Cloud Computing Security Software

Best Cloud Computing Security Software include:

Forcepoint Web Security.

Cloud Computing Security Software TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 5 or more ratings to appear on this TrustMap.

Cloud Computing Security Software Overview

What is Cloud Computing Security Software?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance and protect information, data applications and infrastructure associated with cloud computing.

How it Differs from Traditional Security

Providers of cloud computing technology such as Software-as-a-Service or Infrastructure-as-a-Service, or Platform-as-a-Service have a responsibility to protect their customers' data through stringent security measures.


Cloud computing technology resources are shared among very large numbers of customers and, for this reason, questions of access control, privacy, data security, data protection, and business continuity and backup are paramount.


All cloud computing providers must provide a base level of security to mitigate these concerns to ensure that customers are in compliance with all relevant regulations.


However, end users of these resources also have responsibility for ensuring that measures are taken to protect their applications through the use of strong passwords and authentication measures.

Pricing Information

Cloud computing security software for business varies greatly in price depending on capabilities and scalability. Enterprise level products may cost as much as $5,000 per year per application secured. In addition, there are significant costs in hiring the right engineers to build and operate these systems.

Cloud Computing Security Products

(1-25 of 68) Sorted by Most Reviews

Telos Ghost
Telos Corporation acquired Armored Cloud in 2015 and now offers it as Telos Ghost, a security platform emphasizing user anonymity and undetectability in cloud access and activity as its means of providing protection to security threats related to user activity.
SanerNow
A platform of Tools for endpoint security and systems management needs. Saner Platform queries systems to find aberrations, and helps systems to retain normality. SanerNow has six different tools that are listed below Vulnerability Management (VM)Patch Management (PM)Asset Management (AM)Compliance …
Outpost24 Elastic Workload Protector
Elastic Workload Protector, or EWP, is a cloud analytics and security solution from Outpost24, after the company's acquisition of SecludIT The solution integrates a vulnerability scanner Ensures continuous security by scanning, detecting risks, notifying the company and proposing actionnable remedi…
Infocyte HUNT
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and p…
Proofpoint Cloud Account Defense (PCAD)
Proofpoint Cloud Account Defense (PCAD) is a cloud-based file security option which detects compromised Office 365 accounts using threat intelligence and contextual data.
JupiterOne
JupiterOne promises to: Accelerate compliance and certification audits such as HITRUST, SOC2, PCI, ISO27001 and NIST by assisting companies in creating their security policies, processes and controls as well as easily producing evidence for controls. Automate security instrumentation and orchestrati…
CMIT Secure
Austin-based CMIT Solutions offers CMIT Secure, a layered cybersecurity product bundling the company's flagship products with access blocking and control, SIEM, threat assessment and consultation, DNS filtering, and intelligent firewall, to protect enterprise cloud resources and applications.
Booz Allen Virtual Cloud Defense
Booz Allen Hamilton now offers their Virtual Cloud Defense cybersecurity suite for enterprise cloud, providing a range of advanced services including DoD risk management, end point protection and situational awareness, IAM, and available consulting services from Booz Allen Cyber.
DxOdyssey
DxOdyssey is lightweight software that enables you to create highly available application-level micro-tunnels from any host, to any host, anywhere – across any mix of platforms. The vendor aims to do so more easily, more securely, and more discreetly than any other solution on the market. Using DxOd…
Hornetsecurity 365 Total Protection
With 365 Total Protection, Hornetsecurity offers users a comprehensive package for enterprise security management in conjunction with Microsoft Office 365. The Enterprise version gives users enhanced functionality and protection, and covers legally compliant email archiving with advanced features su…
Securonix SNYPR Cloud Platform
The Secoronix SNYPR Cloud Platform is the Addison-based company's security platform for securing access and monitoring activity in a hybrid cloud activity, providing data ingestion and control for hybrid on-premise and cloud infrastructure enterprise environments.
Symantec Cloud Workload Protection
Symantec provides cloud security via the Symantec Cloud Workload Protection application, providing auto-discovery and vulnerability protection of cloud applications and services.
Check Point Infinity
Check Point Software Technologies provides Check Point Infinity, a subscription based comprehensive enterprise security product suite combining network, cloud and endpoint security applications integrated into a single service priced on a per person basis.
SonicWall Cloud App Security
SonicWall Cloud App Security protects applications, in tandem with SonicWall NGFW or other security devices.
Ixia BreakingPoint Cloud
BreakingPoint Cloud is a cloud DDoS protection security option, from Keysight Technologies brand Ixia.
Kaspersky Hybrid Cloud Security
Kaspersky Labs provides edge-to-edge security for cloud apps and resources stored on cloud, and virtual resources, via the Kaspersky Hybrid Cloud Security application.
Sophos Cloud Optix
Sophos Cloud Optix is a security product designed to protect cloud apps and services used across the enterprise.
Avira URL Safety Cloud
Avira says their web reputation intelligence is key to ensuring their customers remain safe from malicious content on the websites they access.The AUSC identifies unsafe and malicious web resources for developers and vendors of security solutions. The ability to simply integrate web reputation into …
Azure Security Center
Microsoft Azure Security Center provides unified security management and advanced threat protection for hybrid cloud workloads.
BMC Helix Cloud Security (formerly TrueSight Cloud Security)
Designed for the cloud, in the cloud, BMC Helix Cloud Security (formerly TrueSight Cloud Security) is designed to take the pain out of security and compliance for cloud resources and containers. The product provides cloud security scoring and remediation for public cloud services from Amazon Web Ser…
McAfee Cloud Workload Security
McAfee Cloud Workload Security provides provides data visibility, data loss prevention, and advanced threat protection, and is designed to make the cloud the most secure environment for business. The product provides direct integration with AWS, Microsoft Azure, and VMware environments and provides …
Kindite
Kindite in Tel Aviv offers their eponymous cloud security platform that eliminates cloud-based data exposure risks by creating a zero-trust relationship with any cloud infrastructure. Kindite is designed to ensure encryption keys never leave the user's domain, while performing end-to-end encryption …
McAfee MVISION ePO
McAfee MVISION ePolicy Orchestrator (McAfee MVISION ePO) is designed to eliminate the need for maintenance of an on-premises security infrastructure, allowing the security professional to focus exclusively on security. With it, users can manage enterprise security from a browser.
Unbound Key Control
Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solution manages all keys from all on-premises or cloud workloads and from any cloud service provider (CS…
Barracuda CloudGen WAF
The Barracuda CloudGen WAF blocks application layer DDoS and other attack vectors directed at web-facing applications hosted in Amazon Web Services or Azure, while providing protection against data loss. It also has strong authentication and access control capabilities for restricting access to sens…