getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Authentication (2026) - Page 3

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


88 software options

AppSec Education Platform logo

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about AppSec Education Platform

Users also considered
iboss logo

Software for managing secure network access across devices

learn more
iboss is a cloud-based software designed to help businesses in healthcare, finance, education, and other industries establish and manage secure network access across cloud applications, mobile devices, desktops, servers, and more. The platform enables organizations to provide protection again malware, configure web filters, and handle access to multiple cloud applications like Microsoft Azure, Outlook, Office 365, and G Suite.

Read more about iboss

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
SecureAuth Workforce IAM logo

Cloud-based identity access management software

learn more
SecureAuth is a cloud-based software that provides businesses with multi-factor authentication (MFA) tools to verify user identity and secure enterprise data. Supervisors can configure authentication workflows and utilize various password-less methods, such as WebAuthn or SecureAuth Authenticate, to streamline verification processes.

Read more about SecureAuth Workforce IAM

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
SmartSignin logo

The Smart, Simple & Secure Identity for the Cloud

learn more
SmartSignin provides enterprises of all sizes a secure means of managing identity and access to confidential cloud data. An intuitive interface makes it possible to control employee, customer and partner access to cloud applications from a single dashboard and across multiple devices.

Read more about SmartSignin

Users also considered
Tenable Vulnerability Management logo

Cloud and container security software

learn more
Tenable.io is a container security software that helps businesses assess vulnerabilities, prioritize remediation actions, monitor assets, and more on a centralized platform. The automated inspection module enables staff members to detect malware, handle hierarchy intelligence, and assess container images by layer.

Read more about Tenable Vulnerability Management

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
DNIF HYPERCLOUD logo

SIEM and log management solution for organizations

learn more
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.

Read more about DNIF HYPERCLOUD

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / CLOUD WORKLOAD PROTECTION ensures global visibility into cloud-positioned infrastructures and optimal protection against common and sophisticated threats. It comes with several hundred correlation rules that can be activated to protect your cloud infrastructures.

Read more about TEHTRIS XDR Platform

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome safeguards businesses' valuable data and operations in the cloud with dedicated IPs for individuals and teams. The business VPN enables secure remote access, overcoming service limitations and geographical restrictions across 70 locations. Ensure secure, reliable, and quick security.

Read more about PureDome

Users also considered
PingFederate logo

Identity management, single sign-on (SSO), and API security

learn more
With Ping Identity, you don’t need application passwords — or the problems they create, such as administrative headaches, help desk overload or security risks. Our Internet Identity Security solutions allow users to securely access Web-based business applications without multiple logins.

Read more about PingFederate

Users also considered
Lacework logo

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
Veza logo

The authorization platform for identity-first security

learn more
Veza is a cloud-based platform specifically designed to address the primary concern in identity security today, which is authorization. Veza simplifies the process for organizations to navigate the disorder and actively visualize, handle, and regulate data permissions.

Read more about Veza

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure cloud and virtual desktop deployments on employee devices with Secure Remote Worker. Enforce stringent security & contextual access policies to ensure that the only devices accessing your cloud/virtual desktops are secured using ThinScale, while simultaneously blocking unsecured devices.

Read more about Secure Remote Worker

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
Securely manage Wireless WANs with NetCloud Manager: zero trust, AI insights, SD-WAN, and zero-touch deployment.

Read more about Ericsson NetCloud Manager

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
RedShield logo

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered