getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cloud Security Software with Threat intelligence - Page 3

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


161 software options

Elastio Cyber Recovery logo

Data Protection and Cyber Recovery as a Service

learn more
Elastio Cyber Recovery is agentless, leverages AWS snapshots, and can ingest and secure existing snapshots. It provides real-time visibility into the recovery health of applications and enables teams to manage service-level objectives confidently. Teams are notified instantly of risks to application recovery health. It deeply inspects each backup for ransomware and malware in addition to air-gapped and immutable backups.

Read more about Elastio Cyber Recovery

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Oasis Defender logo

Gen AI-powered multi-cloud CSPM | Makes cloud security easy

learn more
Oasis Defender is a Gen AI-powered CSPM that delivers advanced security analytics, cloud vizualization, and actionable remediation recommendations.

Read more about Oasis Defender

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security platform that enables organizations to gain complete visibility, prioritize attack paths and remediate critical risks in multi-cloud environments.

Read more about Wiz

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
Netacea Bot Management logo

Netacea protects websites, mobile apps and APIs from bots.

learn more
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.

Read more about Netacea Bot Management

Users also considered
365 Total Protection logo

Email security management for Microsoft Office 365

learn more
365 Total Protection is an email security & compliance solution for Microsoft Office 365 with features for tracking emails in real time, handling infomail, blocking spam, filtering for compliance, defending against threats, black & whitelisting, archiving emails, analyzing communications, & more

Read more about 365 Total Protection

Users also considered
Sumo Logic logo

Unified Logs & Metrics for Full App Visibility

learn more
Sumo Logic is a log management and data analytics software that creates information based on data feeds. It assesses server, application and website performances by creating graphs and charts. It creates alerts when data reaches certain levels which in turn notify of potential threats/downtime.

Read more about Sumo Logic

Users also considered
VMware NSX logo

Network Virtualization Platform

learn more
VMware NSX is a flexible and agile software-defined Network Virtualization Platform.

Read more about VMware NSX

Users also considered
SysCloud logo

Start making smarter cloud backups

learn more
SysCloud is a BaaS provider offering automated backups, restores & unlimited retention for critical SaaS apps in a single pane of glass.

Read more about SysCloud

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
Amazon EC2 logo

Amazon Elastic Compute Cloud

learn more
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to facilitate web-scale computing for developers.

Read more about Amazon EC2

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome safeguards businesses' valuable data and operations in the cloud with dedicated IPs for individuals and teams. The business VPN enables secure remote access, overcoming service limitations and geographical restrictions across 70 locations. Ensure secure, reliable, and quick security.

Read more about PureDome

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
Wallarm WAF logo

Application security platform for businesses

learn more
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis.

Read more about Wallarm WAF

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading Zero Trust Network Access platform, ensuring remote, secure cloud access from anywhere. Secure your organization with both agent and agentless access as well as advanced security features such as Firewall as a Service, device posture security, and SWG.

Read more about Perimeter 81

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Cortex XSOAR logo

Cloud security and SOAR solution

learn more
Cortex XSOAR is a cloud security software that helps businesses generate threat intelligence, automate incident response, handle remediation processes and more from within a centralized platform. It allows staff members to utilize automated playbooks to parse, aggregate, manage, and de-duplicate daily indicators across multiple sources.

Read more about Cortex XSOAR

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered