GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Cloud Security Software. Filters help you narrow down the results to find exactly what you’re looking for.
ESET Cloud Office Security provides advanced protection for Microsoft 365 applications against malware, spam or phishing attacks with ultimate zero-day threat defense and an easy-to-use console.
Read more about ESET Cloud Office Security
SailPoint helps businesses manage compliance, digital identities, employee permissions, security, and more. The platform includes AI and machine learning technology, which enables organizations to define and update user roles, implement organizational changes, and analyze risk across processes.
Read more about SailPoint
NordLayer enforces secure access control to a company network via private gateways for encrypted data transactions and hidden traffic flow, managed endpoint permissions with MFA, and third-party authentication to ensure compliance with cloud security requirements.
Read more about NordLayer
Get full-stack security for your production environment with Datadog's Cloud Security Platform. With real-time threat detection and continuous configuration audits across your entire production environment, you can easily bring speed and scale to your organization. Get started in minutes.
Read more about Datadog
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support
Read more about SpamTitan
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
Runecast Analyzer is a secure (on-premises), real-time issue analysis solution for VMware + AWS hybrid cloud, to automate security and audit compliance, identify and prioritize vulnerabilities, analyze logs for patterns, align with Best Practices, and simulate upgrades against the VMware HCL.
Read more about Runecast Analyzer
Avoid buying three cloud security solutions. For AWS, Azure, and GCP, Orca replaces legacy vulnerability management tools, CSPM (cloud security posture management), and CWPP (cloud workload protection platforms). Orca detects vulnerabilities, malware, misconfigurations, and more.
Read more about Orca Security
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.
Read more about Netacea Bot Management
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior,...
Read more about CipherBox
Zycada is a CDN platform built to accelerate dynamic content. Zycada uses [email protected] to decouple the latency caused by dynamic content requests from the user experience. It helps businesses improve user experience as compared to traditional CDNs.
Read more about Zycada
Jamf Threat Defense protects against mobile endpoints including iOS, iPadOS, and Android threat vectors through a highly effective mobile application and prevents in-network threats in real-time.
Read more about Jamf Threat Defense
Nordcloud Klarity is a game-changing suite of cloud management tools designed to automate cloud operations, optimize spend, and improve security. The tools provide full control of cloud estates, helping midsize and large companies handle forecasting, reporting, cost allocation, and more.
Read more about Nordcloud Klarity
LastPass provides secure password management. LastPass is the most convenient way for businesses to improve their password hygiene and security, without compromising ease of use and employee productivity.
Read more about LastPass
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them.
Read more about 1Password
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Viruses can destroy your business in minutes. Symantec Endpoint Security protects it just as fast. Symantec Endpoint Security is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.
Read more about Symantec Endpoint Security
ZEROSPAM is a complete cloud email security and anti-spam solution that protects domains against spam, ransomware, spear phishing, viruses, phishing and all harmful emails. Detect disguised executable files & infected macros sent as attachments via emails or downloaded through a malicious link.
Read more about Zerospam
Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to facilitate web-scale computing for developers.
Read more about Amazon EC2
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP.
In addition to the above features, Gartner has recently named OneLogin a Leader in the 2020 Magic Quadrant for Access Management.
Read more about OneLogin
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.
Read more about Incapsula
ManageEngine ADSelfService Plus is a secure, web-based, end-user password reset management program. It helps domain users to perform self service password reset,self service account unlock and employee self update of personal details(e.g telephone numbers,etc) in Microsoft Windows Active Directory.
Read more about ManageEngine ADSelfService Plus
Provider of GDPR-compliant cloud and data room solutions for companies as well as one of the leading secure cloud providers in Europe.
Uniscon’s business cloud idgard® secures and simplifies digital communication and data exchange with partners, customers and colleagues at the highest level.
Read more about idgard
Perch Security is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks and connected devices via a unified portal.
Read more about Perch Security
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.
Read more about Guardio
Panda Cloud Office Protection is cloud-based antivirus and endpoint protection that helps you forget security headaches – complexity, overhead, and threats. No servers needed - deploy and manage corporate antivirus and endpoint protection from anywhere via a web browser. Eliminate antivirus software-related system slowdowns.
Combine security from...
Read more about Panda Cloud Office Protection
Cato Networks Suite is a SASE platform for companies. It is tasked to connect branch locations, physical data centers, cloud assets, and mobile users into a secure and centrally managed global network. It optimizes access via the cloud and transforms WAN without substantial IT resources.
Read more about Cato Networks Suite
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.
Read more about SafeDNS
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and...
Read more about Coro
AppDynamics Application Intelligence platform empowers today’s software-defined businesses with the ability to proactively manage and optimize complex software environments in real time. It’s more than monitoring—it’s true Application Intelligence with cloud or on-premise deployment flexibility.
Read more about AppDynamics
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.
Read more about BooleBox
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.