getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cloud Security Software with Access control - Page 3

Last updated: May 2026

2 filters applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


158 software options

SafeGuard Cyber logo

Online communication channel cybersecurity software.

learn more
SafeGuard is a cybersecurity software for business communication channels.

Read more about SafeGuard Cyber

Users also considered
Google Container Security logo

Cloud-based container security software

learn more
Google Container Security is a cloud-based software that provides businesses with tools to secure container environments across Google Kubernetes Engine (GKE), Anthos, and Google Cloud Platform (GCP). Supervisors can deploy patches on image containers and secure workloads using application-layer encryption.

Read more about Google Container Security

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Safetica logo

Intelligent Data Security

learn more
Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it.
With advanced data discovery, context-aware classification, proactive threat prevention and adaptive security, Safetica provides comprehensive visibility and control over your data.

Read more about Safetica

Users also considered
CipherCloud logo

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered
Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
G-Core logo

Global cloud and edge infrastructure platform

learn more
Gcore provides global hosting, content delivery network, edge, and cloud services for businesses. The platform features DDoS protection, web application and API protection, managed Kubernetes, AI infrastructure with GPU support, streaming capabilities, and bare metal servers. Gcore operates a network with over two hundred points of presence worldwide and offers integrated management through a unified control panel for CDN, streaming, storage, cloud, and security services.

Read more about G-Core

Users also considered
GAT Labs logo

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure cloud and virtual desktop deployments on employee devices with Secure Remote Worker. Enforce stringent security & contextual access policies to ensure that the only devices accessing your cloud/virtual desktops are secured using ThinScale, while simultaneously blocking unsecured devices.

Read more about Secure Remote Worker

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps provides a wide variety of solutions that are created to match the specific demands of our clients since we recognize the significance of security and compliance in the modern digital environment.

Read more about MeghOps

Users also considered
Elastio Cyber Recovery logo

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
Oasis Defender logo

Gen AI-powered multi-cloud CSPM | Makes cloud security easy

learn more
Oasis Defender is a Gen AI-powered CSPM that delivers advanced security analytics, cloud vizualization, and actionable remediation recommendations.

Read more about Oasis Defender

Users also considered
MDI Cloud logo

Managed Document Intelligence

learn more
MDI Cloud is a solution for organising, managing, and collaborating on documents. It allows users to search, access, and manage all information in one place, with advanced search capabilities to locate keywords or phrases across digital or handwritten text. MDI Cloud also offers access controls and retention management for data privacy and security, as well as scalable functionality.

Read more about MDI Cloud

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Satori logo

Set your data free

learn more
Satori enables secure self-service access to data, accelerating value from data. This is done while meeting data security and compliance requirements in a simple way.

Read more about Satori

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security platform that enables organizations to gain complete visibility, prioritize attack paths and remediate critical risks in multi-cloud environments.

Read more about Wiz

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Veza logo

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered