getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software with Threat Intelligence (2026) - Page 4

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


157 software options

CipherCloud logo

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
G-Core logo

Global cloud and edge infrastructure platform

learn more
Gcore provides global hosting, content delivery network, edge, and cloud services for businesses. The platform features DDoS protection, web application and API protection, managed Kubernetes, AI infrastructure with GPU support, streaming capabilities, and bare metal servers. Gcore operates a network with over two hundred points of presence worldwide and offers integrated management through a unified control panel for CDN, streaming, storage, cloud, and security services.

Read more about G-Core

Users also considered
SiteLock logo

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
Threat Detection Marketplace logo

SaaS content and threat detection platform

learn more
Threat Detection Marketplace (TDM) is a SaaS content platform that helps businesses identify cybersecurity threats using endpoint detection and response (EDR), security information event management (SIEM), and security orchestration, automation, and response (SOAR) tools.

Read more about Threat Detection Marketplace

Users also considered
AppOmni logo

Cloud security platfom

learn more
AppOmni SaaS security makes it easy for businesses to protect data across every SaaS application.

Read more about AppOmni

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Push Security logo

Stop identity attacks.

learn more
Push is a browser-based identity security solution.

Read more about Push Security

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
ManageEngine Log360 Cloud logo

Cloud SIEM solution for a secure IT infrastructure

learn more
ManageEngine Log360 Cloud is a unified cloud SIEM solution with integrated CASB capabilities that helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve issues.

Read more about ManageEngine Log360 Cloud

Users also considered
iboss logo

Software for managing secure network access across devices

learn more
iboss is a cloud-based software designed to help businesses in healthcare, finance, education, and other industries establish and manage secure network access across cloud applications, mobile devices, desktops, servers, and more. The platform enables organizations to provide protection again malware, configure web filters, and handle access to multiple cloud applications like Microsoft Azure, Outlook, Office 365, and G Suite.

Read more about iboss

Users also considered
Securaa logo

SOAR stands for Security Orchestration, Automation, and Resp

learn more
SOAR tools are mostly used for incident response, orchestration of workflows, and automation. Threat intelligence management is a vital SOAR Tool functionality.

Read more about Securaa

Users also considered
365 Total Protection logo

Email security management for Microsoft Office 365

learn more
365 Total Protection is an email security & compliance solution for Microsoft Office 365 with features for tracking emails in real time, handling infomail, blocking spam, filtering for compliance, defending against threats, black & whitelisting, archiving emails, analyzing communications, & more

Read more about 365 Total Protection

Users also considered
Cortex XSOAR logo

Cloud security and SOAR solution

learn more
Cortex XSOAR is a cloud security software that helps businesses generate threat intelligence, automate incident response, handle remediation processes and more from within a centralized platform. It allows staff members to utilize automated playbooks to parse, aggregate, manage, and de-duplicate daily indicators across multiple sources.

Read more about Cortex XSOAR

Users also considered
MixMode logo

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode is a dynamic cloud threat detection solution purpose-built on patented AI to detect known and novel attacks in real-time, at scale. The MixMode Platform autonomously ingests and analyzes data at scale to cut through the noise, surface critical threats, and improve overall defense.

Read more about MixMode

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Exabeam New-Scale Fusion logo

Real Intelligence. Real Security. Real Fast.

learn more
A scalable, cloud-native architecture provides rapid data ingestion, hyper-fast query performance, powerful behavioral analytics & AI.

Read more about Exabeam New-Scale Fusion

Users also considered
SecureAuth Workforce IAM logo

Cloud-based identity access management software

learn more
SecureAuth is a cloud-based software that provides businesses with multi-factor authentication (MFA) tools to verify user identity and secure enterprise data. Supervisors can configure authentication workflows and utilize various password-less methods, such as WebAuthn or SecureAuth Authenticate, to streamline verification processes.

Read more about SecureAuth Workforce IAM

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Harmony Email & Collaboration logo

Email security and threat detection software

learn more
Harmony Email & Collaboration is an email security platform that provides businesses using Microsoft 365 and G Suite with tools to identify and prevent potential malware attacks. Supervisors can define custom policies and automatically block unauthorized logins through patent-pending technology.

Read more about Harmony Email & Collaboration

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
VMware NSX logo

Network Virtualization Platform

learn more
VMware NSX is a flexible and agile software-defined Network Virtualization Platform.

Read more about VMware NSX

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Prophaze WAF logo

WAF-as-a-Service for protecting APIs and web applications

learn more
Prophaze WAF is a cybersecurity software designed to help DevOps teams in manufacturing, healthcare, and educational industries, manage Kubernetes deployments to protect web assets from cyber threats, misconfiguration, attacks, bots, and patch vulnerabilities.

Read more about Prophaze WAF

Users also considered
SafeGuard Cyber logo

Online communication channel cybersecurity software.

learn more
SafeGuard is a cybersecurity software for business communication channels.

Read more about SafeGuard Cyber

Users also considered