View which TrendAI Vision One™ apps and features are supported for each cloud provider.
The following table shows which downstream apps and features are available after connecting
each cloud provider. Feature availability depends on the cloud provider's capabilities
and the resources deployed during account connection.
Supported TrendAI Vision One™ apps by cloud provider
|
TrendAI Vision One™ feature
|
Feature description
|
AWS
|
Azure
|
Google Cloud
|
Alibaba Cloud
|
Oracle Cloud Infrastructure
|
|
Core Features
|
Discover your cloud assets and rapidly identify risks such as compliance and security
best practice violations on your cloud infrastructure.
|
|
|
|
|
|
|
Cyber Risk Exposure Management - Cloud account assessment
|
Discover and assess your cloud assets for attack exposure, risk factors, and security
posture. This feature requires credits, which are calculated based on asset count
after onboarding the cloud account.
|
|
|
|
|
|
|
Server & Workload Protection
|
Deploy and manage security agents on cloud workloads for comprehensive protection.
|
|
|
|
|
|
|
Agentless Vulnerability & Threat Detection
|
Scan virtual machines, disks, and container images for vulnerabilities and malware
without installing agents.
|
|
|
|
|
|
|
Real-Time Posture Monitoring
|
Continuously monitor cloud resources for security misconfigurations and compliance
violations in real time.
|
|
|
|
||
|
Data Security Posture
|
Identify, assess, and mitigate data risks across cloud and on-premise environments.
|
|
|
|
||
|
Container Protection for Amazon ECS
|
Protect containerized applications running on Amazon Elastic Container Service.
|
|
||||
|
File Security Storage
|
Scan files stored in cloud storage services for malware and security threats.
|
|
|
|
||
|
AI Application Security
|
Protect AI applications from security threats and vulnerabilities.
|
|
||||
|
Cloud Response for AWS
|
Automate response actions to security threats detected in AWS environments.
|
|
||||
|
Cloud Detections for AWS CloudTrail
|
Analyze AWS CloudTrail logs to detect suspicious activities and security threats.
|
|
||||
|
Cloud Detections for AWS VPC Flow Logs
|
Monitor network traffic in AWS VPCs to identify suspicious connections and threats.
|
|
||||
|
Cloud Detections for Amazon Security Lake
|
Analyze security data from Amazon Security Lake to detect threats across AWS services.
|
|
||||
|
Cloud Detections for Azure Activity Logs
|
Analyze Azure Activity Logs to detect suspicious activities and security threats.
|
|
||||
|
Cloud Detections for Azure VNet Flow Logs
|
Monitor network traffic in Azure VNets to identify suspicious connections and threats.
|
|
||||
|
Microsoft Defender for Endpoint Log Collection
|
Collect and analyze Microsoft Defender for Endpoint logs for threat detection and
response.
|
|
For detailed information about each feature and its requirements, see the features
and permissions topic for your cloud provider:
