Best Cloud Computing Security Software47AlienVault USM1https://media.trustradius.com/product-logos/LF/Ap/TPOL9A2198T5-180x180.JPEGForcepoint Web Security2https://media.trustradius.com/product-logos/Fs/Q1/8A2PACKTX2QK-180x180.JPEGArmor3https://media.trustradius.com/product-logos/LW/ZJ/KIIZMUXR2TEL-180x180.PNGRencore4https://media.trustradius.com/product-logos/SN/4f/J2TG9D60R6BR-180x180.PNGAlienVault OSSIM5https://media.trustradius.com/vendor-logos/Sv/TO/0HHS1EUA42K7-180x180.JPEGSkybox Security6https://media.trustradius.com/product-logos/Gs/zR/XU1660ZPG60R-180x180.PNGTrend Micro Deep Security for the Hybrid Cloud7https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGCloudGuard Dome98https://media.trustradius.com/vendor-logos/N5/Pq/9GTB1XOCNWCX.pngCisco TrustSec9https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGAlert Logic Cloud Insight10https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGForcepoint CASB11https://media.trustradius.com/product-logos/2B/Gd/MFTQGQ31PP0N-180x180.JPEGCloudEntr12https://media.trustradius.com/product-logos/vW/kz/HUQHASFEBO6H-180x180.JPEGKairos13https://media.trustradius.com/vendor-logos/6P/ox/O0GX5OL3XL65-180x180.PNGCloudPassage Halo14https://media.trustradius.com/product-logos/EH/ET/E200L13UF7J7.pngIllumio Adaptive Security Platform15https://media.trustradius.com/product-logos/ow/JI/X78M7GLWTEDG.pngBitglass16https://media.trustradius.com/product-logos/Y6/ZZ/6FUJS88O53PB-180x180.PNGPalo Alto Networks Prisma Public Cloud (formerly Evident.io)17https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGCovata Platform18https://media.trustradius.com/product-logos/Co/Hp/7UMMIWSUMMXB.jpegThreat Stack19https://media.trustradius.com/product-logos/If/V5/FTADF28DHPLZ.pngFortyCloud20https://media.trustradius.com/product-logos/QS/EI/RWES5PJETP6D.pngSoha21https://media.trustradius.com/product-logos/TZ/ko/H5VWJ82RETST.jpegApperian22https://media.trustradius.com/vendor-logos/tc/M7/6BCP6UODKM4A-180x180.JPEGCipherCloud23https://media.trustradius.com/product-logos/LN/2B/8L06XNR8ZD0J.jpegnCrypted Cloud24https://media.trustradius.com/product-logos/SS/uE/4UD3RZ85OPKZ.jpegBluKrypt25https://media.trustradius.com/product-logos/HA/3n/BVO3L99W4AA7-180x180.PNG

Cloud Computing Security Software

Best Cloud Computing Security Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 5 or more ratings to appear on this TrustMap.

Cloud Computing Security Software Overview

What is Cloud Computing Security Software?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance and protect information, data applications and infrastructure associated with cloud computing.

How it Differs from Traditional Security

Providers of cloud computing technology such as Software-as-a-Service or Infrastructure-as-a-Service, or Platform-as-a-Service have a responsibility to protect their customers' data through stringent security measures.


Cloud computing technology resources are shared among very large numbers of customers and, for this reason, questions of access control, privacy, data security, data protection, and business continuity and backup are paramount.


All cloud computing providers must provide a base level of security to mitigate these concerns to ensure that customers are in compliance with all relevant regulations.


However, end users of these resources also have responsibility for ensuring that measures are taken to protect their applications through the use of strong passwords and authentication measures.

Pricing Information

Cloud computing security software for business varies greatly in price depending on capabilities and scalability. Enterprise level products may cost as much as $5,000 per year per application secured. In addition, there are significant costs in hiring the right engineers to build and operate these systems.

Cloud Computing Security Products

Listings (1-25 of 61)

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
582 Ratings

Security management can be a complex, time-consuming, and expensive undertaking for all organizations, but especially for those with limited security resources, time, and budget. But it doesn’t have to be. We founded AlienVault to help organizations of all sizes achieve the same threat detection ...

26 Ratings

As the first Totally Secure cloud company we set the standard for preventing data breaches in the cloud. By uniquely combining highly experienced security talent with best-of-breed security technologies, we share your data security and compliance burdens. This is why we boast a dwell time 100x sh...

15 Ratings

Many organizations that use Office 365 are exposed to security risks that they are unaware of. As they extend SharePoint to meet their business needs, they build applications using technologies that range from end-user Microsoft Flow to developer-focused SharePoint Framework. Unfortunately, all o...

Security management can be a complex, time-consuming, and expensive undertaking for all organizations, but especially for those with limited security resources, time, and budget. But it doesn’t have to be. We founded AlienVault to help organizations of all sizes achieve the same threat detection ...

Dome9 was acquired by Check Point Software Technologies in late 2018. Their product CloudGuard Dome9 is a cloud security and cloud security operations visualization tool, providing governance of cloud configuration and prevent identity theft, among other capabilities.

14 Ratings

Cisco (NASDAQ: CSCO) enables people to make powerful connections-whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible-providing easy access to information anywhere, at any...

Harnessing the best defense for your critical data and IP: your people. Purpose-built and ready to protect, Forcepoint is driven by an understanding of human behavior and intent. Our innovative technology, decades of experience and clear vision help solve critical security issues to protect emplo...

We don't have enough ratings and reviews to provide an overall score.

CloudEntr gives businesses one secure place to manage access to all their cloud applications, on any device. IT gets control over who gets access to which applications, and employees only have a single password to remember to access all their applications. CloudEntr provides single sign-on, passw...

We don't have enough ratings and reviews to provide an overall score.

Kairos allows developers and organisations to build and scale world-class facial recognition into their applications and services.

We don't have enough ratings and reviews to provide an overall score.

Bitglass secure corporate data on mobile devices and tracks sensitive documents on the Internet.

We don't have enough ratings and reviews to provide an overall score.

Prisma Public Cloud (formerly Evident.io) is a cloud security option from Palo Alto Networks. The former Evident Security Platform is dedicated to reducing attack surface and checking for vulnerabilities against known or custom signatures of threats and provides daily risk reports, and also detec...

We don't have enough ratings and reviews to provide an overall score.

The Covata Platform from the company of the same name in Reston, Virginia is a cloud security offering.

We don't have enough ratings and reviews to provide an overall score.

Threat Stack is a cloud security option from the company of the same name in Boston, Massachusetts, providing vulnerability assessments of cloud assets, container security, and other features.

We don't have enough ratings and reviews to provide an overall score.

FortyCloud is a cloud security option from the company of the same name.

We don't have enough ratings and reviews to provide an overall score.

Soha, from Soha Systems, is a cloud security option.

We don't have enough ratings and reviews to provide an overall score.

Apperian is a mobile application security and management platform acquired by Arxan Technologies in January 2017.

We don't have enough ratings and reviews to provide an overall score.

CipherCloud is a cloud security option from the company of the same name in San Jose, California.

We don't have enough ratings and reviews to provide an overall score.

nCrypted Cloud is a cloud security option from the company of the same name in Boston, Massachusetts.

We don't have enough ratings and reviews to provide an overall score.

Parablu in Burlingame, California offers BluKrypt, a cloud access security broker.