Runecast Description
Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance.
Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving.
Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies.
Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing.
Runecast  Alternatives
        Wiz
                
                Wiz is a new approach in cloud security. It finds the most important risks and infiltration vectors across all multi-cloud environments. All lateral movement risks, such as private keys that are used to access production and development environments, can be found. You can scan for vulnerabilities and unpatched software in your workloads. A complete inventory of all services and software within your cloud environments, including version and package details, is available. Cross-reference all keys on your workloads with their privileges in your cloud environment. Based on a complete analysis of your cloud network, including those behind multiple hops, you can see which resources are publicly available to the internet. Compare your industry best practices and baselines to assess the configuration of cloud infrastructure, Kubernetes and VM operating system.
                Learn more
            Kasm Workspaces
                
                Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location.
Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation.
Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
                Learn more
            phoenixNAP
                
                As a global IaaS solutions provider, phoenixNAP helps organizations of different sizes meet their IT performance, security, and scalability needs. Delivered from strategic edge locations in the U.S., Europe, Asia-Pacific, and Latin America,  phoenixNAP's solutions are globally available, enabling businesses reach their target locales. Its colocation, HaaS, private and hybrid cloud, backup, disaster recovery, and security services are available on an opex-friendly model, providing flexibility and cost-efficiency. Based on world-class technologies, they provide redundancy, security, and advanced connectivity. Companies of all verticals and sizes can leverage phoenixNAP infrastructure for their evolving IT requirements at any stage of growth. 
                Learn more
            Orca Security
                
                Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of risks across AWS, Azure, Google Cloud and Kubernetes. 
                Learn more
            Pricing
Free Trial:
            Yes
        Integrations
Company Details
Company:
            Runecast Solutions
        Year Founded:
                2014
            Headquarters:
            United Kingdom
        Website:
            
            
                www.runecast.com
            
        Recommended Products
    
                    
                    MongoDB Atlas runs apps anywhere
                    
                    
                
            
                            MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
                        
                    Product Details
Platforms
            
                            
 Web-Based
                        
                    
                        
                            
 Linux
                        
                    
                        
                            
 On-Premises
                        
                    
                
            Types of Training
            
 Training Docs 
                
                    
 Live Training (Online) 
                
                    
 Webinars 
                
                    
 Training Videos 
                
            Customer Support
            
 Business Hours 
                
                    
 Online Support 
                
            Runecast Features and Options
Vulnerability Scanners
                    
                    Asset Discovery
                
                
                
                    
                    Black Box Scanning
                
                
                
                    
                    Compliance Monitoring
                
                
                
                    
                    Continuous Monitoring
                
                
                
                    
                    Defect Tracking
                
                
                
                    
                    Interactive Scanning
                
                
                
                    
                    Logging and Reporting
                
                
                
                    
                    Network Mapping
                
                
                
                    
                    Perimeter Scanning
                
                
                
                    
                    Risk Analysis
                
                
                
                    
                    Threat Intelligence
                
                
                
                    
                    Web Inspection
                
            
            Server Virtualization Software
                    
                    Audit Management
                
                
                
                    
                    Health Monitoring
                
                
                
                    
                    Live Machine Migration
                
                
                
                    
                    Multi-OS Virtual Machines
                
                
                
                    
                    Patching / Backup
                
                
                
                    
                    Performance Log
                
                
                
                    
                    Performance Optimization
                
                
                
                    
                    Rapid Provisioning
                
                
                
                    
                    Security Management
                
                
                
                    
                    Type 1 / Type 2 Hypervisor
                
            
            HIPAA Compliance Software
                    
                    Access Control / Permissions
                
                
                
                    
                    Audit Management
                
                
                
                    
                    Compliance Reporting
                
                
                
                    
                    Data Security
                
                
                
                    
                    Documentation Management
                
                
                
                    
                    For Healthcare
                
                
                
                    
                    Incident Management
                
                
                
                    
                    Policy Training
                
                
                
                    
                    Remediation Management
                
                
                
                    
                    Risk Management
                
                
                
                    
                    Vendor Management
                
            
            Data Center Management Software
                    
                    Audit Trail
                
                
                
                    
                    Behavior-Based Acceleration
                
                
                
                    
                    Cross Reference System
                
                
                
                    
                    Device Auto Discovery
                
                
                
                    
                    Diagnostic Testing
                
                
                
                    
                    Import / Export Data
                
                
                
                    
                    JCL Management
                
                
                
                    
                    Multi-Platform
                
                
                
                    
                    Multi-User
                
                
                
                    
                    Power Management
                
                
                
                    
                    Sarbanes-Oxley Compliance
                
            
            PCI Compliance Software
                    
                    Access Control
                
                
                
                    
                    Compliance Reporting
                
                
                
                    
                    Exceptions Management
                
                
                
                    
                    File Integrity Monitoring
                
                
                
                    
                    Intrusion Detection System
                
                
                
                    
                    Log Management
                
                
                
                    
                    PCI Assessment
                
                
                
                    
                    Patch Management
                
                
                
                    
                    Policy Management
                
            
            Container Security Software
                    
                    Access Roles / Permissions
                
                
                
                    
                    Application Performance Tracking
                
                
                
                    
                    Centralized Policy Management
                
                
                
                    
                    Container Stack Scanning
                
                
                
                    
                    Image Vulnerability Detection
                
                
                
                    
                    Reporting
                
                
                
                    
                    Testing
                
                
                
                    
                    View Container Metadata
                
            
            Cloud Workload Protection Platform
                    
                    Anomaly Detection
                
                
                
                    
                    Asset Discovery
                
                
                
                    
                    Cloud Gap Analysis
                
                
                
                    
                    Cloud Registry
                
                
                
                    
                    Data Loss Prevention (DLP)
                
                
                
                    
                    Data Security
                
                
                
                    
                    Governance
                
                
                
                    
                    Logging & Reporting
                
                
                
                    
                    Machine Learning
                
                
                
                    
                    Security Audit
                
                
                
                    
                    Workload Diversity
                
            
            Virtualization Software
                    
                    Archiving & Retention
                
                
                
                    
                    Capacity Monitoring
                
                
                
                    
                    Data Mobility
                
                
                
                    
                    Desktop Virtualization 
                
                
                
                    
                    Disaster Recovery
                
                
                
                    
                    Namespace Management
                
                
                
                    
                    Performance Management
                
                
                
                    
                    Version Control
                
                
                
                    
                    Virtual Machine Monitoring
                
            
            Cloud Security Software
                    
                    Antivirus
                
                
                
                    
                    Application Security
                
                
                
                    
                    Behavioral Analytics
                
                
                
                    
                    Encryption
                
                
                
                    
                    Endpoint Management
                
                
                
                    
                    Incident Management
                
                
                
                    
                    Intrusion Detection System
                
                
                
                    
                    Threat Intelligence
                
                
                
                    
                    Two-Factor Authentication
                
                
                
                    
                    Vulnerability Management
                
            
            Network Monitoring Software
                    
                    Bandwidth Monitoring
                
                
                
                    
                    Baseline Manager
                
                
                
                    
                    Diagnostic Tools
                
                
                
                    
                    IP Address Monitoring
                
                
                
                    
                    Internet Usage Monitoring
                
                
                
                    
                    Real Time Analytics
                
                
                
                    
                    Resource Management
                
                
                
                    
                    SLA Monitoring
                
                
                
                    
                    Server Monitoring
                
                
                
                    
                    Uptime Monitoring
                
                
                
                    
                    Web Traffic Reporting
                
            
            GDPR Compliance Software
                    
                    Access Control
                
                
                
                    
                    Consent Management
                
                
                
                    
                    Data Mapping
                
                
                
                    
                    Incident Management
                
                
                
                    
                    PIA / DPIA
                
                
                
                    
                    Policy Management
                
                
                
                    
                    Risk Management
                
                
                
                    
                    Sensitive Data Identification
                
            
            Runecast Lists
Runecast User Reviews
Write a Review- Previous
- Next
 
     
     
     
    