getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Secure Login (2026) - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


79 software options

TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / CLOUD WORKLOAD PROTECTION ensures global visibility into cloud-positioned infrastructures and optimal protection against common and sophisticated threats. It comes with several hundred correlation rules that can be activated to protect your cloud infrastructures.

Read more about TEHTRIS XDR Platform

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome safeguards businesses' valuable data and operations in the cloud with dedicated IPs for individuals and teams. The business VPN enables secure remote access, overcoming service limitations and geographical restrictions across 70 locations. Ensure secure, reliable, and quick security.

Read more about PureDome

Users also considered
hCaptcha logo

The leading security ML platform for fraud and abuse.

learn more
hCaptcha is a privacy-first bot mitigation platform. It provides bot and fraud management solutions for organizations that require rapid deployment and strict privacy compliance to defeat sophisticated attacks with minimal customer friction. The solution includes various features such as reporting, threat signatures, compliance management, machine learning (ML), and more.

Read more about hCaptcha

Users also considered
Aware logo

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure cloud and virtual desktop deployments on employee devices with Secure Remote Worker. Enforce stringent security & contextual access policies to ensure that the only devices accessing your cloud/virtual desktops are secured using ThinScale, while simultaneously blocking unsecured devices.

Read more about Secure Remote Worker

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered
MDI Cloud logo

Managed Document Intelligence

learn more
MDI Cloud is a solution for organising, managing, and collaborating on documents. It allows users to search, access, and manage all information in one place, with advanced search capabilities to locate keywords or phrases across digital or handwritten text. MDI Cloud also offers access controls and retention management for data privacy and security, as well as scalable functionality.

Read more about MDI Cloud

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
Securely manage Wireless WANs with NetCloud Manager: zero trust, AI insights, SD-WAN, and zero-touch deployment.

Read more about Ericsson NetCloud Manager

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Area 1 logo

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
iQ.Suite aaS logo

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
Basis Theory logo

A compliant platform to secure, use, and manage your data

learn more
A compliant and developer-friendly platform to secure, use, and manage the data that matters most to you.

Read more about Basis Theory

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Build your organization's cyber risk management and security operations capability using simple team-based workflows. Map to a cyber standard, integrate with AWS, and build controls.

Read more about FortMesa

Users also considered
SeciossLink logo

Integrated ID management for secure access.

learn more
SeciossLink is an IDaaS that enables integrated ID management, single sign-on (SSO), multi-factor authentication (MFA), access restrictions, and other security measures. It consolidates account information for employees, students, and more to balance convenience and security with SSO and MFA.

Read more about SeciossLink

Users also considered