Cloud Security Software

Find the best Cloud Security Software for your business. Compare product reviews and features to build your list.

What is Cloud Security Software?

Filter Results (35)

Product Rating

Users

Deployment

Features

Why Capterra is free

DNS Based Web content filter and web security layer that blocks malware, ransomware and phishing attempts as well as providing web content control. We filter over 1/2 a billion DNS requests every day, identify 100,000 malware iterations a day and have over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Learn more about WebTitan

DNS Based Web content filter that blocks malware, ransomware and phishing attempts as well as providing web content control Learn more about WebTitan

Cloud Defender is an integrated suite of security & compliance controls for cloud, on-premises, hosted & hybrid infrastructures, delivered as-a-service with 24x7 expert GIAC-certified analysts. With a single solution, it identifies vulnerabilities, defends against web app attacks, analyzes logs across the application stack to identify malicious or anomalistic behavior, & assists with meeting compliance mandates - all in a monthly subscription. Learn more about Cloud Defender

Fully managed security & compliance controls for cloud, on-prem, hosted & hybrid infrastructures. Delivered as-a-service with 24x7 SOC. Learn more about Cloud Defender

Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security

Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security

DataDome specializes in protecting and accelerating digital businesses. Thanks to its AI powered bot management solution, businesses can improve the performance of websites burdened by intensive scraping; protect user data from hackers; make better marketing and business decisions, thanks to analytics data that aren't contaminated by bot traffic. Develop and execute your bot management strategy thanks to our dashboard, reports and real-time alerts Learn more about DataDome bot management solution

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business Learn more about DataDome bot management solution

CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. Learn more about CloudSploit

Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source. Learn more about CloudSploit

Protect your email against ransomware, spearphishing and all other threats. ZEROSPAM is a highly effective and easy to use Cloud Email Security solution with a proven catch rate of 99.9% against all forms of email-borne threats. Fully compatible with Office 365, it provides superior ransomware and phishing protection, the best spearphishing protection in the industry and a very low false positive rate. We are an service-oriented team with a complete and highly accurate antispam. Learn more about ZEROSPAM

A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing. Learn more about ZEROSPAM

Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

AWS will secure your data ON the cloud. Intelligent Discovery will provide protections IN the cloud. Don't fall victim to data loss in the cloud! . Intelligent Discovery automates the manual process of security vulnerability and threat identification. Our custom, read-only, collection tool identifies security threats and provides step-by-step remediation instructions. Choose from our scalable management models and receive FREE 14 day Enterprise level access today! Learn more about Intelligent Discovery

Intelligent Discovery© is an AWS specific SaaS tool for security threat & vulnerability detection with detailed remediation steps. Learn more about Intelligent Discovery

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads. Learn more about Hybrid Cloud Security

Threat defense system for servers that enables users to protect physical, virtual, and cloud workloads. Learn more about Hybrid Cloud Security

SiteLock

by SiteLock

SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide. Learn more about SiteLock

SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide. Learn more about SiteLock

Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Learn more about Powertech Policy Minder

Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Learn more about Powertech Policy Minder

VM-Series

by Palo Alto Networks

Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Learn more about VM-Series

Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Learn more about VM-Series

Dome9

by Dome9 Security

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. Learn more about Dome9

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. Learn more about Dome9

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance. Learn more about Netskope Cloud Security Platform

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance. Learn more about Netskope Cloud Security Platform

Protection and Performance for the Cloud Era Learn more about Barracuda CloudGen Firewall

Protection and Performance for the Cloud Era Learn more about Barracuda CloudGen Firewall

Bolt SaaS

by Bolt SaaS

VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Learn more about Bolt SaaS

VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Learn more about Bolt SaaS

CA Veracode WAS

by CA Technologies

Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks. Learn more about CA Veracode WAS

Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks. Learn more about CA Veracode WAS

Check Point CloudGuard SaaS

by Check Point Software Technologies

Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications. Learn more about Check Point CloudGuard SaaS

Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications. Learn more about Check Point CloudGuard SaaS

Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously. Learn more about Elastic Workload Protector

Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously. Learn more about Elastic Workload Protector

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Learn more about Enterprise Threat Protector

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Learn more about Enterprise Threat Protector

Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more. Learn more about Forcepoint CASB

Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more. Learn more about Forcepoint CASB

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

OPAQ Pro

by OPAQ Networks

A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. Learn more about OPAQ Pro

A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. Learn more about OPAQ Pro

A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. Learn more about Privacy HUB

A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. Learn more about Privacy HUB

Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard. Learn more about Radware Cloud Malware Protection

Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard. Learn more about Radware Cloud Malware Protection

RDS-Shield

by Marty Soft Conception

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

RedLock

by RedLock

Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Learn more about RedLock

Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Learn more about RedLock

Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of authentication methods. Learn more about SafeNet Authentication Service

Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of authentication methods. Learn more about SafeNet Authentication Service

Protect your data from leakage and malware with web-based data loss prevention policies and pre-built DLP templates. Learn more about Skyhigh Security Cloud

Protect your data from leakage and malware with web-based data loss prevention policies and pre-built DLP templates. Learn more about Skyhigh Security Cloud

Protect your cloud assets and private network. Improve security and incident response across the distributed network. Learn more about Stealthwatch Cloud

Protect your cloud assets and private network. Improve security and incident response across the distributed network. Learn more about Stealthwatch Cloud

Threat Stack

by Threat Stack

Continuous security monitoring for your cloud. Learn more about Threat Stack

Continuous security monitoring for your cloud. Learn more about Threat Stack

Threat X

by Threat X

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Learn more about Threat X

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Learn more about Threat X

Solution for secure application connectivity for the cloud-native world. Learn more about Tigera CNX

Solution for secure application connectivity for the cloud-native world. Learn more about Tigera CNX

VIPRE Cloud

by ThreatTrack Security

Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Learn more about VIPRE Cloud

Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Learn more about VIPRE Cloud

Zscaler delivers the entire gateway security stack as an easily deployed cloud service. Learn more about Zscaler Cloud Platform

Zscaler delivers the entire gateway security stack as an easily deployed cloud service. Learn more about Zscaler Cloud Platform

Filter Results (35)

Product Rating

Users

Deployment

Features


What is Cloud Security Software?

Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.


Loading...