getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cloud Security Software with Reporting statistics - Page 4

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


169 software options

Wallarm WAF logo

Application security platform for businesses

learn more
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis.

Read more about Wallarm WAF

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG.

Read more about Perimeter 81

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Cortex XSOAR logo

Cloud security and SOAR solution

learn more
Cortex XSOAR is a cloud security software that helps businesses generate threat intelligence, automate incident response, handle remediation processes and more from within a centralized platform. It allows staff members to utilize automated playbooks to parse, aggregate, manage, and de-duplicate daily indicators across multiple sources.

Read more about Cortex XSOAR

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
Cobalt logo

(previously CrowdCurity) Pen Testing as a Service

learn more
Cobalt - previously CrowdCurity - is a modern application security platform that supports a complete find-to-fix workflow for all penetration testing and vulnerability assessments throughout an organization

Read more about Cobalt

Users also considered
Google Cloud logo

Modular platform for computing, hosting, storage and more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Savvii logo

A platform for the management of cloud servers and services

learn more
Cloud services can be purchased on the IPS platform. Users can choose from hosting websites, business emails, domain registration, and managed or self-managed cloud servers. All purchased services can be managed in one dashboard, which can be further expanded.

Read more about Savvii

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
hCaptcha logo

The leading security ML platform for fraud and abuse.

learn more
hCaptcha is a privacy-first bot mitigation platform. It provides bot and fraud management solutions for organizations that require rapid deployment and strict privacy compliance to defeat sophisticated attacks with minimal customer friction. The solution includes various features such as reporting, threat signatures, compliance management, machine learning (ML), and more.

Read more about hCaptcha

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
SecureAuth Workforce IAM logo

Cloud-based identity access management software

learn more
SecureAuth is a cloud-based software that provides businesses with multi-factor authentication (MFA) tools to verify user identity and secure enterprise data. Supervisors can configure authentication workflows and utilize various password-less methods, such as WebAuthn or SecureAuth Authenticate, to streamline verification processes.

Read more about SecureAuth Workforce IAM

Users also considered
SpectralOps logo

Code security software for code and cloud

learn more
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.

Read more about SpectralOps

Users also considered
Oracle Cloud Infrastructure (OCI) logo

A complete cloud infrastructure platform for every workload

learn more
Oracle Cloud Infrastructure is an Infrastructure-as-a-Service (IaaS) software designed to assist businesses of all sizes with threat detection and protection, virtual machine hosting, file storage, data transfer, database management, and more.

Read more about Oracle Cloud Infrastructure (OCI)

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
AppSec Education Platform logo

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about AppSec Education Platform

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / CLOUD WORKLOAD PROTECTION ensures global visibility into cloud-positioned infrastructures and optimal protection against common and sophisticated threats. It comes with several hundred correlation rules that can be activated to protect your cloud infrastructures.

Read more about TEHTRIS XDR Platform

Users also considered
Nordcloud Klarity Core logo

The cloud management tools you didn't think existed.

learn more
Nordcloud Klarity is a game-changing suite of cloud management tools designed to automate cloud operations, optimize spend, and improve security. The tools provide full control of cloud estates, helping midsize and large companies handle forecasting, reporting, cost allocation, and more.

Read more about Nordcloud Klarity Core

Users also considered
ESET PROTECT Complete logo

Cloud-based patch management for total security

learn more
ESET PROTECT Complete offers advanced patch management for businesses with 250+ employees, ensuring systems are secure and up-to-date with automated updates and comprehensive vulnerability assessments.

Read more about ESET PROTECT Complete

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered