Cloud Computing Security Software

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
Druva Data Resiliency Cloud

Druva Data Resiliency Cloud Workforce mobility and the rise of cloud services is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate…

2
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

3
CrowdStrike Falcon

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment…

4
Qualys TruRisk Platform

Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and…

5
FireMon

FireMon is a real-time security policy management solution built for today’s complex multi-vendor, enterprise environments. Supporting the latest firewall and policy enforcement technologies spanning on-premises networks to the cloud, FireMon delivers visibility and control across…

All Products

(26-50 of 191)

26
OpsCompass

OpsCompass is an enterprise-ready cloud security management software that drives multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Google Cloud Platform. Its UI is designed to provide clear data visualization for resource management, remediation,…

27
Symantec Cloud Workload Protection

Symantec provides cloud security via the Symantec Cloud Workload Protection application, providing auto-discovery and vulnerability protection of cloud applications and services.

28
Proofpoint Cloud App Security Broker (Proofpoint CASB)

Proofpoint Cloud App Security Broker (CASB) secures applications such as Microsoft Office 365, Google’s G Suite, Box, and other services, providing visibility and control over cloud apps.

Explore recently added products

29
Cybereason Defense Platform

Cybereason EDR consolidates intelligence about each attack into a Malop (malicious operation), a contextualized view of the full narrative of an attack. Each Malop organizes the relevant attack data into an easy-to-read, interactive graphical interface, providing a complete timeline,…

30
Wiz

Wiz is a Tel Aviv based, cloud risk visibility solution for enterprise security. It provides a 360° view of security risks across clouds, containers and workloads.

31
Aqua Cloud Native Security Platform

The Aqua Platform is an integrated Cloud Native Application Protection Platform (CNAPP), that prioritizes risk and automates prevention while also focussing on detection and response across the lifecycle. It aims to stop current and prevent future cloud native attacks.

32
Attivo IDEntitleX

Attivo Networks headquartered in Fremont, California, offers IDEntitleX, an Active Directory security solution. The software provides cloud identity and entitlements visibility as part of the Attivo Identity Security Offerings, reducing the attack surface and limiting exposures across…

33
RedSeal

RedSeal in Sunnyvale, California offers their cloud security and risk scoring platform to support security compliance, network vulnerability detection and prevention, and provide data and insight for incident response.

34
Vulcan Cyber

Vulcan Cyber is a vulnerability remediation orchestration platform that coordinates teams, tools and tasks to successfully eliminate exposure and risk. Vulcan Cyber does this by automating critical vulnerability management tasks. Vulcan's data collection aggregates data from scanning…

35
PingSafe

PingSafe is a Cloud Security platform with knowledge of the attackers’ modus operandi. PingSafe helps businesses across various sizes and verticals transform cloud security and eliminate all hidden and exploitable vulnerabilities at blazing-fast speed and scale. It does this by scanning…

36
Trellix Cloud Workload Security

Trellix Cloud Workload Security (formerly from McAfee) to give users a real-time view of running workloads through detecting workloads and pods. This product can integrate with both public and private cloud infrastructures.

37
Check Point CloudGuard Cloud Native Security Platform

Check Point Software Technologies offers the CloudGuard Cloud Native Security platform, a cloud security option for securing IaaS and PaaS infrastructure. The solution provides unified cloud native security for assets and workloads, to give users the confidence to automate security,…

38
Tenable Cloud Security

Tenable Cloud Security (formerly Tenable.cs) enables security teams to continuously assess the security posture of their cloud environments by maintaining a current inventory of cloud assets for proactive analysis whenever a new vulnerability is published without a user having to…

39
SonicWall Cloud App Security

SonicWall Cloud App Security protects applications, in tandem with SonicWall NGFW or other security devices.

41
Cisco Umbrella Easy Protect for MSPs

Cisco Umbrella Easy Protect is a bare-bones deployment of Cisco Umbrella that offers a baseline of security protection to MSP's customers through network DNS protection. With Easy Protect, the user adds Network identities, have customer change their router's DNS settings to use the…

42
WithSecure Cloud Protection for Salesforce

WithSecure (formerly F-Secure) Cloud Protection for Salesforce is a cloud security option protecting enterprises using Salesforce.com services.

43
Netskope Public Cloud Security

Netskope Public Cloud Security is presented by the vendor as an Advanced Cloud Security Posture Management (CSPM) solution that helps SecOps teams secure their public clouds with a combination of API and inline protection.

44
Trend Micro Cloud One - Conformity

Trend Micro Cloud One Conformity is a software solution for continuous security, compliance, and governance for a cloud infrastructure.

45
Orca Cloud Security Platform

Orca's Cloud Security Platform is an agentless cloud-native security and compliance platform that allows users to gain complete visibility and coverage into their existing AWS, Azure, and GCP setups. Orca's platform features four main components which are: SideScanning Technology,…

46
Microsoft Purview Information Protection

Microsoft Purview Information Protection (formerly Azure Information Protection) is a solution designed to enable users to better protect sensitive information. With it, users can control and secure email, documents, and sensitive data shared outside a company. From classification…

47
Prowler Pro
0 reviews

Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. ProwlerPro is built on the foundation of Prowler Open Source, and…

48
Carbide
0 reviews

Carbide (formerly Securicy) is an information security and privacy management platform based on universal best practices to enable customers to create, promote, and prove their commitment to security no matter which security framework or privacy regulation they wish to comply with.…

49
Lightspin
0 reviews

Lightspin is a cloud security solution for SaaS companies. It is agentless, and Lightspin's Cloud Native Application Protection Platform (CNAPP) prioritizes and remediates cloud security risks using its Attack Path Engine. Supporting Amazon Web Services, Google Public Cloud, Microsoft…

50
at1 Security
0 reviews

At1Security headquartered in Wayne is dedicated to providing a complete suite of professional services designed specifically with small to mid-sized business needs in mind.

Videos for Cloud Computing Security Software

What Is Cloud Computing? | Cloud Computing Explained
06:24
Cloud computing is a popular practice involving the internet to store and manage your data on the internet. In this video on cloud computing, week we'll take you through all of the basic concepts of cloud computing like what makes it unique, its different models, and more.

Cloud Computing Security Software TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Cloud Computing Security Software

What is Cloud Computing Security?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance. Also known as cloud data security, this software protects data and applications in a cloud infrastructure. It provides features like malware identification, risk assessment, and threat management.

Cloud computing security software can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. These security systems safeguard sensitive information in the event of malware or cyberattack. It can also help avoid server crashes during high traffic periods by controlling capacity.

Common features found in cloud computing security software are encryption and sandboxing. Encryption scrambles data so it cannot be read without the correct key. Conversely, sandboxing isolates risky files from critical ones to prevent potential damage. Disaster recovery is also a key component of security to recover lost or stolen data.

Many solutions offer virtual machine protection and configuration control for endpoint devices such as laptops and desktops. This security feature controls what users can do after logging into the system remotely.

Cloud computing security software also increases cloud security through the cloud access security broker (CASB), a cloud service software that checks network traffic for risks and vulnerabilities. This cloud technology offers authentication and authorization, encryption, web reputation services, and vulnerability scanning features.

Cloud Computing Security Features

Cloud computing security often includes the following features:

  • Automation and optimization
  • Backup protection
  • Cloud management security
  • Cost management
  • Cloud management performance monitoring
  • Custom dashboards and workspaces
  • Disaster recovery
  • Endpoint detection and response (EDR)
  • Firewalls and access control
  • Governance, compliance, and reporting
  • Malware detection
  • Infection remediation
  • Real-time encryption
  • Resource management
  • Risk analysis

Cloud Computing Security Comparison

Consider these factors when comparing cloud computing security products:

  • Use Case: It is critical to consider the level of security needed when purchasing cloud computing security solutions. Providers should comply with an information security framework such as ISO 27001. Are the cloud architecture, standards, and services offered appropriate for your workloads and management priorities? Consider specific regulatory requirements of the jurisdictions where cloud systems ultimately reside.
  • Features: Check into features such as backup protection and data recovery and how quickly these can be implemented should there be a need. Consider which features are most important to securing the specific cloud systems within your organization.

Start a cloud computing security product comparison here

Pricing Information

Cloud computing security software for business varies significantly in price depending on capabilities and scalability. Some entry-level products offer a free service tier. Other options begin at $7 per endpoint/month.

Enterprise-level plans range from $1,000/month - $5,000/year per application secured. In addition, there are high costs in hiring the right engineers to build and operate these systems. Most vendors do not provide pricing details but do offer custom quotes.

Related Categories

Frequently Asked Questions

What does cloud computing security do?

Cloud computing security software provides data security and regulatory compliance for data in the cloud infrastructure. It can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. Standard features found in cloud computing security software are encryption, sandboxing, and data recovery.

What are the benefits of using cloud computing security?

Cloud computing security software protects against malware, DDoS, and other cyberattacks in the cloud. It can also help avoid server crashes during high traffic periods. Cloud computing security allows companies to cost-effectively and quickly become, and remain, in compliance.

How much does cloud computing security cost?

Cloud computing security software for business varies greatly. Some entry-level products offer a free service tier. Other entry-level options begin at $7 per endpoint/month. Enterprise-level plans range from $1,000/month - $5,000/year per application secured.