getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cloud Security Software - Page 8

Last updated: February 2026

298 software options

Apiiro logo

AppSec management tool to secure cloud software development.

learn more
Apiiro is re-inventing the secure development lifecycle for agile and cloud-native development. It helps businesses transform application security into multidimensional application risk.

Read more about Apiiro

Users also considered
Nordcloud Klarity Core logo

The cloud management tools you didn't think existed.

learn more
Nordcloud Klarity is a game-changing suite of cloud management tools designed to automate cloud operations, optimize spend, and improve security. The tools provide full control of cloud estates, helping midsize and large companies handle forecasting, reporting, cost allocation, and more.

Read more about Nordcloud Klarity Core

Users also considered
Aviatrix logo

500+ of the world's most innovative enterprises trust Aviatr

learn more
Aviatrix secure cloud networking software is purpose-built for your business, delivering enterprise-grade networking with security, agility, and cost-optimization in mind.

Read more about Aviatrix

Users also considered
InsightIDR logo

Cloud-based cybersecurity tool for developers.

learn more
InsightIDR is a cloud-based cybersecurity solution, which helps businesses in food and beverage, cosmetics, media, and other sectors manage extended detection and response (XDR) across networks. The platform provides several functions such as endpoint detection and response (EDR), threat intelligence, traffic analysis, behavioral analytics, security information and event management (SIEM), log search, and data collection.

Read more about InsightIDR

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
XDR / CLOUD WORKLOAD PROTECTION ensures global visibility into cloud-positioned infrastructures and optimal protection against common and sophisticated threats. It comes with several hundred correlation rules that can be activated to protect your cloud infrastructures.

Read more about TEHTRIS XDR Platform

Users also considered
Cloudaware logo

Cloud management platform for enterprise IT teams

learn more
Cloudaware simplifies app deployment and asset management across AWS, Azure, GCP, Alibaba, Oracle, and VMware. IT teams get real-time visibility into cost, compliance, and performance via a centralized CMDB—streamlining operations, audits, and decision-making.

Read more about Cloudaware

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Cisco Secure Cloud Analytics logo

Network security software for on-premise & cloud environment

learn more
Cisco Secure Cloud Analytics is a network security software, designed to help businesses automatically track threats across on-premises and cloud environments. It allows users to monitor internal and external threats, malware, policy violations, misconfigured cloud assets, blacklisted communication, and user misuse.

Read more about Cisco Secure Cloud Analytics

Users also considered
Cobalt logo

(previously CrowdCurity) Pen Testing as a Service

learn more
Cobalt - previously CrowdCurity - is a modern application security platform that supports a complete find-to-fix workflow for all penetration testing and vulnerability assessments throughout an organization

Read more about Cobalt

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome safeguards businesses' valuable data and operations in the cloud with dedicated IPs for individuals and teams. The business VPN enables secure remote access, overcoming service limitations and geographical restrictions across 70 locations. Ensure secure, reliable, and quick security.

Read more about PureDome

Users also considered
hCaptcha logo

The leading security ML platform for fraud and abuse.

learn more
hCaptcha is a privacy-first bot mitigation platform. It provides bot and fraud management solutions for organizations that require rapid deployment and strict privacy compliance to defeat sophisticated attacks with minimal customer friction. The solution includes various features such as reporting, threat signatures, compliance management, machine learning (ML), and more.

Read more about hCaptcha

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
Aware logo

Enterprise Collaboration Security, Compliance, and Insights

learn more
Aware is a data governance, data loss prevention, and intelligence application for businesses in all industry sectors. Key features include policy creation, metadata extractions, data captures & transfers, OCR, integrations, reporting & collaboration tools, search & filters, archiving, and more.

Read more about Aware

Users also considered
Cisco Secure Access logo

Cloud security solution for hybrid workforce

learn more
Cisco Secure Access is a comprehensive security solution designed to protect data, applications, and secure access across multiple devices, clouds, and networks.

Read more about Cisco Secure Access

Users also considered
ManageEngine DataSecurity Plus logo

Software for managing data visibility and security

learn more
ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.

Read more about ManageEngine DataSecurity Plus

Users also considered
Lacework logo

Cloud security & compliance platform

learn more
Lacework is a cloud security and compliance software which provides automated intrusion detection, threat defence, one-click investigation, and compliance across AWS, Azure, GCP, and private clouds, giving users a comprehensive view of risks across their cloud workloads and containers.

Read more about Lacework

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure cloud and virtual desktop deployments on employee devices with Secure Remote Worker. Enforce stringent security & contextual access policies to ensure that the only devices accessing your cloud/virtual desktops are secured using ThinScale, while simultaneously blocking unsecured devices.

Read more about Secure Remote Worker

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
Argon logo

Holistic security for CI/CD pipeline

learn more
Argon connects to development environments and tools. It protects the entire CI/CD pipeline from code manipulation misconfigurations, code leaks, and vulnerabilities. This solution enables smooth AppSec orchestration by providing a unified view, full visibility, security, and code integrity.

Read more about Argon

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Critical Insight logo

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Users also considered
ZertID logo

Web-based access governance and identity security software

learn more
ZertID provides companies across different industries the tools to manage employee access and stay compliant on Identity Governance and Administration (IGA). Key features include incident, policy, password, audit & access management, access controls, user provisioning, and real-time monitoring.

Read more about ZertID

Users also considered