Cohesity vs. Hornetsecurity 365 Total Protection

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cohesity
Score 8.5 out of 10
Mid-Size Companies (51-1,000 employees)
Cohesity is a leader in AI-powered data security and management. Cohesity protects the world’s most critical data workloads across on-prem, cloud-native, and SaaS with backup and recovery, threat intelligence, cyber vaulting, files and objects, and recovery orchestration.N/A
Hornetsecurity 365 Total Protection
Score 8.7 out of 10
N/A
With 365 Total Protection, Hornetsecurity offers users enterprise security management in conjunction with Microsoft Office 365. The Enterprise version gives users enhanced functionality and protection, and covers legally compliant email archiving with advanced features such as eDiscovery and 10-year email retention. It also offers protection against advanced persistent threats through the use of AI-based analysis mechanisms.N/A
Pricing
CohesityHornetsecurity 365 Total Protection
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
CohesityHornetsecurity 365 Total Protection
Free Trial
YesNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeOptional
Additional Details
More Pricing Information
Community Pulse
CohesityHornetsecurity 365 Total Protection
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
CohesityHornetsecurity 365 Total Protection
Data Center Backup
Comparison of Data Center Backup features of Product A and Product B
Cohesity
9.2
55 Ratings
8% above category average
Hornetsecurity 365 Total Protection
-
Ratings
Universal recovery8.050 Ratings00 Ratings
Instant recovery9.052 Ratings00 Ratings
Recovery verification8.948 Ratings00 Ratings
Business application protection8.948 Ratings00 Ratings
Multiple backup destinations8.951 Ratings00 Ratings
Incremental backup identification9.053 Ratings00 Ratings
Backup to the cloud9.542 Ratings00 Ratings
Deduplication and file compression8.954 Ratings00 Ratings
Snapshots9.551 Ratings00 Ratings
Flexible deployment9.452 Ratings00 Ratings
Management dashboard9.954 Ratings00 Ratings
Platform support9.555 Ratings00 Ratings
Retention options10.055 Ratings00 Ratings
Encryption9.051 Ratings00 Ratings
Enterprise Backup
Comparison of Enterprise Backup features of Product A and Product B
Cohesity
8.8
7 Ratings
8% above category average
Hornetsecurity 365 Total Protection
-
Ratings
Continuous data protection9.15 Ratings00 Ratings
Replication9.06 Ratings00 Ratings
Operational reporting and analytics8.47 Ratings00 Ratings
Malware protection8.77 Ratings00 Ratings
Multi-location capabilities9.06 Ratings00 Ratings
Ransomware Recovery8.84 Ratings00 Ratings
Best Alternatives
CohesityHornetsecurity 365 Total Protection
Small Businesses
Backblaze B2 Cloud Storage
Backblaze B2 Cloud Storage
Score 9.7 out of 10
Axcient x360Cloud
Axcient x360Cloud
Score 9.0 out of 10
Medium-sized Companies
Bacula Enterprise
Bacula Enterprise
Score 9.8 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.7 out of 10
Enterprises
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.7 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
CohesityHornetsecurity 365 Total Protection
Likelihood to Recommend
8.8
(65 ratings)
-
(0 ratings)
Likelihood to Renew
8.6
(3 ratings)
-
(0 ratings)
Usability
8.2
(5 ratings)
-
(0 ratings)
Support Rating
7.9
(27 ratings)
-
(0 ratings)
Professional Services
9.0
(1 ratings)
-
(0 ratings)
User Testimonials
CohesityHornetsecurity 365 Total Protection
Likelihood to Recommend
Cohesity
Cohesity has been awesome. The performance (speed) that it has been able to provide has actually given me back time every month. I have to test my backups monthly, and the Cloning process that Cohesity has available from it's backup has given me days back each month. It just a few minutes I can have VMs restored for testing and documentation. This took a couple days with the previous vendor.
Read full review
Hornetsecurity Inc.
No answers on this topic
Pros
Cohesity
  • Easy to use and setup new backup and restore jobs.
  • Extremely fast recovery time, can spin a VMware backup VM up in well under a minute.
  • Granular recovery search options, easy to find specific files or systems to recover (or SQL DB).
Read full review
Hornetsecurity Inc.
No answers on this topic
Cons
Cohesity
  • Reporting could always be better- executive-style reports have to be generated from data at multiple points.
  • Some tasks that could be brought to the UI that today we have to call support on (for example when an NFS mount is still active but we cannot see it from the UI)
Read full review
Hornetsecurity Inc.
No answers on this topic
Likelihood to Renew
Cohesity
We have been very pleased with this backup solution. It is fast and reliable, and supports our VMware infrastructure. The company's support has been great, including proactively replacing our nodes when the flash memory was reporting high wear. Support is offered on-shore as well. We plan on continuing to use this product for the foreseeable future.
Read full review
Hornetsecurity Inc.
No answers on this topic
Usability
Cohesity
Cohesity Helios is very easy to use and the web up is simple to navigate and the main dashboard presents a very good and clear overview summary of protection status, capacity and other vital metrics. If you have multiple clusters you can get a single pane view of overall status which is awesome.
Read full review
Hornetsecurity Inc.
No answers on this topic
Support Rating
Cohesity
Support is quick to respond but lacks that ongoing responsiveness if the issue is not simple. There will be large gaps in replies if they need to resort to escalation and when there are timezone differences between yourself and the person who picked up the ticket.
Read full review
Hornetsecurity Inc.
No answers on this topic
Alternatives Considered
Cohesity
We looked at Veeam and although it's a great product when we priced out the licensing of both primary and disaster datacenters it became much too expensive. Rubrik is a great product and very similar to Cohesity. In the end, Cohesity had a secondary storage play as well as a better UI and better compatibility with lower tier cloud storage. We also like the way Cohesity did protection jobs vs Rubrik's virtual machine centric backup. CommVault is a product we still use today due to its massive features and the ability for bare metal backups. Cohesity does a much better job in the area of UI simplicity, virtual backup ease, and ease of management.
Read full review
Hornetsecurity Inc.
No answers on this topic
Professional Services
Cohesity
Overall Cohesity professional services like the rest of Cohesity are brilliant. We had some poor advice around how to carve up our Netapp protection jobs which has set us back but it has been acknowledged that a mistake was made by Cohesity and they promise for future engagements with new customers the lessons learnt with us will be integrated into their planning workshop for NAS onboarding.
Read full review
Hornetsecurity Inc.
No answers on this topic
Return on Investment
Cohesity
  • Several hours a week of admin time no longer needed to deal with tapes.
  • Many hours a year saved in that the admin no longer has to deal with LTO drives, LTO drive firmware, tape libraries, tape library firmware, a physical server connected to tape library, etc. Retired old legacy NAS devices that in some instances no longer had firmware updates. One system to administer and maintain.
  • Piece of mind. We replicate from our onsite cluster to an offsite cluster in the event of a DR event at HQ.
Read full review
Hornetsecurity Inc.
No answers on this topic
ScreenShots

Cohesity Screenshots

Screenshot of Screenshot of Screenshot of Screenshot of Screenshot of Screenshot of

Hornetsecurity 365 Total Protection Screenshots

Screenshot of Email Live Tracking with user-defined settings offers users a complete overview of all Emails addressed to them. If an incoming Email has, for example, been classified as spam, you will receive comprehensive information and can individually determine any further interaction. This means that you can always quickly find any email you are searching for and delivery options can be defined for the future.Screenshot of With the help of Infomail Handlings, the inboxes or smartphones of your users will no longer be flooded with newsletters and ad mails. Users are no longer distracted by the constant arrival of unimportant emails, thus making it easier for them to keep track of relevant business matters.Screenshot of Content Control protects your email communication from receiving or sending unwanted or unauthorized file attachments in keeping with your company policy. When running Content Control, umbrella terms and categories (e.g., .docmacro or .executable) may be blocked, for example in the default group (mailboxes that are not allocated to any particular group). For a department such as Marketing, however, the receipt of media files and macros can, on the other hand, be necessary for daily business: In this respect, one can create, for example, a group for the Marketing department and adjust the settings in Content Control so that only potentially dangerous, e.g. executable, file formats are blocked for this group.Screenshot of If an incoming email (e.g. phishing or spam mail) constitutes a threat, the attack is immediately detected by the multi-stage filter systems of 365 Total Protection. Unwanted emails are directly rejected by the Threat Blocking function or detected in later analyses by Threat Intelligence and sent straight to Quarantine. In both cases, these emails will not be delivered to your mailbox.Screenshot of If you do not want to receive emails from one or several specific senders, you can put these on your personal Blacklist. With just one click directly in your in-box the selected senders can be added to the Blacklist to prevent emails from the same sender from being delivered to you in future. If an email from a generally unobjectionable sender lands in Quarantine by mistake, thus appearing in the spam report, the “Whitelist” function can be used. Emails from senders on your Whitelist will always be delivered to your in-box in future.Screenshot of Every email sent out by a company is not only relevant to the business, but is also your company’s business card. In terms of content, a company-wide standardized structure and the completeness of signature datasets are essential. In this context, all email signatures also have the same visual design and layout. This task can also be allocated to the Marketing department or office management via the “What You See is What You Get” editor.