App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software - Page 11

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

360 software options

Sponsored

Filter results




Pricing model




User rating


Personalize your search

Any industry

Any business size

CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Turbot logo

Cloud integration platform for managing digital resources

learn more
Turbot is a cloud governance solution that allows enterprises to integrate with Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform to manage digital resources, control software, maintain compliance, and develop cloud-based applications.

Read more about Turbot

Users also considered
IPS logo

A platform for the management of cloud servers and services

learn more
Cloud services can be purchased on the IPS platform. Users can choose from hosting websites, business emails, domain registration, and managed or self-managed cloud servers. All purchased services can be managed in one dashboard, which can be further expanded.

Read more about IPS

Users also considered
ThreatSpotter logo

ThreatSpotter - Compliance Security Scanner

learn more
ThreatSpotter tool integrates with private cloud resources and ensures that compliance risk management summary should be integrated with provided credentials so that all compliance results would be available in threat analytics dashboard. Threatspotter helps in achievement of tracking continuously.

Read more about ThreatSpotter

Users also considered
Threat Stack logo

Cloud security platform to detect and respond to threats

learn more
Threat Stack is a cloud-based platform that helps businesses identify and respond to threats in real-time while ensuring security and compliance across applications. It facilitates visibility across cloud management console, host, containers and serverless layers.

Read more about Threat Stack

Users also considered
CloudGuard logo

Cloud and container security software for IT teams

learn more
CloudGuard is a container security software designed to help businesses streamline vulnerability assessment, workload protection, and compliance management operations via a unified platform. It enables IT professionals to automatically scan containers and provide protection against external threats using custom rules and analysis.

Read more about CloudGuard

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
iQ.Suite aaS logo

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
AppScan logo

Cloud application security software

learn more
AppScan is a cloud security software that helps businesses detect threats, remediate vulnerabilities, conduct application security testing, and more from within a unified platform. It allows staff members to conduct dynamic, static, and interactive security testing for web, open-source, and mobile-based applications.

Read more about AppScan

Users also considered
Acra  logo

Protect sensitive data in databases and distributed apps

learn more
Acra provides a set of means to protect the data, detect incidents, and respond to them. Encrypt, tokenize and mask sensitive data, authorize and filter SQL requests in databases, between and within applications.

Read more about Acra

Users also considered
CrossClave logo

Secure file sharing & chatting collaboration tool for teams

learn more
CrossClave is collaboration tool providing file-sharing and chatting to organizations with teams looking for exact security. CrossClave eliminates the vulnerabilities associated with servers and networks. Through endpoint protection of the system and a Zero-trust design, CrossClave can secure remote teleworking, multinational collaboration, and intellectual property.

Read more about CrossClave

Users also considered
Appaegis Isolation Access Cloud logo

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
Censornet Cloud Application Security logo

Cloud Security with Censornet's CASB Solution

learn more
Censornet Cloud Application Security CASB offers complete visibility and control over user interactions with cloud applications. Integrated with Web Security, this full-featured solution enables businesses to secure, manage, and analyze cloud application usage, safeguarding the modern mobile workforce.

Read more about Censornet Cloud Application Security

Users also considered
Banyan Cloud logo

Cloud Native Application Protection Platform

learn more
Banyan Cloud is a Cloud Native Application Protection Platform offering real-time security for Multi-cloud and Multi-databases. It ensures CIA-triad focused security, continuous monitoring of IaaS and PaaS, and simplifies cloud governance. Features include unified multi-cloud configuration visualization, extensive security controls for auditing, remediation of misconfigurations, and enforcement of compliance with regulations and best practices.

Read more about Banyan Cloud

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), JSDefender (JavaScript), & Defender for iOS (Swift/Objective-C).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
MSK Digital ID logo

User authentication system for business data security

learn more

MSK Security is designed to prevent all of the common website and consumer attack mechanisms without the need for complex or cumbersome systems. The patent pending “Non-Linear Authentication Technology” removes the username and password entry fields from the website. This step eliminates the attacks against username and password entry fields such as: SQL Injection, Key Loggers, Phishing, Pharming and Man-in-The-Middle attacks.

Read more about MSK Digital ID

Users also considered
Skybox Vulnerability Control logo

Threat-centric vulnerability management

learn more
Skybox Vulnerability Control enables threat-centric vulnerability prioritization and scanless vulnerability assessments to address security challenges within large, complex networks. Get visibility of your attack surface to analyze, prioritize and remediate your riskiest vulnerabilities fast.

Read more about Skybox Vulnerability Control

Users also considered
SmallID logo

Start Small Before You Go Big

learn more
SmallID is a cloud-native solution, delivered through the AWS Marketplace to accelerate time to visibility and insight on enterprise data.

Read more about SmallID

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
MeSign logo

End-to-End encryption and digital signature app for emails.

learn more
Provides email encryption, digital signing and timestamping service for your corporate emails.

Auto-configure email certificates, encrypt email message automatically by default with S/MIME standard.

Cloud and on-premise key management are both supported.

Read more about MeSign

Users also considered