App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cloud Security Software - Page 9

298 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

HPE GreenLake logo

HPE GreenLake

5.0
(1)

Cloud management platform for enterprises

learn more
HPE GreenLake is an enterprise-grade, multi-cloud management software. It is a cloud-native platform that allows businesses to manage applications and data across hybrid clouds, on-premises, and edge locations.

Read more about HPE GreenLake

Users also considered
Teleport logo

Teleport

5.0
(1)

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Armor Anywhere logo

Armor Anywhere

4.0
(1)

Enterprise-grade cybersecurity platform for MSPs.

learn more
Armor Anywhere is a cloud-based security and compliance platform that provides a centralized view into all IT environments and endpoints.

Read more about Armor Anywhere

Users also considered
Centricity logo

Centricity

(0)

Centricity from CloudHesive, powered by AWS

learn more
Centricity from CloudHesive makes managing your AWS environment easy. You gain the full power of Amazon Web Services without the challenge of understanding the technical underpinnings of complex cloud services, or hiring a team of experts to develop and maintain complex solutions.

Read more about Centricity

Users also considered
StackRox logo

StackRox

4.0
(1)

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
PureDome logo

PureDome

4.0
(1)

Secure. Reliable. Quick.

learn more
PureDome safeguards businesses' valuable data and operations in the cloud with dedicated IPs for individuals and teams. The business VPN enables secure remote access, overcoming service limitations and geographical restrictions across 70 locations. Ensure secure, reliable, and quick security.

Read more about PureDome

Users also considered
Anturis logo

Anturis

3.0
(2)

Cloud-based monitoring application

learn more
Anturis is an application monitoring and website intelligence platform that helps create charts and reports based on data feeds entered into the application. The software produces intelligent real-time graphs and charts that analyze app performance and identify potential threats.

Read more about Anturis

Users also considered
Zycada logo

Zycada

3.0
(2)

Programmable content delivery network (CDN) platform

learn more
Zycada is a CDN platform built to accelerate dynamic content. Zycada uses NetworkBots@Edge to decouple the latency caused by dynamic content requests from the user experience. It helps businesses improve user experience as compared to traditional CDNs.

Read more about Zycada

Users also considered
Haltdos logo

Haltdos

2.0
(1)

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
Securiti logo

Securiti

1.0
(1)

Data Command Center

learn more
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and Generative AI.

Read more about Securiti

Users also considered
Password Generator logo

Password Generator

(0)

Generate secure random passwords, numbers, codes, usernames

learn more
Easily generate millions of unique strong random passwords, numbers, masked codes, pronounceable passwords, usernames, and more. Control character placement, composition, and frequency of occurrence. Allow or disallow duplicate, consecutive, repeating, and similar characters.

Read more about Password Generator

Users also considered
Turbot logo

Turbot

(0)

Cloud integration platform for managing digital resources

learn more
Turbot is a cloud governance solution that allows enterprises to integrate with Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform to manage digital resources, control software, maintain compliance, and develop cloud-based applications.

Read more about Turbot

Users also considered
CloudSploit logo

CloudSploit

(0)

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
MobileWall logo

MobileWall

(0)

Provides a patented cloud-based mobile firewall.

learn more
MobileWall provides patented, cloud-based Software-as-a-Service mobile data security, visibility and control subscription services. MobileWall acts as a mobile firewall for your data, while giving the ability to view data usage and make adjustments to eliminate risks and reduce data costs.

Read more about MobileWall

Users also considered
Acra  logo

Acra

(0)

Protect sensitive data in databases and distributed apps

learn more
Acra is a cloud native data security platform. It covers 9 data security controls: transparent data encryption, searchable encryption, data masking, tokenization, authentication, IDS, SQL firewall, etc. Acra provides defence-in-depth across the whole data lifespan within the application.

Read more about Acra

Users also considered
CrossClave logo

CrossClave

(0)

Secure file sharing & chatting collaboration tool for teams

learn more
CrossClave is collaboration tool providing file-sharing and chatting to organizations with teams looking for exact security. CrossClave eliminates the vulnerabilities associated with servers and networks. Through endpoint protection of the system and a Zero-trust design, CrossClave can secure remote teleworking, multinational collaboration, and intellectual property.

Read more about CrossClave

Users also considered
AppScan logo

AppScan

(0)

Cloud application security software

learn more
AppScan is a cloud security software that helps businesses detect threats, remediate vulnerabilities, conduct application security testing, and more from within a unified platform. It allows staff members to conduct dynamic, static, and interactive security testing for web, open-source, and mobile-based applications.

Read more about AppScan

Users also considered
Atomic Protector logo

Atomic Protector

(0)

Security and compliance management tool for endpoint devices

learn more
Atomic Protector is an integrated solution that helps businesses secure workloads and ensure regulatory compliance across on-premise, cloud, and hybrid environments. Supervisors can detect potential threats across stored files, configuration details in registries, drivers, or libraries, and infrastructure components, such as web servers, firewalls, and more.

Read more about Atomic Protector

Users also considered
ThreatSpotter logo

ThreatSpotter

(0)

ThreatSpotter - Compliance Security Scanner

learn more
ThreatSpotter tool integrates with private cloud resources and ensures that compliance risk management summary should be integrated with provided credentials so that all compliance results would be available in threat analytics dashboard. Threatspotter helps in achievement of tracking continuously.

Read more about ThreatSpotter

Users also considered
Threat Stack logo

Threat Stack

(0)

Cloud security platform to detect and respond to threats

learn more
Threat Stack is a cloud-based platform that helps businesses identify and respond to threats in real-time while ensuring security and compliance across applications. It facilitates visibility across cloud management console, host, containers and serverless layers.

Read more about Threat Stack

Users also considered
IPS logo

IPS

(0)

A platform for the management of cloud servers and services

learn more
Cloud services can be purchased on the IPS platform. Users can choose from hosting websites, business emails, domain registration, and managed or self-managed cloud servers. All purchased services can be managed in one dashboard, which can be further expanded.

Read more about IPS

Users also considered
CloudGuard logo

CloudGuard

(0)

Cloud and container security software for IT teams

learn more
CloudGuard is a container security software designed to help businesses streamline vulnerability assessment, workload protection, and compliance management operations via a unified platform. It enables IT professionals to automatically scan containers and provide protection against external threats using custom rules and analysis.

Read more about CloudGuard

Users also considered
ThreatX logo

ThreatX

(0)

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
iQ.Suite aaS logo

iQ.Suite aaS

(0)

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered