Skip to main content
TrustRadius
Microsoft Defender for Cloud

Microsoft Defender for Cloud
Formerly Azure Security Center

Overview

What is Microsoft Defender for Cloud?

Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.

Read more
Recent Reviews

Defender for Cloud.

8 out of 10
September 20, 2023
Incentivized
Secure Cloud Applications, and we use it to protect Cloud Workloads. We also use it in a DLP capacity to protect cloud workspaces.
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Demos

Getting Started with Microsoft Defender for Cloud

YouTube
Return to navigation

Product Details

What is Microsoft Defender for Cloud?

Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.
  • Defender for Cloud secure score continually assesses security posture so as to enable users to track new security opportunities and precisely report on the progress of security efforts.
  • Defender for Cloud recommendations secures workloads with step-by-step actions that protect workloads from known security risks.
  • Defender for Cloud alerts defends workloads in real-time so users can react immediately and prevent security events from developing.

Microsoft Defender for Cloud Features

  • Supported: Reduces risk with contextual security posture management
  • Supported: Helps prevent, detect, and respond quickly to threats
  • Supported: Unifies security management for DevOps
  • Supported: Offers comprehensive cloud-native security in Microsoft Defender for Cloud with Defender for APIs security capabilities, now in public preview.

Microsoft Defender for Cloud Screenshots

Screenshot of Remediation of critical issues in codeScreenshot of Cloud security benchmark mapped to industry FramworksScreenshot of Prioritization of critical risks with contextual threat analysisScreenshot of Workload protectionScreenshot of Unified DevOps VisibilityScreenshot of Visualizations to improve security posture proactively

Microsoft Defender for Cloud Video

Microsoft Defender for Cloud - Secure multicloud and hybrid environments

Microsoft Defender for Cloud Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows
Mobile ApplicationNo

Frequently Asked Questions

Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.

Amazon Web Services, Google Cloud Platform, and Palo Alto Networks Prisma Cloud are common alternatives for Microsoft Defender for Cloud.

The most common users of Microsoft Defender for Cloud are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(64)

Reviews

(1-11 of 11)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Tracking of Events.
  • The suggestions are also vital. It pushes us to analyze why we are getting that advice, which is clearly important when creating a security policy.
  • It's preventive, and it keeps security front of mind for the staff.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Gamification of 'security score' actually works really well for us or team building, if you can believe that!
  • Hardening resources can be really easy.
  • Integration with our existing Microsoft products.
  • User interface, once you understand it, is easy to use.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Security alerts are my go-to in the mornings. Those are the most important for me and my team.
  • The inventory overview is also something I use heavily to monitor the activity of my team and ensure they are following internal policies and tends to be a leading indicator for cost overruns, etc.
  • The recommendations are also very important. Though we don't always follow them, it forces us to understand why we are getting that recommendation which is obviously a key factor in formulating security policies.
Score 8 out of 10
Vetted Review
Verified User
  • Multiple compliance standards and frameworks so we can demonstrate, for example, that our US-based virtual machines comply with US standards while EU virtual machines comply with EU standards
  • Compliance standards are kept up to date automatically without us needing to do that work and maintain the different versions of the standards
  • Intuitive user interface that can be easily navigated and understood by auditors and internal risk teams
  • Comprehensive information and metadata are provided for each finding to allow us to understand the problem, its impact as well as any recommended remediation steps we can take
  • Integrated vulnerability scanner powered by industry leader Qualys
Return to navigation