Cloud Security Software

Find the best Cloud Security Software for your business. Compare product reviews and features to build your list.

What is Cloud Security Software?

Narrow results by:

Recommended Filters

Pricing Options

Popular Features

Users

Deployment

Why Capterra is free

Avanan is the premier security solution for cloud-based email, messaging, and collaboration. Deploying in minutes, Avanans unique, multi-vendor security solution leverages the industrys best technologies to protect organizations from advanced threats such as phishing, malware, data leakage, account takeover, and shadow IT. Learn more about Avanan Cloud Security Platform

In just one click, secure enterprise SaaS applications such as Office 365, G Suite, Slack, and more against the latest threats. Learn more about Avanan Cloud Security Platform

Sumo Logic

by Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. Learn more about Sumo Logic

JupiterOne simplifies cloud security operations by being your single-source of security truth. Leverage the power of search, relationship visualization and automation to keep your digital environment up-to-date and secure. JupiterOne has direct integrations that automatically import and update your digital assets, a policy builder that you can customize and create in minutes and a simple search functionality for identifying issues and producing evidence of compliance. Learn more about JupiterOne

JupiterOne simplifies cloud security operations by being your single-source of security truth with search & relationship visualization. Learn more about JupiterOne

Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. Learn more about Intelligent Discovery

Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing. Learn more about Intelligent Discovery

Eliminates all types of threats, including viruses, malware, ransomware, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection. ESET uses multilayered technologies that go far beyond the capabilities of basic antivirus. Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security

Includes anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Learn more about ESET Endpoint Security

Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. Learn more about Alert Logic Cybersecurity

Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. Learn more about Alert Logic Cybersecurity

DNS Based Web content filter and web security layer for Business that blocks malware, ransomware and phishing as well as providing web content control. WebTitan filters over 2 billion DNS requests every day, identifies 300,000 malware iterations a day and has over 7,500 customers. Cloud and gateway versions available. Improve your cybersecurity now. Try a free Trial of WebTitan today, support included. Great monthly pricing available. Hosted locally. Learn more about WebTitan

DNS Based web content filter for business that blocks malware, ransomware and phishing + provides advanced web content control. Learn more about WebTitan

CloudSploit

by CloudSploit

CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. Learn more about CloudSploit

Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source. Learn more about CloudSploit

Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control

Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control

TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type including PCI, PII, PHI and even unstructured data formats and integrate with nearly any processor or endpoint. Learn more about Cloud-Based Tokenization

Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types. Learn more about Cloud-Based Tokenization

Lacework

by Lacework

Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Laceworks unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance. Learn more about Lacework

Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks. Learn more about Lacework

A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing. Learn more about ZEROSPAM

A pure-play cloud anti-spam solution that offers superior protection against email-borne threats such as ransomware and spearphishing. Learn more about ZEROSPAM

Protect your business across physical, virtual cloud and container environments with central visibility and control. Learn more about Trend Micro Deep Security

Protect your business across physical, virtual cloud and container environments with central visibility and control. Learn more about Trend Micro Deep Security

SiteLock

by SiteLock

SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide. Learn more about SiteLock

SiteLock is the Global Leader in Website Security, currently protecting more than twelve million websites worldwide. Learn more about SiteLock

ONTAP

by NetApp

Software to allow users to improve storage efficiency by remotely controlling digital infrastructure. Learn more about ONTAP

Software to allow users to improve storage efficiency by remotely controlling digital infrastructure. Learn more about ONTAP

VM-Series

by Palo Alto Networks

Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Learn more about VM-Series

Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Learn more about VM-Series

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance. Learn more about Netskope Cloud Security Platform

Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance. Learn more about Netskope Cloud Security Platform

Protect your cloud assets and private network. Improve security and incident response across the distributed network. Learn more about Stealthwatch Cloud

Protect your cloud assets and private network. Improve security and incident response across the distributed network. Learn more about Stealthwatch Cloud

A platform ensuring total cloud control along with ease of managing cloud security and compliance across multiple cloud environments. Learn more about C3M

A platform ensuring total cloud control along with ease of managing cloud security and compliance across multiple cloud environments. Learn more about C3M

CA Veracode WAS

by CA Technologies

Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks. Learn more about CA Veracode WAS

Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks. Learn more about CA Veracode WAS

IntelliTrust

by Entrust Datacard

Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Learn more about IntelliTrust

Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Learn more about IntelliTrust

Multapplied SD-WAN

by Multapplied Networks

White label SD-WAN for ISP, MSP, & telecoms. Learn more about Multapplied SD-WAN

White label SD-WAN for ISP, MSP, & telecoms. Learn more about Multapplied SD-WAN

Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Learn more about Powertech Policy Minder

Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Learn more about Powertech Policy Minder

Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of authentication methods. Learn more about SafeNet Authentication Service

Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of authentication methods. Learn more about SafeNet Authentication Service

VIPRE Cloud

by ThreatTrack Security

Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Learn more about VIPRE Cloud

Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Learn more about VIPRE Cloud

Dome9

by Dome9 Security

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. Learn more about Dome9

SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. Learn more about Dome9

SecureAuth

by SecureAuth

Adaptive access control, empowering organizations to determine identities with confidence. Learn more about SecureAuth

Adaptive access control, empowering organizations to determine identities with confidence. Learn more about SecureAuth

Zscaler delivers the entire gateway security stack as an easily deployed cloud service. Learn more about Zscaler Cloud Platform

Zscaler delivers the entire gateway security stack as an easily deployed cloud service. Learn more about Zscaler Cloud Platform

Anti-virus Mac solution designed to monitor online employee activity and protect your network. Learn more about Flextivity

Anti-virus Mac solution designed to monitor online employee activity and protect your network. Learn more about Flextivity

Acra

by Cossack Labs

Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Learn more about Acra

Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Learn more about Acra

Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments. Learn more about Alcide Microservices Firewall

Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments. Learn more about Alcide Microservices Firewall

Protection and Performance for the Cloud Era Learn more about Barracuda CloudGen Firewall

Protection and Performance for the Cloud Era Learn more about Barracuda CloudGen Firewall

Bolt SaaS

by Bolt SaaS

VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Learn more about Bolt SaaS

VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Learn more about Bolt SaaS

Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device! Learn more about Cachatto

Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device! Learn more about Cachatto

Cato Networks

by Cato Networks

Cato provides a global SD-WAN with built-in network security, delivered as a cloud service. Learn more about Cato Networks

Cato provides a global SD-WAN with built-in network security, delivered as a cloud service. Learn more about Cato Networks

Cequence Security

by Cequence Security

Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications. Learn more about Cequence Security

Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications. Learn more about Cequence Security

Check Point CloudGuard SaaS

by Check Point Software Technologies

Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications. Learn more about Check Point CloudGuard SaaS

Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications. Learn more about Check Point CloudGuard SaaS

Cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks other tools miss. Learn more about CloudPassage Halo

Cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks other tools miss. Learn more about CloudPassage Halo

Coronet

by Coronet

Coronet provides end to end data breach protection for companies that use the cloud. Learn more about Coronet

Coronet provides end to end data breach protection for companies that use the cloud. Learn more about Coronet

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business Learn more about DataDome bot management solution

AI powered bot management solution to protect all your vulnerability points (websites, apps...) and accelerate your digital business Learn more about DataDome bot management solution

Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously. Learn more about Elastic Workload Protector

Elastic Workload Protector (EWP) is a Cloud security solution helping companies to protect their infrastructure continuously. Learn more about Elastic Workload Protector

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Learn more about Enterprise Threat Protector

Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Learn more about Enterprise Threat Protector

Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more. Learn more about Forcepoint CASB

Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more. Learn more about Forcepoint CASB

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution. Learn more about NCR Network & Security Services

OPAQ Pro

by OPAQ Networks

A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. Learn more about OPAQ Pro

A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. Learn more about OPAQ Pro

Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services. Learn more about Panda Adaptive Defense 360

Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services. Learn more about Panda Adaptive Defense 360

A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. Learn more about Privacy HUB

A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. Learn more about Privacy HUB

Protego

by Protego

Serverless security automated in 20 minutes. Learn more about Protego

Serverless security automated in 20 minutes. Learn more about Protego

R&S Cloud Protector

by Rohde & Schwarz Cybersecurity

R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support Learn more about R&S Cloud Protector

R&S®Cloud Protector provides highly scalable web application firewall-as-a-service, security, global availability and support Learn more about R&S Cloud Protector

Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard. Learn more about Radware Cloud Malware Protection

Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard. Learn more about Radware Cloud Malware Protection

RDS-Shield

by Marty Soft Conception

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

Secures and easily protects a Windows Remote Desktop Server against cyber criminals. Learn more about RDS-Shield

RedLock

by Palo Alto Networks

Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Learn more about RedLock

Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Learn more about RedLock

Threat Stack

by Threat Stack

Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Learn more about Threat Stack

Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Learn more about Threat Stack

Threat X

by Threat X

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Learn more about Threat X

SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Learn more about Threat X

Solution for secure application connectivity for the cloud-native world. Learn more about Tigera CNX

Solution for secure application connectivity for the cloud-native world. Learn more about Tigera CNX

Filter Results (55)

Product Rating

Users

Deployment

Features


What is Cloud Security Software?

Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.


Loading...