpoint users from accessing restricted applications. | Not enough data | |
Asset Management | Keeps records of each network asset and its activity. Discovers new assets accessing the network. | Not enough data | |
Device Control | Manages user network accessibility on laptops and mobile devices. | Not enough data | |
Reporting and Monitoring | As reported in 48 Coro Cybersecurity reviews. Access pre-built and custom reports to monitor user activity and storage. | 87% (Based on 48 reviews) | |
Breadth of Partner Applications | Based on 18 Coro Cybersecurity reviews. To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product. | 74% (Based on 18 reviews) | |
Auditing | Based on 47 Coro Cybersecurity reviews. Documents access and alterations of the database for analytics and reporting. | 84% (Based on 47 reviews) | |
Security Automation | Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 55 reviewers of Coro Cybersecurity have provided feedback on this feature. | 90% (Based on 55 reviews) | |
Security Integration | Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 57 Coro Cybersecurity reviews. | 90% (Based on 57 reviews) | |
Multicloud Visibility | Allows users to track and control activity across cloud services and providers. This feature was mentioned in 50 Coro Cybersecurity reviews. | 91% (Based on 50 reviews) |
Governance
Access Control | As reported in 40 Coro Cybersecurity reviews. Supports LDAP Protocol to enable access control and governance. | 86% (Based on 40 reviews) | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 43 reviewers of Coro Cybersecurity have provided feedback on this feature. | 93% (Based on 43 reviews) | |
Data Visibility | Similifies data identification to increase visibility and management capabilities This feature was mentioned in 47 Coro Cybersecurity reviews. | 91% (Based on 47 reviews) |
Security
Encryption | Protects data with within and as it leaves your secure or local network. This feature was mentioned in 20 Coro Cybersecurity reviews. | 91% (Based on 20 reviews) | |
Endpoint Intelligence | Based on 46 Coro Cybersecurity reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices. | 86% (Based on 46 reviews) | |
Activity Monitoring | Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. 46 reviewers of Coro Cybersecurity have provided feedback on this feature. | 91% (Based on 46 reviews) | |
Breach Detection | Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. This feature was mentioned in 45 Coro Cybersecurity reviews. | 89% (Based on 45 reviews) | |
Anti-Malware/Anti-Spam | Based on 115 Coro Cybersecurity reviews. Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools. | 92% (Based on 115 reviews) | |
Encryption | Encrypts the content of emails and their attachments. 79 reviewers of Coro Cybersecurity have provided feedback on this feature. | 87% (Based on 79 reviews) | |
Quarantine | As reported in 111 Coro Cybersecurity reviews. Isolates potentially malicious content and files before they can gain network access | 91% (Based on 111 reviews) | |
Advanced Threat Protection (ATP) | Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks. This feature was mentioned in 111 Coro Cybersecurity reviews. | 91% (Based on 111 reviews) | |
Anti-Phishing | Based on 118 Coro Cybersecurity reviews. Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks. | 94% (Based on 118 reviews) | |
Account takeover prevention | Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. This feature was mentioned in 105 Coro Cybersecurity reviews. | 90% (Based on 105 reviews) | |
Compliance Monitoring | As reported in 36 Coro Cybersecurity reviews. Monitors data quality and sends alerts based on violations or misuse. | 95% (Based on 36 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 35 Coro Cybersecurity reviews. | 92% (Based on 35 reviews) | |
Data Loss Prevention | Based on 33 Coro Cybersecurity reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 92% (Based on 33 reviews) | |
Cloud Gap Analytics | Based on 30 Coro Cybersecurity reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 85% (Based on 30 reviews) | |
Anomoly Detection | As reported in 47 Coro Cybersecurity reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | 88% (Based on 47 reviews) | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. This feature was mentioned in 46 Coro Cybersecurity reviews. | 87% (Based on 46 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance. 47 reviewers of Coro Cybersecurity have provided feedback on this feature. | 87% (Based on 47 reviews) | |
Compliance Monitoring | As reported in 56 Coro Cybersecurity reviews. Monitors data quality and send alerts based on violations or misuse. | 92% (Based on 56 reviews) | |
Risk Analysis | See feature definition | As reported in 51 Coro Cybersecurity reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts. | 89% (Based on 51 reviews) |
Reporting | Based on 58 Coro Cybersecurity reviews. Creates reports outlining log activity and relevant metrics. | 87% (Based on 58 reviews) |
Maintenance
Auditing | Access pre-built and custom reports to monitor user activity and storage. 105 reviewers of Coro Cybersecurity have provided feedback on this feature. | 90% (Based on 105 reviews) | |
Allow and block lists | As reported in 113 Coro Cybersecurity reviews. Prevents previous committers of fraud and other suspicious accounts from future communications | 92% (Based on 113 reviews) | |
Compliance | As reported in 111 Coro Cybersecurity reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 93% (Based on 111 reviews) |
Compliance
Governance | Based on 34 Coro Cybersecurity reviews. Allows users to create, edit, and relinquish user access privileges. | 90% (Based on 34 reviews) | |
