getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Event Logs (2026) - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


111 software options

EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
Mitiga logo

Cloud & SaaS forensics for incident response and threat hunt

learn more
Mitiga’s modern IR2 platform and teams of cloud and SaaS forensics experts help you prepare for cloud and SaaS application breaches before they happen and recover in record time. We're dedicated to creating a whole new level of resilience for today's cloud and SaaS-driven enterprises.

Read more about Mitiga

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

Overcome the limitations of native cloud auditing by getting complete visibility over permissions and user behavior across your cloud environment.

Read more about Lepide Data Security Platform

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Corpia logo

Identity & access management solution across IT environments

learn more
Corpia automates identity and access management operations to help organizations govern user identities and access privileges. It maintains access permissions through the user lifecycle, enforces access request policies, and provides auditing to ensure regulatory compliance. Corpia IGA integrates with ERPs, platforms, and applications to automate provisioning. Key features include access certification, role management, self-service portals, and analytics reporting.

Read more about Corpia

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
Klarytee logo

Data-centric Governance Platform.

learn more
Data-centric Governance Platform. Visibility. Protection. Control. For AI & Beyond.

Read more about Klarytee

Users also considered
Sailorcloud logo

Navigating Tomorrow's Cloud Landscape Today

learn more
Sailor Cloud pioneers the future of hybrid cloud management with its cutting-edge AI-driven orchestration platform. Seamlessly integrating public clouds and on-premises environments, it delivers unparalleled simplicity in infrastructure management.

Read more about Sailorcloud

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered