Cloud security software protects data, access, and networks by securing connections between users and cloud-based SaaS offerings. Companies utilize the tools to enforce policies, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. These products provide secure access points, such as sandboxes and gateways, for approved users to launch and run cloud applications in a protected environment. Administrators can manage governance, set permissions, and monitor usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.
Many cloud security solutions function similarly to secure web gateways and secure email gateways. While they may provide similar access points, they serve to secure entire application ecosystems rather than web browsers or email documents.
To qualify for inclusion in the Cloud Security category, a product must:
Cloud Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.
Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.
AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and on-premises environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physical IT infrastructure. With USM Anywhere, you can rapidly deploy sensors into your cloud and on-premises environments while centrally managing data collection, security analysis, and threat detection from the AlienVault Secure Cloud. Five Essential Security Capabilities in a Single SaaS Platform AlienVault USM Anywhere provides five essential security capabilities in a single SaaS solution, giving you everything you need for threat detection, incident response, and compliance management—all in a single pane of glass. With USM Anywhere, you can focus on finding and responding to threats, not managing software. An elastic, cloud-based security solution, USM Anywhere can readily scale to meet your threat detection needs as your hybrid cloud environment changes and grows. 1. Asset Discovery 2. Vulnerability Assessment 3. Intrusion Detection 4. Behavioral Monitoring 5. SIEM
Skyhigh is the undisputed leader in cloud security. Skyhigh is proven at over 600 enterprises, including 40% of the Fortune 500. Why Skyhigh? We deliver the broadest range of cloud access security broker (CASB) capabilities. We’re the only CASB to cover all users across all devices and all cloud services. We scale to the largest global enterprises and we’re the only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.
Cloud Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss. It offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security
Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. The antivirus performs incremental scans up to 70 times faster with patent-pending technologies, and IDS proactively detects malicious attacks.
Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator, along with round-the-clock support for operations, maintenance, and troubleshooting. With this, Akku enables the seamless integration of on-premise legacy applications with that of a company’s cloud environment.
BetterCloud empowers IT to define, remediate, and enforce management and security policies across SaaS applications. With BetterCloud, IT can take control of their environment by setting up custom monitors, auditing activity, quickly taking action, and fully automating policy remediation.
Secure Storage Container in the Cloud Blukrypt, secure storage container that works in tandem with Parablu’s data management solutions. It provides additional layer of security to the enterprise data in the cloud. With BlyKrypt deployed, data traverses the cloud fully encrypted, battened further by total obfuscation and clear segregation of duties.
When data leaves the corporate network, most organizations lose track of where it goes and who has access. ManagedMethods’ Cloud Access Monitor provides visibility and control of cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, Box, Dropbox, Slack, and many others. Cloud Access Monitor also scans Gmail and Office 365 Mail for malware, phishing schemes, and sensitive or objectionable content. Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.
The CloudCheckr Cloud Management Platform (CMP) offers a single pane of glass view to help modern enterprises manage and optimize their public cloud. DevOps, SecOps, and FinOps teams from hundreds of global enterprises and service providers rely on CloudCheckr to manage their Azure, AWS, and Google Cloud investments so they can quickly optimize spend, eliminate waste, and improve security and compliance throughout their cloud journey. CloudCheckr enables users to save money, time, and effort to increase operational efficiencies with automated actions for your cloud. Manage your expenses with cost allocation, spend optimization, invoicing and chargebacks. Use custom reports and alerts ensure governance and accountability as your environments scale. The CloudCheckr CMP provides total visibility across your cloud infrastructure and enables protection for state and activity monitoring, turning insight to action while meeting compliance demands. Manage your assets with cross-account dashboards that provide sophisticated reporting for enterprise-wide inventory based on tags, geography, function and more to proactively optimize workloads. Review summary and detailed usage statistics for resources across AWS, Azure, and Google Cloud, offering actionable intelligence to right-size and scale services efficiently.
Secucloud's ECS2 solution protects data traffic against external threats in mobile communication networks and prevents botnet traffic (even from its own network). In doing so, it enables providers to play an important role in the protection of their customers against malware and unwanted harmful content.
Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.
Whether you are running VMs in a private cloud powered by vSphere or a public clouds like IBM Softlayer, Microsoft Azure, vCloud Air or AWS, HyTrust DataControl provides strong encryption for virtual machines in any cloud, along with easy to deploy key management YOU control.
IBM Application Security on Cloud helps secure your organization's Web and mobile applications, by detecting dozens of today's most pervasive published security vulnerabilities. IBM Application Security on Cloud helps to eliminate vulnerabilities from applications before they are placed into production and deployed. Convenient, detailed reporting permits you to effectively address application security risk, enabling application users to benefit from a more secure experience. IBM Open Source Analyzer helps to secure and manage your open source components, by automating security testing and configuring scanning for open source.
Security is becoming increasingly complicated - honestly, it doesn't have to be. JupiterOne simplifies the process, helping software providers achieve and maintain their security, DevOps and cloud infrastructure operations with ease. With Asset Inventory, Simple Search and Graph Viewer Visualization, it is easy to identify issues and maintain compliance. JupiterOne's Policy Builder turns what used to be dozens of man-hours creating and maintaining 500-page security policies into minutes.
Use Meta's Network-as-a-Service to rapidly connect people, applications, clouds and sites, and secure them with a software-defined perimeter. As the first user-centric network and security platform, the Meta NaaS leverages a dense, cloud-native global backbone to deliver always-on security and the high-performance, anytime/anywhere connectivity that employees have come to expect. Whether you are a cloud-native organization or taking your first steps into cloud-based networking, the Meta NaaS provides the security, flexibility and user experience you need.
Perimeter 81 is the ultimate secure network access service for your business. Say goodbye to costly VPN hardware and hours of manual configuration, and instantly grant your team secure access to critical company resources based on-premise, on the web or in the cloud. With Perimeter 81 you can easily deploy private servers with static IPs, manage team member access and gain unparalleled network visibility with an all-in-one cloud management portal. Plus, with single-click apps for every device, 256-bit bank-level encryption and our unique Automatic Wi-Fi Security feature, you can enjoy complete peace of mind online knowing that your team is always working securely – even while on the go.
Saviynt is a leader in Cloud & Enterprise Access Governance & Intelligence solutions. Saviynt secures critical data, apps & infrastructure in a single platform for Cloud (AWS, Azure, Office 365, SFDC…) & Enterprise (SAP, Epic, Oracle EBS, Workday...). Saviynt Security Manager combines traditional identity management with preventive security controls, privilege governance & behavior analytics to deliver next generation IGA for internal & external users. In addition, Saviynt has the unique ability to manage entitlements at the fine-grained level, guided by usage and behavior analytics to deliver a robust and intelligent access request and certification solution.
Spinbackup for Business: Cloud Cybersecurity & Cloud-to-Cloud Backup for Google Apps. Spinbackup safeguards Google Apps data against leak and loss disasters by identifying business risks and security threats. https://spinbackup.com/ Visit our page at Google Apps Marketplace - https://apps.google.com/marketplace/u/0/app/pchenigkkhbkcnfokijdnbeeinmejnip
Votiro Disarmer for Content Collaboration Platforms provides a necessary security layer to ensure all shared files do not contain zero-day threats, preventing targeted content attacks such as ransomware and phishing. Once deployed, every file uploaded to the cloud repository goes through the CDR sanitization process.