getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Third-Party Integrations (2026) - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


168 software options

ALTOSPAM logo

Effectively protect all your company's emails

learn more
ALTOSPAM is an email protection solution for all businesses, associations and local authorities. Choose advanced email security compatible with all mail servers, including Office 365. Try ALTOSPAM for free.

Read more about ALTOSPAM

Users also considered
Workato logo

AI orchestration & integration platform

learn more
Workato connects your apps and automate your business. Easily enable powerful automation of business workflows and tasks across apps - without a need for IT.

Read more about Workato

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Beagle Security logo
Category Leaders

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Conecta Suite logo

Manage your company's Google and Microsoft users all in one

learn more
Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.

Read more about Conecta Suite

Users also considered
idgard logo

Cloud-based collaboration and data security platform

learn more
idgard is a secure cloud collaboration platform offering enterprise-grade data protection and compliance. The platform ensures your sensitive data is protected, even from unauthorized access by employees. The platform provides secure file sharing, virtual data rooms, and integrates with Microsoft Teams and other tools, facilitating project collaboration while maintaining high data security standards.

Read more about idgard

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
GitGuardian logo

Automated Secrets Detection and Remediation

learn more
GitGuardian leads the way in Non-Human Identity security, offering end-to-end solutions from secrets detection in code, productivity tools and environments to strong remediation, governance and proactive prevention of leaks

Read more about GitGuardian

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a real-time Active Directory auditing solution which generates compliance audit reports for PCI-DSS, HIPAA, SOX, FISMA and GLBA

Read more about ManageEngine ADAudit Plus

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Commvault Cloud logo

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
Cato Networks Suite logo
Category Leaders

A cloud-native secure access service edge (SASE) platform

learn more
Cato Networks Suite is a SASE platform for companies. It is tasked to connect branch locations, physical data centers, cloud assets, and mobile users into a secure and centrally managed global network. It optimizes access via the cloud and transforms WAN without substantial IT resources.

Read more about Cato Networks Suite

Users also considered
Workspace ONE logo

Digital workspace platform

learn more
Workspace ONE is an intelligence-driven digital workspace platform that enables organizations to simply and securely deliver and manage devices, apps, and data from a single, unified console, providing modern, cloud-native endpoint management and secure access to corporate resources.

Read more about Workspace ONE

Users also considered
AxCrypt logo

AxCrypt, File encryption software, Password manager

learn more
AxCrypt is a file encryption software that provides secure data storage and sharing. AxCrypt is designed to be user-friendly while maintaining a high level of encryption for sensitive information.

Read more about AxCrypt

Users also considered
BooleBox logo

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
AppDynamics logo

Application Performance Management (APM)

learn more
AppDynamics Application Intelligence platform empowers today’s software-defined businesses with the ability to proactively manage and optimize complex software environments in real time. It’s more than monitoring—it’s true Application Intelligence with cloud or on-premise deployment flexibility.

Read more about AppDynamics

Users also considered
GAT Labs logo

Auditing and security tool for Google Workspace and Chrome

learn more
1st zero-trust environment for Google Workspace which continuously monitors every user’s typing style, actively verifying that the right user is the one logged in. If an impostor is detected, it alerts the Admin or Security Officer with a camera shot & can shut down the session & log out the user.

Read more about GAT Labs

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Clumio logo

Data Protection Built for the Cloud

learn more
Built to help simplify data protection on AWS, Clumio's secure isolated backup service enables organizations to meet strict compliance requirements, put a gap between data and bad actors, backup and restore data in minutes, and optimize cloud storage.

Read more about Clumio

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered