TrustRadius: an HG Insights company

Wiz

Score8.6 out of 10

34 Reviews and Ratings

Features

Top Performing Features

  • Compliance and Auditing

    Supports compliance with industry regulations and standards, and offers audit logs and reports to meet regulatory requirements and facilitate security audits.

    Category average: 8.3

  • Regular Vulnerability Management

    Conducts regular vulnerability assessments and scans to identify and remediate security vulnerabilities within the cloud infrastructure.

    Category average: 8.1

  • Automated Data Backup and Recovery

    Provides automated and regular backups of cloud data to ensure data availability and offers mechanisms for data recovery in case of data loss or disaster.

    Category average: 8

  • Identity and Access Management

    Offers centralized management of user identities, roles, and permissions to streamline access control and enforce least privilege principles.

    Category average: 7.8

Cloud Computing Security Features

Cloud Computing Security offers safety and privacy features through their features and tools.

  • Automated Data Backup and Recovery

    Provides automated and regular backups of cloud data to ensure data availability and offers mechanisms for data recovery in case of data loss or disaster.

    Category average: 8

  • Intrusion Detection and Prevention:

    Implements systems and technologies to detect and prevent unauthorized access or intrusions into cloud resources or networks.

    Category average: 7.6

  • Regular Vulnerability Management

    Conducts regular vulnerability assessments and scans to identify and remediate security vulnerabilities within the cloud infrastructure.

    Category average: 8.1

  • Identity and Access Management

    Offers centralized management of user identities, roles, and permissions to streamline access control and enforce least privilege principles.

    Category average: 7.8

  • Secure Data Transfer

    Provides secure methods for transferring data to and from the cloud, such as encrypted protocols or virtual private networks (VPNs).

    Category average: 8

  • Security Incident Response

    Establishes protocols and procedures for promptly responding to security incidents, mitigating their impact, and conducting forensic investigations.

    Category average: 7.4

  • Compliance and Auditing

    Supports compliance with industry regulations and standards, and offers audit logs and reports to meet regulatory requirements and facilitate security audits.

    Category average: 8.3