App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software - Page 11

306 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

AppTotal logo

AppTotal

(0)

Vulnerability management software

learn more
AppTotal is a business applications security platform. It lets employees connect the apps & add-ons to IT-approved platforms without worrying about security. AppTotal streamlines third-party app vetting processes, maps and analyzes the apps and integrations already connected to your environment, and helps teams automate app and extensions recertification and off-boarding process across Office 365, Google Workspace, Atlassian, Slack and other major platforms.

Read more about AppTotal

Users also considered
MeghOps logo

MeghOps

(0)

Cloud security and compliance platform

learn more
MeghOps provides a wide variety of solutions that are created to match the specific demands of our clients since we recognize the significance of security and compliance in the modern digital environment.

Read more about MeghOps

Users also considered
Panzura logo

Panzura

(0)

Award-winning hybrid, multi-cloud data management

learn more
Award-winning hybrid, multi-cloud data management platform. Panzura's cloud product suite includes CloudFS, Data Services, Smart Apps, and Global Services. Panzura solves all your most critical cloud data management challenges.

Read more about Panzura

Users also considered
STORM logo

STORM

(0)

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
Qloaked logo

Qloaked

(0)

SSL security for third-party domains

learn more
Qloaked is a security solution designed to help SaaS businesses secure client websites or landing pages using SSL security. Designed for small and growing businesses, the solution can encrypt SSL/TLS certificates for third-party domains, with the aim of preventing customer data breaches.

Read more about Qloaked

Users also considered
FortMesa logo

FortMesa

(0)

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Build your organization's cyber risk management and security operations capability using simple team-based workflows. Map to a cyber standard, integrate with AWS, and build controls.

Read more about FortMesa

Users also considered
Trend Micro Cloud One logo

Trend Micro Cloud One

(0)

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
PROsecure logo

PROsecure

(0)

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
EmpowerID logo

EmpowerID

(0)

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
RedShield logo

RedShield

(0)

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered
PerimeterX logo

PerimeterX

(0)

Online platform for automated attack protection & mitigation

learn more
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital skimming and Magecart, skewed analytics, and other types of threats.

Read more about PerimeterX

Users also considered
Harmony Email & Collaboration logo

Harmony Email & Collaboration

(0)

Email security and threat detection software

learn more
Harmony Email & Collaboration is an email security platform that provides businesses using Microsoft 365 and G Suite with tools to identify and prevent potential malware attacks. Supervisors can define custom policies and automatically block unauthorized logins through patent-pending technology.

Read more about Harmony Email & Collaboration

Users also considered
Arcules logo

Arcules

(0)

Cloud Surveillance, Simplified.

learn more
A simple and unified video surveillance, access control, and analytics platform in the cloud.

Read more about Arcules

Users also considered
SpamTitan Plus logo

SpamTitan Plus

(0)

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
Soveren logo

Soveren

(0)

We help Engineering and Security teams implement continuous

learn more
Soveren’s technology fills a Privacy gap, complementing existing Security measures and providing protection from financial and reputational damage caused by data Privacy incidents.

Read more about Soveren

Users also considered
Hyperglance logo

Hyperglance

(0)

Cloud management platform

learn more
A powerful cloud management platform, designed for Cloud Professionals.

Read more about Hyperglance

Users also considered
Xygeni logo

Xygeni

(0)

End to end Software Supply Chain Security

learn more
Xygeni offers complete visibility, enabling a systematic process for assessing the risks associated with the SSC, identifying and prioritizing the most critical components, evaluating and improving their global and detailed security posture at an effective and efficient effort, time and cost.

Read more about Xygeni

Users also considered
MailGuard logo

MailGuard

(0)

Speed Matters. MailGuard stops threats 2- 48hrs faster.

learn more
MailGuard anticipates, predicts and learns from emerging zero-day threats like ransomware, phishing, spear-phishing, Business Email Compromise and similar malicious email-borne attacks, protecting email users from harm.

Read more about MailGuard

Users also considered
Field Effect logo

Field Effect

(0)

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
Versa SASE logo

Versa SASE

(0)

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
FileTAC logo

FileTAC

(0)

DFI peels apart a file and enables digital inspection

learn more
Deep File Inspection technology rapidly dissects common carriers to expose embedded logic, semantic context, and metadata. Common evasive characteristics and encoding mechanisms are automatically discovered and deciphered.

Read more about FileTAC

Users also considered
F5 Distributed Cloud Bot Defense logo

F5 Distributed Cloud Bot Defense

(0)

Best-in-class App Security and Fraud Prevention Solutions

learn more
5F protects web and mobile applications and API endpoints from sophisticated automation attacks to prevent fraud at scale.

Read more about F5 Distributed Cloud Bot Defense

Users also considered
Fiabee logo

Fiabee

(0)

Cloud mobile collaboration platform

learn more
Fiabee is a cloud mobile collaboration platform that provides small to large businesses with features such as controlled mobile sync-share service for corporations with a centralized admin console, remote wipe capabilities, LDAP/SSO integration among others.

Read more about Fiabee

Users also considered
Your Secure Cloud logo

Your Secure Cloud

(0)

German software for secure cloud storage & sharing of data

learn more
Your Secure Cloud is the secure sync & share solution from germany with end-to-end encryption with options for white label and much more enterprise-features.

Read more about Your Secure Cloud

Users also considered
GetSecured logo

GetSecured

(0)

Trace vulnerabilities, Assets and Data Breaches

learn more
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues.

Read more about GetSecured

Users also considered