Views:

View which TrendAI Vision One™ apps and features are supported for each cloud provider.

The following table shows which downstream apps and features are available after connecting each cloud provider. Feature availability depends on the cloud provider's capabilities and the resources deployed during account connection.

Supported TrendAI Vision One™ apps by cloud provider

TrendAI Vision One™ feature
Feature description
AWS
Azure
Google Cloud
Alibaba Cloud
Oracle Cloud Infrastructure
Core Features
Discover your cloud assets and rapidly identify risks such as compliance and security best practice violations on your cloud infrastructure.
Cyber Risk Exposure Management - Cloud account assessment
Discover and assess your cloud assets for attack exposure, risk factors, and security posture. This feature requires credits, which are calculated based on asset count after onboarding the cloud account.
Server & Workload Protection
Deploy and manage security agents on cloud workloads for comprehensive protection.
Agentless Vulnerability & Threat Detection
Scan virtual machines, disks, and container images for vulnerabilities and malware without installing agents.
Real-Time Posture Monitoring
Continuously monitor cloud resources for security misconfigurations and compliance violations in real time.
 
Data Security Posture
Identify, assess, and mitigate data risks across cloud and on-premise environments.
Container Protection for Amazon ECS
Protect containerized applications running on Amazon Elastic Container Service.
File Security Storage
Scan files stored in cloud storage services for malware and security threats.
AI Application Security
Protect AI applications from security threats and vulnerabilities.
Cloud Response for AWS
Automate response actions to security threats detected in AWS environments.
Cloud Detections for AWS CloudTrail
Analyze AWS CloudTrail logs to detect suspicious activities and security threats.
Cloud Detections for AWS VPC Flow Logs
Monitor network traffic in AWS VPCs to identify suspicious connections and threats.
Cloud Detections for Amazon Security Lake
Analyze security data from Amazon Security Lake to detect threats across AWS services.
Cloud Detections for Azure Activity Logs
Analyze Azure Activity Logs to detect suspicious activities and security threats.
Cloud Detections for Azure VNet Flow Logs
Monitor network traffic in Azure VNets to identify suspicious connections and threats.
Microsoft Defender for Endpoint Log Collection
Collect and analyze Microsoft Defender for Endpoint logs for threat detection and response.
For detailed information about each feature and its requirements, see the features and permissions topic for your cloud provider: