getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software - Page 9

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


229 software options

Elastio Cyber Recovery logo

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
Satori logo

Set your data free

learn more
Satori enables secure self-service access to data, accelerating value from data. This is done while meeting data security and compliance requirements in a simple way.

Read more about Satori

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure cloud and virtual desktop deployments on employee devices with Secure Remote Worker. Enforce stringent security & contextual access policies to ensure that the only devices accessing your cloud/virtual desktops are secured using ThinScale, while simultaneously blocking unsecured devices.

Read more about Secure Remote Worker

Users also considered
Patr logo

Deploy your Application in 60 seconds

learn more
Patr is a user-friendly cloud platform that simplifies the deployment process for various applications, providing flexible deployment options, comprehensive features, and predictable pricing.

Read more about Patr

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps provides a wide variety of solutions that are created to match the specific demands of our clients since we recognize the significance of security and compliance in the modern digital environment.

Read more about MeghOps

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
FortiCASB logo

Enhanced Cloud Security

learn more
Fortinet's CASB (Cloud Access Security Broker) solution equips enterprises with robust cloud security capabilities. With advanced threat detection and data loss prevention features, Fortinet CASB ensures comprehensive protection for cloud applications and data. Unleash the power of Fortinet CASB to safeguard your organization's cloud environment and minimize security risks.

Read more about FortiCASB

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Elastio Cyber Recovery logo

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
Satori logo

Set your data free

learn more
Satori enables secure self-service access to data, accelerating value from data. This is done while meeting data security and compliance requirements in a simple way.

Read more about Satori

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
Securely manage Wireless WANs with NetCloud Manager: zero trust, AI insights, SD-WAN, and zero-touch deployment.

Read more about Ericsson NetCloud Manager

Users also considered
Patr logo

Deploy your Application in 60 seconds

learn more
Patr is a user-friendly cloud platform that simplifies the deployment process for various applications, providing flexible deployment options, comprehensive features, and predictable pricing.

Read more about Patr

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Controllo logo

AI-enabled governance, risk & compliance solution

learn more
AI GRC tool that can automate compliance for Cloud Security, Cyber Security, Privacy and AI Security.

Read more about Controllo

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Savvii logo

A platform for the management of cloud servers and services

learn more
Cloud services can be purchased on the IPS platform. Users can choose from hosting websites, business emails, domain registration, and managed or self-managed cloud servers. All purchased services can be managed in one dashboard, which can be further expanded.

Read more about Savvii

Users also considered
Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered