Save to My Lists
Paid
Claimed
Optimized for quick response

Coro Cybersecurity Features

What are the features of Coro Cybersecurity?

Administration

  • Intelligence Reporting
  • Email Integration Suppor
  • Access Management
  • Data Loss Prevention
  • Data Discovery

Security

  • Anti-Malware/Anti-Spam
  • Encryption
  • Quarantine
  • Advanced Threat Protection (ATP)
  • Anti-Phishing
  • Account takeover prevention

Maintenance

  • Auditing
  • Allow and block lists
  • Compliance

Data Protection

  • Data Encryption/Security

Filter for Features

Data

Data Protection

As reported in 10 Coro Cybersecurity reviews. Enable users to protect their data from potential outside attacks.
92%
(Based on 10 reviews)

Remote Access

Allow users to control access to their information from a central point.

Not enough data

Network Access

Allow users to implement policies for controlling access to their business's infrastructure.

Not enough data

Network

Security

Secure access to your network for both guests and internal users 10 reviewers of Coro Cybersecurity have provided feedback on this feature.
83%
(Based on 10 reviews)

Scaling

Scale network visibility to whatever your businesss requires. This feature was mentioned in 11 Coro Cybersecurity reviews.
95%
(Based on 11 reviews)

Logistics

Blockage

Ability to block unwanted outside access. 10 reviewers of Coro Cybersecurity have provided feedback on this feature.
83%
(Based on 10 reviews)

Administration

Incident Logs

Based on 45 Coro Cybersecurity reviews. Information on each incident is stored in databases for user reference and analytics.
87%
(Based on 45 reviews)

Reporting

Based on 45 Coro Cybersecurity reviews. Produces reports detailing trends and vulnerabilities related to bot management and performance.
84%
(Based on 45 reviews)

Intelligence Reporting

Based on 108 Coro Cybersecurity reviews. Actively gathers data on suspicious sources and characteristics of potentially malicious content
91%
(Based on 108 reviews)

Email Integration Suppor

Supports secure implementation with popular email applications and clients. 117 reviewers of Coro Cybersecurity have provided feedback on this feature.
95%
(Based on 117 reviews)

Access Management

As reported in 107 Coro Cybersecurity reviews. Allows administrators to set user access privileges to permit approved parties to access sensitive data.
91%
(Based on 107 reviews)

Data Loss Prevention

Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. This feature was mentioned in 106 Coro Cybersecurity reviews.
93%
(Based on 106 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance. This feature was mentioned in 35 Coro Cybersecurity reviews.
92%
(Based on 35 reviews)

Auditing

Based on 34 Coro Cybersecurity reviews. Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
89%
(Based on 34 reviews)

Workflow Management

Creates new or streamlines existing workflows to better handle IT support tickets and service. This feature was mentioned in 30 Coro Cybersecurity reviews.
85%
(Based on 30 reviews)

Auditing

Documents access and alterations of the database for analytics and reporting. 74 reviewers of Coro Cybersecurity have provided feedback on this feature.
88%
(Based on 74 reviews)

Data Discovery

Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. 75 reviewers of Coro Cybersecurity have provided feedback on this feature.
90%
(Based on 75 reviews)

Access Control

Supports LDAP Protocol to enable access control and governance. This feature was mentioned in 70 Coro Cybersecurity reviews.
86%
(Based on 70 reviews)

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

Not enough data

Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data

Device Control

Manages user network accessibility on laptops and mobile devices.

Not enough data

Reporting and Monitoring

As reported in 48 Coro Cybersecurity reviews. Access pre-built and custom reports to monitor user activity and storage.
87%
(Based on 48 reviews)

Breadth of Partner Applications

Based on 18 Coro Cybersecurity reviews. To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
74%
(Based on 18 reviews)

Auditing

Based on 47 Coro Cybersecurity reviews. Documents access and alterations of the database for analytics and reporting.
84%
(Based on 47 reviews)

Security Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process. 55 reviewers of Coro Cybersecurity have provided feedback on this feature.
90%
(Based on 55 reviews)

Security Integration

Integrates additional security tools to automate security and incident response processes. This feature was mentioned in 57 Coro Cybersecurity reviews.
90%
(Based on 57 reviews)

Multicloud Visibility

Allows users to track and control activity across cloud services and providers. This feature was mentioned in 50 Coro Cybersecurity reviews.
91%
(Based on 50 reviews)

Governance

Access Control

As reported in 40 Coro Cybersecurity reviews. Supports LDAP Protocol to enable access control and governance.
86%
(Based on 40 reviews)

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 43 reviewers of Coro Cybersecurity have provided feedback on this feature.
93%
(Based on 43 reviews)

Data Visibility

Similifies data identification to increase visibility and management capabilities This feature was mentioned in 47 Coro Cybersecurity reviews.
91%
(Based on 47 reviews)

Security

Encryption

Protects data with within and as it leaves your secure or local network. This feature was mentioned in 20 Coro Cybersecurity reviews.
91%
(Based on 20 reviews)

Endpoint Intelligence

Based on 46 Coro Cybersecurity reviews. Analysis for users to examine threat intelligence data specific to their endpoint devices.
86%
(Based on 46 reviews)

Activity Monitoring

Documents the actions from endpoints within a network. Alerts users of incidents and abnormal activities and documents the access point. 46 reviewers of Coro Cybersecurity have provided feedback on this feature.
91%
(Based on 46 reviews)

Breach Detection

Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks. This feature was mentioned in 45 Coro Cybersecurity reviews.
89%
(Based on 45 reviews)

Anti-Malware/Anti-Spam

Based on 115 Coro Cybersecurity reviews. Prevents malware or spam in emails either through predictive or reactive anti-malware/anti-spam tools.
92%
(Based on 115 reviews)

Encryption

Encrypts the content of emails and their attachments. 79 reviewers of Coro Cybersecurity have provided feedback on this feature.
87%
(Based on 79 reviews)

Quarantine

As reported in 111 Coro Cybersecurity reviews. Isolates potentially malicious content and files before they can gain network access
91%
(Based on 111 reviews)

Advanced Threat Protection (ATP)

Includes advanced tools, including machine learning analysis to detect threats often missed by traditional filtering tools, such as unsafe attachments, advanced malware, and targetted social engineering attacks. This feature was mentioned in 111 Coro Cybersecurity reviews.
91%
(Based on 111 reviews)

Anti-Phishing

Based on 118 Coro Cybersecurity reviews. Prevents both phishing attacks and spear-fishing attacks, including impersonation attacks.
94%
(Based on 118 reviews)

Account takeover prevention

Has pre-built data loss prevention (DLP) functions which prevent employees or accounts that have been hacked from sending out sensitive information. This feature was mentioned in 105 Coro Cybersecurity reviews.
90%
(Based on 105 reviews)

Compliance Monitoring

As reported in 36 Coro Cybersecurity reviews. Monitors data quality and sends alerts based on violations or misuse.
95%
(Based on 36 reviews)

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 35 Coro Cybersecurity reviews.
92%
(Based on 35 reviews)

Data Loss Prevention

Based on 33 Coro Cybersecurity reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
92%
(Based on 33 reviews)

Cloud Gap Analytics

Based on 30 Coro Cybersecurity reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
85%
(Based on 30 reviews)

Anomoly Detection

As reported in 47 Coro Cybersecurity reviews. Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
88%
(Based on 47 reviews)

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. This feature was mentioned in 46 Coro Cybersecurity reviews.
87%
(Based on 46 reviews)

Policy Enforcement

Allows administrators to set policies for security and data governance. 47 reviewers of Coro Cybersecurity have provided feedback on this feature.
87%
(Based on 47 reviews)

Compliance Monitoring

As reported in 56 Coro Cybersecurity reviews. Monitors data quality and send alerts based on violations or misuse.
92%
(Based on 56 reviews)

Risk AnalysisView full feature definition

See feature definition
As reported in 51 Coro Cybersecurity reviews. Identifies potential network security risks, vulnerabilities, and compliance impacts.
89%
(Based on 51 reviews)

Reporting

Based on 58 Coro Cybersecurity reviews. Creates reports outlining log activity and relevant metrics.
87%
(Based on 58 reviews)

Maintenance

Auditing

Access pre-built and custom reports to monitor user activity and storage. 105 reviewers of Coro Cybersecurity have provided feedback on this feature.
90%
(Based on 105 reviews)

Allow and block lists

As reported in 113 Coro Cybersecurity reviews. Prevents previous committers of fraud and other suspicious accounts from future communications
92%
(Based on 113 reviews)

Compliance

As reported in 111 Coro Cybersecurity reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
93%
(Based on 111 reviews)

Compliance

Governance

Based on 34 Coro Cybersecurity reviews. Allows users to create, edit, and relinquish user access privileges.
90%
(Based on 34 reviews)

Data Governance

Based on 34 Coro Cybersecurity reviews. Ensures user access management, data lineage, and data encryption.
93%
(Based on 34 reviews)

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 36 Coro Cybersecurity reviews.
95%
(Based on 36 reviews)

Data Protection

Data Encryption/Security

Based on 75 Coro Cybersecurity reviews. Manages policies for user data access and data encryption.
90%
(Based on 75 reviews)

Data loss Prevention

As reported in 72 Coro Cybersecurity reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
90%
(Based on 72 reviews)

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. 75 reviewers of Coro Cybersecurity have provided feedback on this feature.
89%
(Based on 75 reviews)

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 71 Coro Cybersecurity reviews.
93%
(Based on 71 reviews)

Analysis

Cloud Gap Analytics

As reported in 63 Coro Cybersecurity reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
84%
(Based on 63 reviews)

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse. This feature was mentioned in 69 Coro Cybersecurity reviews.
92%
(Based on 69 reviews)

User Analytics

Based on 70 Coro Cybersecurity reviews. Allows for reporting and documentation of individual user behavior and privileges.
85%
(Based on 70 reviews)

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Behavioral Analysis

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Malware Evaluation

Tools to test an object to see whether or not it qualifies as malware. This feature was mentioned in 53 Coro Cybersecurity reviews.
93%
(Based on 53 reviews)

Sandboxing

Based on 41 Coro Cybersecurity reviews. Provides a resource-isolated environment to examine malware and evaluate objects against a database of known threats.
86%
(Based on 41 reviews)

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur. 47 reviewers of Coro Cybersecurity have provided feedback on this feature.
94%
(Based on 47 reviews)

File Analysis

Analyze file contents to identify malware components or unknown and advanced threats. This feature was mentioned in 47 Coro Cybersecurity reviews.
94%
(Based on 47 reviews)

Functionality

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Silent Deploy

Based on 16 Coro Cybersecurity reviews. Silently deploys on endpoints without alerting users.
95%
(Based on 16 reviews)

Detect Data Movement

As reported in 18 Coro Cybersecurity reviews. Detects data movement to external USBs or external drives or uploaded to cloud storage or emails and excessive printer-usage.
94%
(Based on 18 reviews)

File and Application Activity

Based on 17 Coro Cybersecurity reviews. Tracks activities taken on files or in applications, including save, print, or delete actions.
90%
(Based on 17 reviews)

Trigger Alerts

Based on 17 Coro Cybersecurity reviews. Sends alerts to administrators when users take insider threat actions .
97%
(Based on 17 reviews)

Searchable Evidence

Based on 16 Coro Cybersecurity reviews. Maintains active and historical evidence in a searchable format.
89%
(Based on 16 reviews)

Risk Scoring

Provides risk scoring for suspicious activity. This feature was mentioned in 16 Coro Cybersecurity reviews.
85%
(Based on 16 reviews)

Access Control

User, Role, and Access Management

Based on 45 Coro Cybersecurity reviews. Allows administrators to provision access based on the individual user and their role.
84%
(Based on 45 reviews)

Access Rights

Defines which users have access to the different modules of the software and how. This feature was mentioned in 44 Coro Cybersecurity reviews.
81%
(Based on 44 reviews)

User Analytics

As reported in 42 Coro Cybersecurity reviews. Allows for reporting and documentation of individual user behavior and privileges.
81%
(Based on 42 reviews)

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse. 45 reviewers of Coro Cybersecurity have provided feedback on this feature.
88%
(Based on 45 reviews)

Activity Monitoring

Usage Monitoring

Tracks infrastructure resource needs and alerts administrators or automatically scales usage to minimize waste. This feature was mentioned in 52 Coro Cybersecurity reviews.
84%
(Based on 52 reviews)

Activity Monitoring

Actively monitors status of work stations either on-premise or remote. This feature was mentioned in 53 Coro Cybersecurity reviews.
91%
(Based on 53 reviews)

Detection

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences. 54 reviewers of Coro Cybersecurity have provided feedback on this feature.
96%
(Based on 54 reviews)

Compliance Monitoring

As reported in 49 Coro Cybersecurity reviews. Monitors data quality and send alerts based on violations or misuse.
94%
(Based on 49 reviews)

Threat Alerting

As reported in 52 Coro Cybersecurity reviews. Identifies and alerts administrators of threats, issues, incidents and requests related to SaaS applications.
98%
(Based on 52 reviews)

Response

Response Automation

As reported in 52 Coro Cybersecurity reviews. Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
96%
(Based on 52 reviews)

Malware Removal

Facilitates the remediation of network, endpoint, and application malware malware. 51 reviewers of Coro Cybersecurity have provided feedback on this feature.
94%
(Based on 51 reviews)

Data Protection

Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users. 49 reviewers of Coro Cybersecurity have provided feedback on this feature.
95%
(Based on 49 reviews)

Monitoring

Sentiment Analysis

Analyzes user writing patterns to determine sentiment changes to identify disgruntled workers. 15 reviewers of Coro Cybersecurity have provided feedback on this feature.
82%
(Based on 15 reviews)