Best Cloud Computing Security Software47AlienVault USM1https://media.trustradius.com/product-logos/LF/Ap/TPOL9A2198T5-180x180.JPEGForcepoint Web Security2https://media.trustradius.com/vendor-logos/fC/ym/ZG6BNROAG4PC-180x180.PNGArmor3https://media.trustradius.com/product-logos/LW/ZJ/KIIZMUXR2TEL-180x180.PNGRencore4https://media.trustradius.com/product-logos/SN/4f/J2TG9D60R6BR-180x180.PNGAlienVault OSSIM5https://media.trustradius.com/vendor-logos/Sv/TO/0HHS1EUA42K7-180x180.JPEGSkybox Security6https://media.trustradius.com/product-logos/Gs/zR/XU1660ZPG60R-180x180.PNGCloudGuard Dome97https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGTrend Micro Deep Security for the Hybrid Cloud8https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGCisco TrustSec9https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGCheck Point CloudGuard10https://media.trustradius.com/vendor-logos/Tb/vB/CDDG6MZOH6BI-180x180.JPEGForcepoint CASB11https://media.trustradius.com/product-logos/2B/Gd/MFTQGQ31PP0N-180x180.JPEGAlert Logic Cloud Insight Essentials12https://media.trustradius.com/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGCloudEntr13https://media.trustradius.com/product-logos/vW/kz/HUQHASFEBO6H-180x180.JPEGKairos14https://media.trustradius.com/vendor-logos/6P/ox/O0GX5OL3XL65-180x180.PNGCloudPassage Halo15https://media.trustradius.com/product-logos/EH/ET/E200L13UF7J7.pngIllumio Adaptive Security Platform16https://media.trustradius.com/vendor-logos/Tb/Gz/VK2LF6OS7S2A-180x180.JPEGBitglass17https://media.trustradius.com/product-logos/Y6/ZZ/6FUJS88O53PB-180x180.PNGCipherpoint cp.Protect18https://media.trustradius.com/product-logos/h7/sp/K5W4F3MKL7WP-180x180.JPEGThreat Stack19https://media.trustradius.com/product-logos/If/V5/FTADF28DHPLZ.pngSoha20https://media.trustradius.com/product-logos/TZ/ko/H5VWJ82RETST.jpegCipherCloud21https://media.trustradius.com/product-logos/LN/2B/8L06XNR8ZD0J.jpegPalo Alto Networks Prisma Public Cloud (formerly Evident.io)22https://media.trustradius.com/vendor-logos/MK/NG/UKHCVB1FA0XT-180x180.PNGnCrypted Cloud23https://media.trustradius.com/product-logos/SS/uE/4UD3RZ85OPKZ.jpegApperian24https://media.trustradius.com/vendor-logos/tc/M7/6BCP6UODKM4A-180x180.JPEGFortyCloud25https://media.trustradius.com/product-logos/QS/EI/RWES5PJETP6D.png

Cloud Computing Security Software

Best Cloud Computing Security Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 5 or more ratings to appear on this TrustMap.

Cloud Computing Security Software Overview

What is Cloud Computing Security Software?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance and protect information, data applications and infrastructure associated with cloud computing.

How it Differs from Traditional Security

Providers of cloud computing technology such as Software-as-a-Service or Infrastructure-as-a-Service, or Platform-as-a-Service have a responsibility to protect their customers' data through stringent security measures.


Cloud computing technology resources are shared among very large numbers of customers and, for this reason, questions of access control, privacy, data security, data protection, and business continuity and backup are paramount.


All cloud computing providers must provide a base level of security to mitigate these concerns to ensure that customers are in compliance with all relevant regulations.


However, end users of these resources also have responsibility for ensuring that measures are taken to protect their applications through the use of strong passwords and authentication measures.

Pricing Information

Cloud computing security software for business varies greatly in price depending on capabilities and scalability. Enterprise level products may cost as much as $5,000 per year per application secured. In addition, there are significant costs in hiring the right engineers to build and operate these systems.

Cloud Computing Security Products

Listings (1-25 of 65)

AlienVault USM

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
Top Rated
633 Ratings

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments, inclu…

Forcepoint Web Security

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
90 Ratings

Austin-based company Forcepoint (formerly Websense) offers Forcepoint Web Security, a cloud security platform.

26 Ratings

Armor is a cloud and mobile security solution. The vendor’s value proposition is that this solution was purpose-built to deliver the highest level of defense and control for an organization’s critical data, no matter where it’s hosted. The vendor says they are so confident in the ability of their so…

17 Ratings

Many organizations that use Office 365 are exposed to security risks that they are unaware of. As they extend SharePoint to meet their business needs, they build applications using technologies that range from end-user Microsoft Flow to developer-focused SharePoint Framework. Unfortunately, all of t…

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset discov…

Dome9 was acquired by Check Point Software Technologies in late 2018. Their product CloudGuard Dome9 is a cloud security and cloud security operations visualization tool, providing governance of cloud configuration and prevent identity theft, among other capabilities.

Forcepoint CASB promises to help eliminate security and compliance blindspots by providing visibility into users' devices and cloud apps. The vendor promises the following benefits: Discover and risk-prioritize all unsanctioned cloud use (Shadow IT) to quickly and easily determine if applications m…

Alert Logic Cloud Insight Essentials is an Amazon Web Services (AWS)-native security service that continuously discovers and assesses AWS workloads and EC2 instances for vulnerabilities and misconfigurations that don’t follow AWS Security Best Practices. When integrated with Amazon GuardDuty, Cloud …

We don't have enough ratings and reviews to provide an overall score.

CloudEntr gives businesses one secure place to manage access to all their cloud applications, on any device. IT gets control over who gets access to which applications, and employees only have a single password to remember to access all their applications. CloudEntr provides single sign-on, password…

We don't have enough ratings and reviews to provide an overall score.

Kairos allows developers and organisations to build and scale world-class facial recognition into their applications and services.

We don't have enough ratings and reviews to provide an overall score.

The Illumio Adaptive Security Platform (ASP), from Illumio in Sunnyvale, is designed to help users prevent the spread of breaches and achieve regulatory compliance through real-time application dependency mapping and micro-segmentation that works in any data center and cloud environment (Azure, AWS,…

We don't have enough ratings and reviews to provide an overall score.

Bitglass secure corporate data on mobile devices and tracks sensitive documents on the Internet.

We don't have enough ratings and reviews to provide an overall score.

Threat Stack is a cloud security option from the company of the same name in Boston, Massachusetts, providing vulnerability assessments of cloud assets, container security, and other features.

We don't have enough ratings and reviews to provide an overall score.

Soha, from Soha Systems, is a cloud security option.

We don't have enough ratings and reviews to provide an overall score.

CipherCloud is a cloud security option from the company of the same name in San Jose, California.

We don't have enough ratings and reviews to provide an overall score.

Prisma Public Cloud (formerly Evident.io) is a cloud security option from Palo Alto Networks. The former Evident Security Platform is dedicated to reducing attack surface and checking for vulnerabilities against known or custom signatures of threats and provides daily risk reports, and also detects …

We don't have enough ratings and reviews to provide an overall score.

nCrypted Cloud is a cloud security option from the company of the same name in Boston, Massachusetts.

We don't have enough ratings and reviews to provide an overall score.

Apperian is a mobile application security and management platform acquired by Arxan Technologies in January 2017.

We don't have enough ratings and reviews to provide an overall score.

FortyCloud is a cloud security option from the company of the same name.