Best Cloud Security Software & Tools


Similar Categories
Show filters
Filter (114 Products)
Star rating
Market segments
Logo
Arctic Wolf
No price information
Arctic Wolf is a cybersecurity platform using AI for Managed Detection and Response. Features include risk management and continuous protection via a Concierge Security® model.
Logo
Scrut Automation
No price information
Scrut Automation provides real-time risk monitoring and collaborative workflows for simplifying compliance processes. Supports multiple frameworks, subscription-based pricing.
Logo
Edgescan
No price information
Edgescan is a cybersecurity platform offering attack surface & risk-based vulnerability management, application & API security testing, and penetration testing.
Logo
PingSafe
No price information
PingSafe is a cloud security platform providing real-time monitoring and protection for business infrastructures.
Logo
ESET PROTECT Advanced
No price information
ESET PROTECT Advanced bietet umfassenden Schutz gegen Cyberbedrohungen mit Echtzeitschutz, Bedrohungserkennung und Netzwerkfirewall. Startet bei 36,96 Euro jährlich.
Logo
SentinelOne Singularity
No price information
SentinelOne Singularity ist eine Cybersecurity-Plattform mit prädiktiver KI-gesteuerter Erkennung, automatisierter Endpunktabwehr und IoT-Gerätesicherheit.
Logo
CrowdStrike Falcon Platform
No price information
Die CrowdStrike Falcon Platform ist eine cloudbasierte Plattform zur Abwehr von Cyberbedrohungen und zur Echtzeitsicherung von Endpunkten.
Logo
Sophos Intercept X Endpoint
No price information
Sophos Intercept X Endpoint bietet Unternehmenssicherheit gegen Bedrohungen und Ransomware durch Echtzeitschutz, Exploit-Abwehr und KI-Bedrohungserkennung.
Logo
Citrix Secure Workspace Access
No price information
Citrix Secure Workspace Access offers secure remote access to business applications and data, with features like zero-trust security, SSO, and contextual access control.
Logo
Druva
Price: Custom
Druva provides secure cloud data management for businesses, with features like automated backups, centralized operations, and protection against data loss and threats.
Logo
Cisco Secure Email Threat Defense
Price: Custom offer
Cisco Secure Email Threat Defense provides comprehensive email security, featuring threat analysis, a powerful search function, and a three-fold defense action.
Logo
Kiteworks Secure Email
No price information
Kiteworks Secure Email offers top-level security for confidential emails via encryption, rule-based policies, and access controls.
Logo
Microsoft Defender for Cloud Apps
No price information
Microsoft Defender for Cloud Apps provides businesses with comprehensive insights, control, configuration of SaaS apps, and data protection.
Logo
Microsoft Security Copilot
No price information
Microsoft Security Copilot is an AI tool which aids quick threat response and risk assessment, using 65 trillion signals per day.
Logo
Qualys
No price information
Qualys offers cloud-based IT security and compliance solutions, automating vulnerability detection and protection. Promises flexibility, business results, and cost saving.
Logo
Imperva
No price information
Imperva is a digital security software that protects company data from cyber-attacks, secures all digital experiences, and is suitable for various business scales.
Logo
Mozilla Observatory
No price information
Mozilla Observatory provides free, open-source tools for website security checks. It evaluates security procedures, script integrity, cookie secure flags, and HTTPS encryption.
Logo
Orca Security
No price information
Orca Security is a cloud security platform that detects and fixes security risks. Features include malconfiguration monitoring and Kubernetes protection.
Logo
SpectralOps
No price information
Spectral offers automated security for codebases, protecting against exposed keys, tokens, and misconfigurations.
Logo
Trend Micro Hybrid Cloud Security
No price information
Trend Micro Cloud One offers comprehensive security for cloud-native apps integrating with DevOps tools, providing automated protection throughout application life cycle.