getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


64 software options

Aikido Security logo

Unified cybersecurity software

visit website
Detect cloud infrastructure risks across major cloud providers. Secure your containers and virtual machines. Scans pre-deployment with Infrastructure as Code scans.

Read more about Aikido Security

Users also considered
ManageEngine Log360 Cloud logo

Cloud SIEM solution for a secure IT infrastructure

visit website
ManageEngine Log360 Cloud is a unified cloud SIEM solution with integrated CASB capabilities that helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve issues.

Read more about ManageEngine Log360 Cloud

Users also considered
Privacera logo

Cloud data access governance and compliance platform

learn more
Privacera is the cloud-based platform that helps businesses streamline data security governance processes.

Read more about Privacera

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Satori logo

Set your data free

learn more
Satori enables secure self-service access to data, accelerating value from data. This is done while meeting data security and compliance requirements in a simple way.

Read more about Satori

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Hackuity logo

Risk-Based Vulnerability Management Cockpit

learn more
Hackuity is a comprehensive security solution that orchestrates and automates the vulnerability management process.

Read more about Hackuity

Users also considered
Blumira logo

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

learn more
ADManager Plus is a simple, easy-to-use Windows Active Directory Management and Reporting Solution that helps AD Administrators and Help Desk Technicians.

Read more about ManageEngine ADManager Plus

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
JumpCloud is an open directory platform for secure, frictionless access from any device to any resource, anywhere.

Read more about JumpCloud Directory Platform

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
ThreatWatch logo

Cloud-based cybersecurity and threat assessment software

learn more
ThreatWatch is a cloud-based cybersecurity software that provides businesses with tools to conduct risk assessments, identify vulnerabilities, and secure third-party assets. Supervisors can utilize artificial intelligence (AI)-enabled threat intelligence tool to perform security scans and self-certify codes, images, and artifacts.

Read more about ThreatWatch

Users also considered
Amazon EC2 logo

Amazon Elastic Compute Cloud

learn more
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to facilitate web-scale computing for developers.

Read more about Amazon EC2

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
GoodAccess logo

Zero Trust Architecture as a Service

learn more
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.

Read more about GoodAccess

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
GAT Labs logo

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
Elastic Security logo

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
AppDynamics logo

Application Performance Management (APM)

learn more
AppDynamics Application Intelligence platform empowers today’s software-defined businesses with the ability to proactively manage and optimize complex software environments in real time. It’s more than monitoring—it’s true Application Intelligence with cloud or on-premise deployment flexibility.

Read more about AppDynamics

Users also considered
Conecta Suite logo

Manage your company's Google and Microsoft users all in one

learn more
Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.

Read more about Conecta Suite

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered

Popular cloud security comparisons