App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software with Ad hoc Reporting

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

12 software options

Sponsored

Personalize your search

Any industry

Any business size

Datadog logo
4.6
(239)

Cloud-Scale Monitoring Platform For Dev, Sec, and Ops teams.

visit website
Get full-stack security for your production environment with Datadog's Cloud Security Platform. With real-time threat detection and continuous configuration audits across your entire production environment, you can easily bring speed and scale to your organization. Get started in minutes.

Read more about Datadog

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
Workato logo
4.7
(52)

Better Integrations through Intelligent Automations

learn more
Workato connects your apps and automate your business. Easily enable powerful automation of business workflows and tasks across apps - without a need for IT.

Read more about Workato

Users also considered
ManageEngine ADManager Plus logo
4.5
(52)

Active Directory Management and Reporting Solution

learn more
ADManager Plus is a simple, easy-to-use Windows Active Directory Management and Reporting Solution that helps AD Administrators and Help Desk Technicians.

Read more about ManageEngine ADManager Plus

Users also considered
GAT Labs logo
4.8
(26)

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
Sumo Logic logo
4.6
(25)

Unified Logs & Metrics for Full App Visibility

learn more
Sumo Logic is a log management and data analytics software that creates information based on data feeds. It assesses server, application and website performances by creating graphs and charts. It creates alerts when data reaches certain levels which in turn notify of potential threats/downtime.

Read more about Sumo Logic

Users also considered
Elastic Security logo
4.8
(13)

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Versio.io logo
4.5
(2)

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Aware logo
3.5
(4)

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Veza logo
5.0
(1)

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
ZertID logo
5.0
(1)

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
Dasera logo
(0)

Automate, Govern, Secure: Protect Your Data with Dasera

learn more
Dasera is a cloud-based data discovery and management solution that provides organizations with the tools needed to navigate the complexities of data environments.

Read more about Dasera

Users also considered