Data Governance | Based on 34 Coro Cybersecurity reviews. Ensures user access management, data lineage, and data encryption. | 93% (Based on 34 reviews) | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 36 Coro Cybersecurity reviews. | 95% (Based on 36 reviews) |
Data Protection
Data Encryption/Security | Based on 75 Coro Cybersecurity reviews. Manages policies for user data access and data encryption. | 90% (Based on 75 reviews) | |
Data loss Prevention | As reported in 72 Coro Cybersecurity reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | 90% (Based on 72 reviews) | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 75 reviewers of Coro Cybersecurity have provided feedback on this feature. | 89% (Based on 75 reviews) | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 71 Coro Cybersecurity reviews. | 93% (Based on 71 reviews) |
Analysis
Cloud Gap Analytics | As reported in 63 Coro Cybersecurity reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | 84% (Based on 63 reviews) | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 69 Coro Cybersecurity reviews. | 92% (Based on 69 reviews) | |
User Analytics | Based on 70 Coro Cybersecurity reviews. Allows for reporting and documentation of individual user behavior and privileges. | 85% (Based on 70 reviews) | |
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data | |
Malware Evaluation | Tools to test an object to see whether or not it qualifies as malware. This feature was mentioned in 53 Coro Cybersecurity reviews. | 93% (Based on 53 reviews) | |
Sandboxing | Based on 41 Coro Cybersecurity reviews. Provides a resource-isolated environment to examine malware and evaluate objects against a database of known threats. | 86% (Based on 41 reviews) | |
Threat Intelligence | Stores information related to common threats and how to resolve them once incidents occur. 47 reviewers of Coro Cybersecurity have provided feedback on this feature. | 94% (Based on 47 reviews) | |
File Analysis | Analyze file contents to identify malware components or unknown and advanced threats. This feature was mentioned in 47 Coro Cybersecurity reviews. | 94% (Based on 47 reviews) |
Functionality
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Firewall | Protects endpoint devices from a variety of attacks and malware threats. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data | |
Silent Deploy | Based on 16 Coro Cybersecurity reviews. Silently deploys on endpoints without alerting users. | 95% (Based on 16 reviews) | |
Detect Data Movement | As reported in 18 Coro Cybersecurity reviews. Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage. | 94% (Based on 18 reviews) | |
File and Application Activity | Based on 17 Coro Cybersecurity reviews. Tracks activities taken on files or in applications, including save, print, or delete actions. | 90% (Based on 17 reviews) | |
Trigger Alerts | Based on 17 Coro Cybersecurity reviews. Sends alerts to administrators when users take insider threat actions . | 97% (Based on 17 reviews) | |
Searchable Evidence | Based on 16 Coro Cybersecurity reviews. Maintains active and historical evidence in a searchable format. | 89% (Based on 16 reviews) | |
Risk Scoring | Provides risk scoring for suspicious activity. This feature was mentioned in 16 Coro Cybersecurity reviews. | 85% (Based on 16 reviews) |
Access Control
User, Role, and Access Management | Based on 45 Coro Cybersecurity reviews. Allows administrators to provision access based on the individual user and their role. | 84% (Based on 45 reviews) | |
Access Rights | Defines which users have access to the different modules of the software and how. This feature was mentioned in 44 Coro Cybersecurity reviews. | 81% (Based on 44 reviews) | |
User Analytics | As reported in 42 Coro Cybersecurity reviews. Allows for reporting and documentation of individual user behavior and privileges. | 81% (Based on 42 reviews) | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. 45 reviewers of Coro Cybersecurity have provided feedback on this feature. | 88% (Based on 45 reviews) |
Activity Monitoring
Usage Monitoring | Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste. This feature was mentioned in 52 Coro Cybersecurity reviews. | 84% (Based on 52 reviews) | |
Activity Monitoring | Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 53 Coro Cybersecurity reviews. | 91% (Based on 53 reviews) |
Detection
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. 54 reviewers of Coro Cybersecurity have provided feedback on this feature. | 96% (Based on 54 reviews) | |
Compliance Monitoring | As reported in 49 Coro Cybersecurity reviews. Monitors data quality and send alerts based on violations or misuse. | 94% (Based on 49 reviews) | |
Threat Alerting | As reported in 52 Coro Cybersecurity reviews. Identifies and alerts administrators of threats, issues, incidents and requests related to SaaS applications. | 98% (Based on 52 reviews) |
Response
Response Automation | As reported in 52 Coro Cybersecurity reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | 96% (Based on 52 reviews) | |
Malware Removal | Facilitates the remediation of network, endpoint, and application malware malware. 51 reviewers of Coro Cybersecurity have provided feedback on this feature. | 94% (Based on 51 reviews) | |
Data Protection | Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. 49 reviewers of Coro Cybersecurity have provided feedback on this feature. | 95% (Based on 49 reviews) |
Monitoring
Sentiment Analysis | Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers. 15 reviewers of Coro Cybersecurity have provided feedback on this feature. | 82% (Based on 15 reviews) |