getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Access Controls/Permissions (2026) - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


203 software options

MDI Cloud logo

Managed Document Intelligence

learn more
MDI Cloud is a solution for organising, managing, and collaborating on documents. It allows users to search, access, and manage all information in one place, with advanced search capabilities to locate keywords or phrases across digital or handwritten text. MDI Cloud also offers access controls and retention management for data privacy and security, as well as scalable functionality.

Read more about MDI Cloud

Users also considered
Oasis Defender logo

Gen AI-powered multi-cloud CSPM | Makes cloud security easy

learn more
Oasis Defender is a Gen AI-powered CSPM that delivers advanced security analytics, cloud vizualization, and actionable remediation recommendations.

Read more about Oasis Defender

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security platform that enables organizations to gain complete visibility, prioritize attack paths and remediate critical risks in multi-cloud environments.

Read more about Wiz

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
Data Command Center logo

Data Command Center

learn more
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and Generative AI.

Read more about Data Command Center

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
Our Cloud Security Platform is designed to secure and desensitize data to comply with everything from industry standards such as the PCI DSS to global privacy regulations such as the GDPR. Our Cloud Security Platform maximizes security and reduces scope without restricting access to data.

Read more about TokenEx

Users also considered
VGS logo

Secure collection, protection & exchange of sensitive data

learn more
VGS platform by Very Good Security enables users to securely collect, protect, and exchange sensitive data such as card details, personal finance data, identification documents, vacation rental payments, & credentials, using data redaction and alias value systems which cannot be reverse engineered

Read more about VGS

Users also considered
Cloud Access Security Broker (CASB) logo

Security management system for cloud applications

learn more
Forcepoint CASB is a security management software, which helps businesses identify and monitor risks for accessing cloud application data. Features include secure file sharing, analytics, remediation workflows, data classification, and application discovery.

Read more about Cloud Access Security Broker (CASB)

Users also considered
ThreatWatch logo

Cloud-based cybersecurity and threat assessment software

learn more
ThreatWatch is a cloud-based cybersecurity software that provides businesses with tools to conduct risk assessments, identify vulnerabilities, and secure third-party assets. Supervisors can utilize artificial intelligence (AI)-enabled threat intelligence tool to perform security scans and self-certify codes, images, and artifacts.

Read more about ThreatWatch

Users also considered
SecureCloud logo

German software for secure cloud storage & sharing of data

learn more
Your Secure Cloud is the secure sync & share solution from germany with end-to-end encryption with options for white label and much more enterprise-features.

Read more about SecureCloud

Users also considered
HCL AppScan logo

Fast, Accurate, Agile Application Security Testing

learn more
HCL AppScan empowers developers, DevOps and security teams with a suite of testing tools to find and fix vulnerabilities in applications at all phases of development. It integrates seamlessly with DevSecOps pipelines to ensure continuous security and compliance.

Read more about HCL AppScan

Users also considered
Volterra logo

Distributed cloud platform to deploy, secure and manage apps

learn more
Volterra is a cloud-based platform that helps businesses deploy, connect, secure, and operate applications across multiple clouds, hybrid, and edge environments. Features include network firewall, load balancing, single sign-on (SSO), bot management, team collaboration, and access control.

Read more about Volterra

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

Overcome the limitations of native cloud auditing by getting complete visibility over permissions and user behavior across your cloud environment.

Read more about Lepide Data Security Platform

Users also considered
ThreatWatch logo

Cloud-based cybersecurity and threat assessment software

learn more
ThreatWatch is a cloud-based cybersecurity software that provides businesses with tools to conduct risk assessments, identify vulnerabilities, and secure third-party assets. Supervisors can utilize artificial intelligence (AI)-enabled threat intelligence tool to perform security scans and self-certify codes, images, and artifacts.

Read more about ThreatWatch

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Build your organization's cyber risk management and security operations capability using simple team-based workflows. Map to a cyber standard, integrate with AWS, and build controls.

Read more about FortMesa

Users also considered
Cloud Access Security Broker (CASB) logo

Security management system for cloud applications

learn more
Forcepoint CASB is a security management software, which helps businesses identify and monitor risks for accessing cloud application data. Features include secure file sharing, analytics, remediation workflows, data classification, and application discovery.

Read more about Cloud Access Security Broker (CASB)

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered