Cloud Computing Security Software

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
Druva Data Resiliency Cloud

Druva Data Resiliency Cloud Workforce mobility and the rise of cloud services is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate…

2
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

3
CrowdStrike Falcon

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment…

4
Qualys TruRisk Platform

Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and…

5
FireMon

FireMon is a real-time security policy management solution built for today’s complex multi-vendor, enterprise environments. Supporting the latest firewall and policy enforcement technologies spanning on-premises networks to the cloud, FireMon delivers visibility and control across…

All Products

(1-25 of 191)

1
AlienVault USM

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises…

2
Druva Data Resiliency Cloud

Druva Data Resiliency Cloud Workforce mobility and the rise of cloud services is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate…

Learn More
3
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

Explore recently added products

4
CrowdStrike Falcon

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment…

5
FireMon

FireMon is a real-time security policy management solution built for today’s complex multi-vendor, enterprise environments. Supporting the latest firewall and policy enforcement technologies spanning on-premises networks to the cloud, FireMon delivers visibility and control across…

6
Microsoft Defender for Cloud

Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.

7
Qualys TruRisk Platform

Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and…

8
Zscaler Internet Access

Zscaler Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure web gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize…

9
Armor

Armor is a cloud and mobile security solution. The vendor’s value proposition is that this solution was purpose-built to deliver the highest level of defense and control for an organization’s critical data, no matter where it’s hosted. The vendor says they are so confident in the…

10
Kaspersky Endpoint Security Cloud

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online,…

11
AlienVault OSSIM

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing:…

12
Acronis Cyber Protect Cloud

Acronis Cyber Protect Cloud combines data backup with AI-based anti-malware, antivirus, and endpoint protection management in one solution. Acronis Cyber Protect Cloud also provides integrations and automation functionality to service providers with the aim of reducing complex technical…

13
Kaspersky Hybrid Cloud Security

Kaspersky Hybrid Cloud Security provides cloud-native protection for hybrid environments.

14
Lacework

Lacework is a cloud-native application protection platform offered as-a-Service; delivering build-time to run-time threat detection, behavioral anomaly detection, and cloud compliance across multicloud environments, workloads, containers, and Kubernetes.

15
Check Point CloudGuard Posture Management

CloudGuard Posture Management provides cloud security and compliance posture management for cloud-native environments, including AWS, Azure, Google Cloud, and Kubernetes. CloudGuard automates security, governance and compliance, with customized policies, delivering high-fidelity…

16
Palo Alto Networks Prisma Cloud

Prisma Cloud, from Palo Alto Networks (based on technology acquired with Evident.io, or the Evident Security Platform) is presented as a comprehensive Cloud Native Security Platform (CNSP) that delivers full lifecycle security and full stack protection for multi- and hybrid-cloud…

17
Skybox Security

Skybox Security offers vulnerability and threat management solutions.

18
Tufin Orchestration Suite

Israeli company Tufin offers a firewall security management offering via the Tufin Orchestration Suite, including SecureApp for managing network connectivity, SecureChange network change automation, and SecureTrack multi-vendor and next-generation firewall management.

19
Trend Micro Cloud One - Workload Security

Trend Micro Cloud One Workload Security (formerly Deep Security) is cloud security software suite, from Trend Micro, for hybrid cloud environments and virtualization security.

20
AWS Control Tower

The vendor presents AWS Control Tower as the easiest way to set up and govern a new, secure multi-account AWS environment. With AWS Control Tower, builders can provision new AWS accounts in a few clicks, while knowing new accounts conform to company-wide policies.

21
AWS CloudTrail

AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of an AWS account. With CloudTrail, users can log, continuously monitor, and retain account activity related to actions across AWS infrastructure. CloudTrail provides event history…

22
Netskope CASB

Netskope cloud access security broker (CASB) enables the user to identify and manage the use of cloud applications, regardless of whether they are managed or unmanaged, and prevents sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals…

23
Spot by NetApp

Spot by NetApp, now including CloudCheckr, helps companies to run their cloud investments. The Spot product suite uses machine learning and analytics to automate and optimize cloud infrastructure, to ensure that workloads and applications always have the best possible infrastructure…

24
Forcepoint CASB

Forcepoint CASB promises to help eliminate security and compliance blindspots by providing visibility into users' devices and cloud apps. The vendor promises the following benefits: Discover and risk-prioritize all unsanctioned cloud use (Shadow IT) to quickly and easily determine…

25
Morphisec

Morphisec, headquartered in Boston, provides advanced security solutions for midsize to small enterprises around the globe. They aim to simplify security and can automatically block modern attacks from the endpoint to the cloud. Contrasted with security solutions that rely on human…

Videos for Cloud Computing Security Software

What Is Cloud Computing? | Cloud Computing Explained
06:24
Cloud computing is a popular practice involving the internet to store and manage your data on the internet. In this video on cloud computing, week we'll take you through all of the basic concepts of cloud computing like what makes it unique, its different models, and more.

Cloud Computing Security Software TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Cloud Computing Security Software

What is Cloud Computing Security?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance. Also known as cloud data security, this software protects data and applications in a cloud infrastructure. It provides features like malware identification, risk assessment, and threat management.

Cloud computing security software can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. These security systems safeguard sensitive information in the event of malware or cyberattack. It can also help avoid server crashes during high traffic periods by controlling capacity.

Common features found in cloud computing security software are encryption and sandboxing. Encryption scrambles data so it cannot be read without the correct key. Conversely, sandboxing isolates risky files from critical ones to prevent potential damage. Disaster recovery is also a key component of security to recover lost or stolen data.

Many solutions offer virtual machine protection and configuration control for endpoint devices such as laptops and desktops. This security feature controls what users can do after logging into the system remotely.

Cloud computing security software also increases cloud security through the cloud access security broker (CASB), a cloud service software that checks network traffic for risks and vulnerabilities. This cloud technology offers authentication and authorization, encryption, web reputation services, and vulnerability scanning features.

Cloud Computing Security Features

Cloud computing security often includes the following features:

  • Automation and optimization
  • Backup protection
  • Cloud management security
  • Cost management
  • Cloud management performance monitoring
  • Custom dashboards and workspaces
  • Disaster recovery
  • Endpoint detection and response (EDR)
  • Firewalls and access control
  • Governance, compliance, and reporting
  • Malware detection
  • Infection remediation
  • Real-time encryption
  • Resource management
  • Risk analysis

Cloud Computing Security Comparison

Consider these factors when comparing cloud computing security products:

  • Use Case: It is critical to consider the level of security needed when purchasing cloud computing security solutions. Providers should comply with an information security framework such as ISO 27001. Are the cloud architecture, standards, and services offered appropriate for your workloads and management priorities? Consider specific regulatory requirements of the jurisdictions where cloud systems ultimately reside.
  • Features: Check into features such as backup protection and data recovery and how quickly these can be implemented should there be a need. Consider which features are most important to securing the specific cloud systems within your organization.

Start a cloud computing security product comparison here

Pricing Information

Cloud computing security software for business varies significantly in price depending on capabilities and scalability. Some entry-level products offer a free service tier. Other options begin at $7 per endpoint/month.

Enterprise-level plans range from $1,000/month - $5,000/year per application secured. In addition, there are high costs in hiring the right engineers to build and operate these systems. Most vendors do not provide pricing details but do offer custom quotes.

Related Categories

Frequently Asked Questions

What does cloud computing security do?

Cloud computing security software provides data security and regulatory compliance for data in the cloud infrastructure. It can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. Standard features found in cloud computing security software are encryption, sandboxing, and data recovery.

What are the benefits of using cloud computing security?

Cloud computing security software protects against malware, DDoS, and other cyberattacks in the cloud. It can also help avoid server crashes during high traffic periods. Cloud computing security allows companies to cost-effectively and quickly become, and remain, in compliance.

How much does cloud computing security cost?

Cloud computing security software for business varies greatly. Some entry-level products offer a free service tier. Other entry-level options begin at $7 per endpoint/month. Enterprise-level plans range from $1,000/month - $5,000/year per application secured.