getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cloud Security Software with Compliance management - Page 7

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


185 software options

Corpia logo

Identity & access management solution across IT environments

learn more
Corpia automates identity and access management operations to help organizations govern user identities and access privileges. It maintains access permissions through the user lifecycle, enforces access request policies, and provides auditing to ensure regulatory compliance. Corpia IGA integrates with ERPs, platforms, and applications to automate provisioning. Key features include access certification, role management, self-service portals, and analytics reporting.

Read more about Corpia

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
Cloud Access Security Broker (CASB) logo

Security management system for cloud applications

learn more
Forcepoint CASB is a security management software, which helps businesses identify and monitor risks for accessing cloud application data. Features include secure file sharing, analytics, remediation workflows, data classification, and application discovery.

Read more about Cloud Access Security Broker (CASB)

Users also considered
Fasoo DSPM logo

Data discovery and classification in hybrid environments

learn more
Fasoo DPSM helps organizations discover, classify, and secure sensitive unstructured data across cloud and hybrid environments. It provides real-time risk posture mapping, automated policy enforcement, and actionableinsights to support data governance and compliance.

Read more about Fasoo DSPM

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
Our Cloud Security Platform is designed to secure and desensitize data to comply with everything from industry standards such as the PCI DSS to global privacy regulations such as the GDPR. Our Cloud Security Platform maximizes security and reduces scope without restricting access to data.

Read more about TokenEx

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Build your organization's cyber risk management and security operations capability using simple team-based workflows. Map to a cyber standard, integrate with AWS, and build controls.

Read more about FortMesa

Users also considered
AccuKnox logo

Cloud Security

learn more
AccuKnox is your cloud security partner that can help you prevent advanced zero-day attacks. Our agentless CSPM and eBPF, LSM powered CWPP solutions provide comprehensive protection for your cloud environment.

Read more about AccuKnox

Users also considered
Tripwire Enterprise logo

Superior security, continuous compliance.

learn more
Fortra's Tripwire Enterprise is a leading compliance monitoring solution, using file integrity monitoring (FIM) and security configuration management (SCM). Backed by decades of experience, its advanced use cases are unmatched by other solutions.

Read more about Tripwire Enterprise

Users also considered
Privacera logo

Cloud data access governance and compliance platform

learn more
Privacera is the cloud-based platform that helps businesses streamline data security governance processes.

Read more about Privacera

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
Stream Security logo

Cloud security platform for threat detection and response

learn more
Stream Security is a cloud security platform that helps businesses of all sizes in the information technology (IT), banking, and oil and gas industries detect threats, automate attack investigation, and assess risks across cloud environments.

Read more about Stream Security

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
Intezer Protect logo

SOAR tool for cloud security and vulnerability management

learn more
Intezer Protect is a security orchestration, automation, and response (SOAR) software that provides businesses with tools to identify potential threats across public/private cloud environments. Supervisors can use the dashboard to gain an overview of asset performance or identified vulnerabilities via actionable analytics.

Read more about Intezer Protect

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
HTCD logo

Cloud security, operations, and FinOps solution

learn more
HTCD is an AI-enabled cloud security solution that provides real-time observability, proactive threat hunting, and intelligent prioritization. It empowers customers to elevate cloud security posture while maintaining data ownership and control. The platform's natural language interface allows users to uncover threats through conversational queries, automating threat hunting workflows and reducing response times.

Read more about HTCD

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
iQ.Suite aaS logo

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
Volterra logo

Distributed cloud platform to deploy, secure and manage apps

learn more
Volterra is a cloud-based platform that helps businesses deploy, connect, secure, and operate applications across multiple clouds, hybrid, and edge environments. Features include network firewall, load balancing, single sign-on (SSO), bot management, team collaboration, and access control.

Read more about Volterra

Users also considered
Basis Theory logo

A compliant platform to secure, use, and manage your data

learn more
A compliant and developer-friendly platform to secure, use, and manage the data that matters most to you.

Read more about Basis Theory

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
HCL AppScan logo

Fast, Accurate, Agile Application Security Testing

learn more
HCL AppScan empowers developers, DevOps and security teams with a suite of testing tools to find and fix vulnerabilities in applications at all phases of development. It integrates seamlessly with DevSecOps pipelines to ensure continuous security and compliance.

Read more about HCL AppScan

Users also considered
Cloud Edge logo

CloudEdge | Secure, Scalable Cloud Services for Enterprises

learn more
CloudEdge is a Comprehensive, scalable cloud infrastructure with customizable VMs and resource pools so you can scale your infrastructure effortlessly with customizable resource pools, dedicated performance, and enterprise-level security for critical workloads.

Read more about Cloud Edge

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered