Best Cloud Security Software

Cloud security software protects data, access, and networks by securing connections between users and cloud-based SaaS offerings. Companies utilize the tools to enforce policies, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. These products provide secure access points, such as sandboxes and gateways, for approved users to launch and run cloud applications in a protected environment. Administrators can manage governance, set permissions, and monitor usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

Many cloud security solutions function similarly to secure web gateways and secure email gateways. While they may provide similar access points, they serve to secure entire application ecosystems rather than web browsers or email documents.

To qualify for inclusion in the Cloud Security category, a product must:

  • Provide cloud access governance
  • Secure usage of cloud-based applications
  • Monitor usage for anomalies and unapproved access
  • Protect and/or encrypt data and documents stored in the cloud.

Cloud Security Software Grid® Overview

The best Cloud Security Software products are determined by customer satisfaction (based on user reviews) and market presence (based on products’ scale, focus, and influence) and placed into four categories on the Grid®:
  • Products in the Leader quadrant are rated highly by G2 Crowd users and have substantial Market Presence scores. Leaders include: Duo Security and Open DNS Umbrella
  • High Performers are highly rated by their users, but have not yet achieved the Market Presence of the Leaders High Performers include: Netskope Active Platform and AlienVault USM
  • Contenders have significant Market Presence and resources, but have received below average user Satisfaction ratings or have not yet received a sufficient number of reviews to validate the solution. Contenders include: Microsoft Cloud App Security
  • Niche solutions do not have the Market Presence of the Leaders. They may have been rated positively on customer Satisfaction, but have not yet received enough reviews to validate them. Niche products include: Skyhigh Cloud Security Manager
G2 Crowd Grid® for Cloud Security
High Performers
Market Presence
Compare Cloud Security Software
    Results: 83

    Star Rating

    Cloud Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.

    A cloud-delivered network security service that protects any device, no matter where it’s located.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.

    Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection. Unlike traditional security point technologies, AlienVault Unified Security Management does the following: - Unifies essential security controls into a single all-in-one security monitoring solution - Monitors your cloud, hybrid cloud, and on-premises infrastructure - Delivers continuous threat intelligence to keep you aware of threats as they emerge and change - Provides comprehensive threat detection and actionable incident response directives - Deploys quickly, easily, and with minimal effort - Reduces TCO over traditional security solutions

    Microsoft Cloud App Security is an enterprise-grade security for cloud apps.

    Skyhigh is the undisputed leader in cloud security. Skyhigh is proven at over 600 enterprises, including 40% of the Fortune 500. Why Skyhigh? We deliver the broadest range of cloud access security broker (CASB) capabilities. We’re the only CASB to cover all users across all devices and all cloud services. We scale to the largest global enterprises and we’re the only CASB that is FedRAMP compliant, ISO 27001/27018 certified, and stores no customer data in our cloud.

    OmniShield is the next-generation cybersecurity solution that extends your company's perimeter to all your sites while providing omnipresent, enterprise-grade security.

    Cloud Platform Security Overview allows users to deploy on an infrastructure protected by top experts in information, application, and network security.

    CloudCare is a free, cloud-based, endpoint security administration platform that makes it significantly faster and easier to monitor threats, resolve issues, and deliver multiple layers of protection to your customers.

    CloudLock helps companies protect their data in the cloud.

    Aperture looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

    Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

    Trend Micro Deep Security is designed to mprove visibility and simplify security management across physical, virtual, and cloud environments.

    Armor Cloud Security is a totally secure cloud company that offers managed security solutions.

    Cloud Access Security Broker.

    CipherCloud provides a single platform to secure sensitive customer data across multiple public and private cloud applications, without impacting functionality or performance.

    CloudCodes SSO1 is a platform that provides enterprises a simple and unified way to secure web access to all cloud applications.

    CYREN WebSecurity is a cloud-based security software that protects devices and data, regardless of type or location

    Dome9 delivers verifiable cloud infrastructure security and compliance to all businesses at all times across all public clouds.

    Use identity to guard access for applications deployed on GCP

    IBM Cloud Security Enforcer is a cloud-delivered Cloud Access Security Broker (CASB) solution that helps securely accelerate the adoption of cloud applications.

    Oracle CASB is an API-based cloud access security broker for applications and workloads.

    Storj is an open-source distributed cloud storage platform based on blockchain technology where anyone can sell their extra hard drive space.

    Symantec CASB is a cloud security solution.

    Threat Stack provides continuous security monitoring for public, private, and hybrid cloud infrastructures protecting servers, and the data they access, from intrusion and data loss.

    Multi-layered protection is provided, with an integrated firewall, antivirus and Intrusion Detection System (IDS). The agentless firewall ensures complete traffic control and isolation between VMs. The antivirus performs incremental scans up to 70 times faster with patent-pending technologies, and IDS proactively detects malicious attacks.

    Akku is a powerful, flexible enterprise cloud security solution created to help you manage identity and access across your cloud environment. With versatile features to improve data security, privacy, standards compliance and productivity, Akku is an Identity & Access Management (IAM) solution that truly puts you in control of your cloud.

    Server Guard is a host security software system. It provides functions such as host vulnerability detection, baseline check, virus scan and removal, and unified asset management

    Appthority offers a comprehensive mobile threat protection to detect, eliminate and prevent mobile risks to enterprise data and privacy.

    Armor Complete enables security and compliance for sensitive workloads.

    Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.

    Threat detection and prevention through advanced cloud security

    Secure Storage Container in the Cloud Blukrypt, secure storage container that works in tandem with Parablu’s data management solutions. It provides additional layer of security to the enterprise data in the cloud. With BlyKrypt deployed, data traverses the cloud fully encrypted, battened further by total obfuscation and clear segregation of duties.

    CensorNet Cloud Application Control is a cloud security solution that supports the secure adoption of cloud services and applications in any organization.

    Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security

    When data leaves the corporate network, most organizations lose track of where it goes and who has access. ManagedMethods’ Cloud Access Monitor provides visibility and control of cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, Box, Dropbox, Slack, and many others. Cloud Access Monitor also scans Gmail and Office 365 Mail for malware, phishing schemes, and sensitive or objectionable content. Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

    With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.

    Proofpoint Cloud App Security Broker (PCASB) helps you secure applications such as Microsoft Office 365, Googles G Suite, Box, and more.

    The CloudCheckr Cloud Management Platform (CMP) offers a single pane of glass view to help modern enterprises manage and optimize their public cloud. DevOps, SecOps, and FinOps teams from hundreds of global enterprises and service providers rely on CloudCheckr to manage their Azure, AWS, and Google Cloud investments so they can quickly optimize spend, eliminate waste, and improve security and compliance throughout their cloud journey. CloudCheckr enables users to save money, time, and effort to increase operational efficiencies with automated actions for your cloud. Manage your expenses with cost allocation, spend optimization, invoicing and chargebacks. Use custom reports and alerts ensure governance and accountability as your environments scale. The CloudCheckr CMP provides total visibility across your cloud infrastructure and enables protection for state and activity monitoring, turning insight to action while meeting compliance demands. Manage your assets with cross-account dashboards that provide sophisticated reporting for enterprise-wide inventory based on tags, geography, function and more to proactively optimize workloads. Review summary and detailed usage statistics for resources across AWS, Azure, and Google Cloud, offering actionable intelligence to right-size and scale services efficiently.

    CloudEye is a security and compliance management solution, designed to continuously secure cloud services and automate compliance.

    CloudGuard IaaS virtualization security (vSEC) for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.

    CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds.

    Cloud Protection Manager is a cloud-native backup tool built specifically for AWS and designed to allow users to recover any file (or entire workload) in 30 seconds.

    CloudSploit provide a software for security and configuration scanner that can detect threats in AWS account. offers cloud infrastructure security providing a cloud-native SaaS solution that automates security processes and compliance.

    Protecting Patient Privacy in Electronic Health Records

    Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.

    Forcepoint CASB is a cloud access security broker that provides visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use.

    The global management console provides single point-of-control of multi-PoliWall TIG architecture--whether TIG is on premise, on a virtual machine, or in the cloud.

    Apigee Sense works in conjunction with the Apigee Edge API Management Platform to give API teams a powerful weapon to protect APIs from attacks

    Cloud Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss. It offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.

    Single, converged platform that provides critical controls for hybrid clouds across any environment.

    The Trend Micro Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.

    CloudControl helps you protect your virtual infrastructure with authentication, authorization and auditing. Better visibility and control simplify compliance and accelerate further virtualization

    Whether you are running VMs in a private cloud powered by vSphere or a public clouds like IBM Softlayer, Microsoft Azure, vCloud Air or AWS, HyTrust DataControl provides strong encryption for virtual machines in any cloud, along with easy to deploy key management YOU control.

    Activity Tracker records events, compliant with CADF standard, triggered by user-initiated activities that change the state of a service in the cloud. See, manage, and analyze your cloud actions.

    IBM Application Security on Cloud helps secure your organization's Web and mobile applications, by detecting dozens of today's most pervasive published security vulnerabilities. IBM Application Security on Cloud helps to eliminate vulnerabilities from applications before they are placed into production and deployed. Convenient, detailed reporting permits you to effectively address application security risk, enabling application users to benefit from a more secure experience. IBM Open Source Analyzer helps to secure and manage your open source components, by automating security testing and configuring scanning for open source.

    The Secure Gateway Service provides a quick, easy, and secure solution to connect anything to anything. The solution provides a persistent connection between on-premises or third party cloud environments and the IBM Cloud.

    Networks Allow the Lateral Spread of Threats. Adaptive Segmentation Stops Them

    inWebo is a SaaS provider of Identity Protection & two-factor Authentication built to secure access to VPN, web sites, Mobile and Cloud Apps.

    Lacework is a cloud workload security platform designed to enable instant breach detection and simplified investigations.

    Use Meta's Network-as-a-Service to rapidly connect people, applications, clouds and sites, and secure them with a software-defined perimeter. As the first user-centric network and security platform, the Meta NaaS leverages a dense, cloud-native global backbone to deliver always-on security and the high-performance, anytime/anywhere connectivity that employees have come to expect. Whether you are a cloud-native organization or taking your first steps into cloud-based networking, the Meta NaaS provides the security, flexibility and user experience you need.

    Perimeter 81 is the ultimate secure network access service for your business. Say goodbye to costly VPN hardware and hours of manual configuration, and instantly grant your team secure access to critical company resources based on-premise, on the web or in the cloud. With Perimeter 81 you can easily deploy private servers with static IPs, manage team member access and gain unparalleled network visibility with an all-in-one cloud management portal. Plus, with single-click apps for every device, 256-bit bank-level encryption and our unique Automatic Wi-Fi Security feature, you can enjoy complete peace of mind online knowing that your team is always working securely – even while on the go.

    Protegrity Cloud Security Gateway is a cloud security solution that protects data before it gets to the cloud.

    Saviynt is a leader in Cloud & Enterprise Access Governance & Intelligence solutions. Saviynt secures critical data, apps & infrastructure in a single platform for Cloud (AWS, Azure, Office 365, SFDC…) & Enterprise (SAP, Epic, Oracle EBS, Workday...). Saviynt Security Manager combines traditional identity management with preventive security controls, privilege governance & behavior analytics to deliver next generation IGA for internal & external users. In addition, Saviynt has the unique ability to manage entitlements at the fine-grained level, guided by usage and behavior analytics to deliver a robust and intelligent access request and certification solution.

    SecOps Policy Service embeds compliance and security testing into service delivery and cloud operations, and automates remediation, to improve governance and reduce risk.

    Trend Micr ServerProtect for Storage simplifies network storage protection with automatic, incremental security updates.

    Skyport delivers a secure platform to run the most critical applications. It offers cloud agility with on-site control, simplified management and secure to the core.

    Spinbackup for Business: Cloud Cybersecurity & Cloud-to-Cloud Backup for Google Apps. Spinbackup safeguards Google Apps data against leak and loss disasters by identifying business risks and security threats. Visit our page at Google Apps Marketplace -

    SpyCloud helps businesses of all sizes prevent data breaches and account takeover attacks by alerting when employee or company assets have been compromised.

    SSH PrivX allows you to scale securely at the speed of the cloud.

    Confidently use cloud apps and services while staying safe, secure and compliant. Get visibility, data security, and threat protection for sanctioned and shadow SaaS, PaaS, and IaaS accounts with the solution named a Leader by Gartner and Forrester.

    Automates security for public and hybrid cloud workloads and scans AWS S3 buckets for malware, enabling business agility and DevSecOps workflows for enterprises

    Management Center provides a unified management environment for the Symantec Security Platform portfolio of products. Management Center brings Symantec's network, security, and cloud technologies to you under a single umbrella making it easier to deploy, manage, and monitor your security environment.

    Secure your data and users in Google G suite, Microsoft Office 365 from phishing, breaches, restore data lost to user error and ransomware.

    Proofpoint Targeted Attack Protection SaaS Defense safeguards your organization against hidden threats in cloud-based file-storage apps.

    Teradici Cloud Access Software is a software that gives user the power to deliver rich, cloud-based, user experiences across all network conditions to seamlessly migrate new and legacy applications to any cloud.

    ThisData quickly detects Account Takeover (ATO) attacks by using anomaly detection and machine learning, combined with contextual information like device, location and behavior, to verify the identity of a user logging in.

    The Vaultive Cloud Security Platform applies a broad collection of cloud security capabilities to protect sensitive data in IT-sanctioned cloud applications.

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Votiro Disarmer for Content Collaboration Platforms provides a necessary security layer to ensure all shared files do not contain zero-day threats, preventing targeted content attacks such as ransomware and phishing. Once deployed, every file uploaded to the cloud repository goes through the CDR sanitization process.

    Zentera Systems offers Zentera CoIP (Cloud over IP), a network security platform for the cloud ecosystem.

    Zscaler Cloud Sandbox provides zero-day cloud protection for users in all locations.

    Kate from G2 Crowd

    Learning about Cloud Security?

    I can help.