getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Access Controls/Permissions (2026) - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


201 software options

GoodAccess logo

Zero Trust Architecture as a Service

learn more
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.

Read more about GoodAccess

Users also considered
SentinelOne logo
Category Leaders

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Sprinto logo

Cloud-based solution for security compliance.

learn more
Sprinto is a cloud-based platform designed to help businesses of all sizes manage and streamline their compliance processes. It offers various capabilities such as compliance programs, automated workflows, and continuous control monitoring. Sprinto's risk assessment module allows for quantitative and qualitative evaluation of risks, while its role-based task management ensures seamless collaboration across the organization.

Read more about Sprinto

Users also considered
Perimeter 81 logo
Category Leaders

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG.

Read more about Perimeter 81

Users also considered
OneLogin logo

Cloud-Based Identity Management & Single Sign-On System

learn more
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.

In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.

Read more about OneLogin

Users also considered
Rubrik logo

All Your Apps. Instantly Available.

learn more
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!

Read more about Rubrik

Users also considered
Workato logo

AI orchestration & integration platform

learn more
Workato connects your apps and automate your business. Easily enable powerful automation of business workflows and tasks across apps - without a need for IT.

Read more about Workato

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Dynatrace logo

All-in-One Application Performance Monitoring

learn more
Dynatrace Ruixt is an all-in-one application performance monitoring

Read more about Dynatrace

Users also considered
Beagle Security logo
Category Leaders

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
ManageEngine ADManager Plus logo

Active Directory Management and Reporting Solution

learn more
ADManager Plus is a simple, easy-to-use Windows Active Directory Management and Reporting Solution that helps AD Administrators and Help Desk Technicians.

Read more about ManageEngine ADManager Plus

Users also considered
Conecta Suite logo

Manage your company's Google and Microsoft users all in one

learn more
Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.

Read more about Conecta Suite

Users also considered
idgard logo

Cloud-based collaboration and data security platform

learn more
idgard is a secure cloud collaboration platform offering enterprise-grade data protection and compliance. The platform ensures your sensitive data is protected, even from unauthorized access by employees. The platform provides secure file sharing, virtual data rooms, and integrates with Microsoft Teams and other tools, facilitating project collaboration while maintaining high data security standards.

Read more about idgard

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
GitGuardian logo

Automated Secrets Detection and Remediation

learn more
GitGuardian leads the way in Non-Human Identity security, offering end-to-end solutions from secrets detection in code, productivity tools and environments to strong remediation, governance and proactive prevention of leaks

Read more about GitGuardian

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a real-time Active Directory auditing solution which generates compliance audit reports for PCI-DSS, HIPAA, SOX, FISMA and GLBA

Read more about ManageEngine ADAudit Plus

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
ManageEngine ADSelfService Plus logo

Self Service Password Management and Single Sign On Solution

learn more
ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management program. It helps domain users to perform self service password reset,self service account unlock and employee self update of personal details(e.g telephone numbers,etc) in Microsoft Windows Active Directory.

Read more about ManageEngine ADSelfService Plus

Users also considered
Commvault Cloud logo

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Cato Networks Suite logo
Category Leaders

A cloud-native secure access service edge (SASE) platform

learn more
Cato Networks Suite is a SASE platform for companies. It is tasked to connect branch locations, physical data centers, cloud assets, and mobile users into a secure and centrally managed global network. It optimizes access via the cloud and transforms WAN without substantial IT resources.

Read more about Cato Networks Suite

Users also considered
BLACKbox logo

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
SafeDNS logo
Category Leaders

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered