getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Incident Management (2026) - Page 4

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


112 software options

Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Aware logo

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Lacework logo

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Radiant Security logo

Cloud-based computer security tool for SOC teams.

learn more
Radiant Security is a cloud-based computer security solution that helps businesses detect and manage security incidents via artificial intelligence (AI). The solution helps automate the triage of alerts to ensure threat detection and response. It helps administrators investigate every alert, identify genuine incidents, delineate their root cause, and track attack paths. Radiant Security also provides incident analysis and response capabilities to manage the remediation process.

Read more about Radiant Security

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security platform that enables organizations to gain complete visibility, prioritize attack paths and remediate critical risks in multi-cloud environments.

Read more about Wiz

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Critical Insight logo

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
Data Command Center logo

Data Command Center

learn more
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and Generative AI.

Read more about Data Command Center

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
Intezer Protect logo

SOAR tool for cloud security and vulnerability management

learn more
Intezer Protect is a security orchestration, automation, and response (SOAR) software that provides businesses with tools to identify potential threats across public/private cloud environments. Supervisors can use the dashboard to gain an overview of asset performance or identified vulnerabilities via actionable analytics.

Read more about Intezer Protect

Users also considered
Anjuna Seaglass logo

Adopting confidential computing is now quick and seamless

learn more
Anjuna eliminates the need to re-architect applications or containers, in any environment: on-premises, hybrid, or multi-cloud for the immediate adoption of confidential computing technology! It can be deployed in minutes with no performance impact and extend hardware-level protection to storage and network.

Read more about Anjuna Seaglass

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Build your organization's cyber risk management and security operations capability using simple team-based workflows. Map to a cyber standard, integrate with AWS, and build controls.

Read more about FortMesa

Users also considered
UnderDefense MAXI logo

One platform. All things cybersecurity.

learn more
UnderDefense MAXI is a security-as-a-service powerhouse for AWS, Azure, GCP, and Kubernetes. Gain instant 24/7 detection with 1500+ rules and 80+ native integrations without disrupting DevOps workflows. Elevate protection with 2-minute alert-to-triage turnaround via automated enrichment and context.

Read more about UnderDefense MAXI

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

Overcome the limitations of native cloud auditing by getting complete visibility over permissions and user behavior across your cloud environment.

Read more about Lepide Data Security Platform

Users also considered