App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software with Email Alerts

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

29 software options

Sponsored

Personalize your search

Any industry

Any business size

Cohesity logo
4.6
(49)

Server backup and data management software

visit website
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
ALTOSPAM logo
4.8
(69)

Effectively protect all your company's emails

learn more
ALTOSPAM is an email protection solution for all businesses, associations and local authorities. Choose advanced email security compatible with all mail servers, including Office 365. Try ALTOSPAM for free.

Read more about ALTOSPAM

Users also considered
Conecta Suite logo
4.8
(45)

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
Commvault Cloud logo
4.6
(39)

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Hackrate logo
5.0
(20)

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Rublon logo
4.7
(23)

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
EcoTrust logo
4.9
(14)

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Blumira logo
4.9
(12)

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Azure, Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
HackerOne logo
4.7
(9)

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Enginsight logo
5.0
(6)

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
The host-based approach allows you to protect your entire environment (local or cloud). Vulnerability and network monitoring as well as attack detection on your cloud servers can be achieved in just a few minutes. Host-based micro-segmentation enables targeted protection of sensitive data/systems.

Read more about Enginsight

Users also considered
Netsurion logo
3.6
(23)

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
Portnox CLEAR logo
4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Reveelium logo
4.5
(6)

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
Aikido Security logo
4.6
(5)

System for identifying and managing code vulnerabilities

learn more
Aikido Security stands as a comprehensive software security solution. Scan your source code, containers, and cloud infrastructure to highlight the vulnerabilities that truly matter, triaging false positives.

Read more about Aikido Security

Users also considered
Holm Security VMP logo
4.4
(5)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Exabeam logo
5.0
(3)

Analytics and Automation for Accelerated Threat Detection

learn more
Exabeam is an analytics and automation solution for accelerated threat detection. It helps security teams add intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products.

Read more about Exabeam

Users also considered
MixMode logo
4.7
(3)

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode delivers a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses.

Read more about MixMode

Users also considered
Red Sentry logo
5.0
(2)

Expose Exploits, Automatically

learn more
You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Red Sentry is an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable.

Read more about Red Sentry

Users also considered
DNIF HYPERCLOUD logo
4.0
(4)

SIEM and log management solution for organizations

learn more
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.

Read more about DNIF HYPERCLOUD

Users also considered
Aware logo
3.5
(4)

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Elastio Cyber Recovery logo
5.0
(1)

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
Haltdos logo
2.0
(1)

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
CloudSploit logo
(0)

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Strobes PTaaS logo
(0)

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered