Cloud Computing Security Software

TrustRadius Top Rated for 2023

Top Rated Products

(1-5 of 5)

1
Druva Data Resiliency Cloud

Druva Data Resiliency Cloud Workforce mobility and the rise of cloud services is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate…

2
Cisco Duo

Cisco Duo is a two-factor authentication system (2FA), acquired by Cisco in October 2018. It provides single sign-on (SSO) and endpoint visibility, as well as access controls and policy controlled adaptive authentication.

3
CrowdStrike Falcon

CrowdStrike offers the Falcon Endpoint Protection suite, an antivirus and endpoint protection system emphasizing threat detection, machine learning malware detection, and signature free updating. Additionally the available Falcon Spotlight module delivers vulnerability assessment…

4
Qualys TruRisk Platform

Qualys TruRisk Platform (formerly Qualys Cloud Platform, or Qualysguard), from San Francisco-based Qualys, is network security and vulnerability management software featuring app scanning and security, network device mapping and detection, vulnerability prioritization schedule and…

5
FireMon

FireMon is a real-time security policy management solution built for today’s complex multi-vendor, enterprise environments. Supporting the latest firewall and policy enforcement technologies spanning on-premises networks to the cloud, FireMon delivers visibility and control across…

All Products

(51-75 of 191)

51
at1 Security
0 reviews

At1Security headquartered in Wayne is dedicated to providing a complete suite of professional services designed specifically with small to mid-sized business needs in mind.

52
ConnectWise SaaS Security

A managed security monitoring and investigation of security incidents for Microsoft’s SaaS services such as Microsoft 365, Azure AD, and OneDrive. ConnectWise SaaS Security offers users the ability to lockdown clients’ cloud data and keep them secure. The solution also provides access…

53
Sysdig Platform Architecture

Sysdig Platform Architecture is a unified security and compliance platform for containers, Kubernetes, and cloud.

Explore recently added products

54
MeghOps
0 reviews

MeghOps is a provider of cloud security and compliance solutions. The MeghOps cloud security platform supports cloud compliance and security audits.MeghOps support businesses of all sizes in protecting their confidential information and adhering to rules and laws, and helps them…

55
Clearedin
0 reviews

Clearedin headquartered in Sunnyvale offers their Cloud Security platform to deliver 4 channels of phishing protection for popular B2B software platforms: chat, email, collaboration, and file sharing.

56
HyTrust DataControl

HyTrust DataControl secures multi-cloud workloads throughout their lifecycle. Manage workloads and encryption keys from a central location to reduce complexity, and help comply with regulations such as the GDPR. The vendor states DataControl works with leading local and public cloud…

57
Juniper Cloud Workload Protection

Juniper Cloud Workload Protection defends application workloads in any cloud or on-premises environment in and against advanced and zero-day exploits, automatically as they happen. It is designed to ensure that production applications always have a safety net against vulnerability…

58
Outpost24 Elastic Workload Protector

Elastic Workload Protector, or EWP, is a cloud analytics and security solution from Outpost24, after the company's acquisition of SecludIT The solution integrates a vulnerability scanner Ensures continuous security by scanning, detecting risks, notifying the company and proposing…

59
Infocyte HUNT
0 reviews

Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover…

60
Proofpoint Cloud Account Defense

Proofpoint Cloud Account Defense (PCAD) is a cloud-based file security option which detects compromised Office 365 accounts using threat intelligence and contextual data.

61
CMIT Secure
0 reviews

Austin-based CMIT Solutions offers CMIT Secure, a layered cybersecurity product bundling the company's flagship products with access blocking and control, SIEM, threat assessment and consultation, DNS filtering, and intelligent firewall, to protect enterprise cloud resources and…

62
Booz Allen Virtual Cloud Defense

Booz Allen Hamilton now offers their Virtual Cloud Defense cybersecurity suite for enterprise cloud, providing a range of advanced services including DoD risk management, end point protection and situational awareness, IAM, and available consulting services from Booz Allen Cyber.

63
Censornet Cloud Application Security (CASB)

Censornet Cloud Application Security (CASB) enables businesses to discover, analyse, secure and manage user interaction with cloud applications. The CASB solution provides visibility and control, and protects mobile workforce. It is integrated with Web Security for visibility and…

64
Lookout CASB
0 reviews

Lookout CASB is a cloud access security broker solution that protects users' data and secures their cloud applications. It includes a variety of functionality such as integrated data protection, secure remote workforce, data classification, advanced policy engines, rapid deployment,…

65
Censornet ASE
0 reviews

Censornet Autonomous Security Engine (ASE) provides individual engines that automatically react at machine speed to attacks and stop them before they even enter the kill chain. The solution helps to organisation beyond events and alerts and into 24Ă—7 automated attack prevention. Censornet…

66
Censornet IAM
0 reviews

Censornet IAM enables single sign-on (SSO) and automatically authenticates users with rich contextual information. The solution helps to removes the risk of weak passwords being used across apps, replacing them entirely with secure tokens and assertions. It ultimately helps to provide…

67
SharePass
0 reviews

SharePass is an online solution for sharing secrets and confidential information using a web application, no agent installation. SharePass does this by giving users the ability to send an encrypted link to people with whom they want to share information. When it comes to data privacy,…

68
Tencent Cloud Workload Protection

Tencent Cloud Workload Protection leverages threat data accumulated by Tencent Security and uses machine learning algorithms to provide security services such as intrusion detection and vulnerability alerts. Features offered includes password cracking prevention, suspicious login…

69
Kindite
0 reviews

Kindite in Tel Aviv offers their eponymous cloud security platform that eliminates cloud-based data exposure risks by creating a zero-trust relationship with any cloud infrastructure. Kindite is designed to ensure encryption keys never leave the user's domain, while performing end-…

70
BluKrypt
0 reviews

Parablu in Burlingame, California offers BluKrypt, a cloud access security broker.

71
Kairos
0 reviews

Kairos allows developers and organisations to build and scale world-class facial recognition into their applications and services.

72
nCrypted Cloud

nCrypted Cloud is a cloud security option from the company of the same name in Boston, Massachusetts.

73
Soha
0 reviews

Soha, from Soha Systems, is a cloud security option.

74
Kloudle
0 reviews

Kloudle automates cloud infrastructure security for AWS/Google Cloud/Azure/Kubernetes. Kloudle adds cloud security expertise to existing engineers (DevOps/SRE/Cloud Admins). Cloud security experts are otherwise hard to hire for, expensive and even more difficult to retain. cloud…

75
Telos Ghost
0 reviews

Telos Corporation acquired Armored Cloud in 2015 and now offers it as Telos Ghost, a security platform emphasizing user anonymity and undetectability in cloud access and activity as its means of providing protection to security threats related to user activity.

Videos for Cloud Computing Security Software

What Is Cloud Computing? | Cloud Computing Explained
06:24
Cloud computing is a popular practice involving the internet to store and manage your data on the internet. In this video on cloud computing, week we'll take you through all of the basic concepts of cloud computing like what makes it unique, its different models, and more.

Cloud Computing Security Software TrustMap

TrustMaps are two-dimensional charts that compare products based on trScore and research frequency by prospective buyers. Products must have 10 or more ratings to appear on this TrustMap.

Learn More About Cloud Computing Security Software

What is Cloud Computing Security?

Cloud computing security software is a set of technologies and policies designed to ensure regulatory compliance. Also known as cloud data security, this software protects data and applications in a cloud infrastructure. It provides features like malware identification, risk assessment, and threat management.

Cloud computing security software can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. These security systems safeguard sensitive information in the event of malware or cyberattack. It can also help avoid server crashes during high traffic periods by controlling capacity.

Common features found in cloud computing security software are encryption and sandboxing. Encryption scrambles data so it cannot be read without the correct key. Conversely, sandboxing isolates risky files from critical ones to prevent potential damage. Disaster recovery is also a key component of security to recover lost or stolen data.

Many solutions offer virtual machine protection and configuration control for endpoint devices such as laptops and desktops. This security feature controls what users can do after logging into the system remotely.

Cloud computing security software also increases cloud security through the cloud access security broker (CASB), a cloud service software that checks network traffic for risks and vulnerabilities. This cloud technology offers authentication and authorization, encryption, web reputation services, and vulnerability scanning features.

Cloud Computing Security Features

Cloud computing security often includes the following features:

  • Automation and optimization
  • Backup protection
  • Cloud management security
  • Cost management
  • Cloud management performance monitoring
  • Custom dashboards and workspaces
  • Disaster recovery
  • Endpoint detection and response (EDR)
  • Firewalls and access control
  • Governance, compliance, and reporting
  • Malware detection
  • Infection remediation
  • Real-time encryption
  • Resource management
  • Risk analysis

Cloud Computing Security Comparison

Consider these factors when comparing cloud computing security products:

  • Use Case: It is critical to consider the level of security needed when purchasing cloud computing security solutions. Providers should comply with an information security framework such as ISO 27001. Are the cloud architecture, standards, and services offered appropriate for your workloads and management priorities? Consider specific regulatory requirements of the jurisdictions where cloud systems ultimately reside.
  • Features: Check into features such as backup protection and data recovery and how quickly these can be implemented should there be a need. Consider which features are most important to securing the specific cloud systems within your organization.

Start a cloud computing security product comparison here

Pricing Information

Cloud computing security software for business varies significantly in price depending on capabilities and scalability. Some entry-level products offer a free service tier. Other options begin at $7 per endpoint/month.

Enterprise-level plans range from $1,000/month - $5,000/year per application secured. In addition, there are high costs in hiring the right engineers to build and operate these systems. Most vendors do not provide pricing details but do offer custom quotes.

Related Categories

Frequently Asked Questions

What does cloud computing security do?

Cloud computing security software provides data security and regulatory compliance for data in the cloud infrastructure. It can monitor and protect an organization’s data, applications, network devices, and endpoints from unauthorized access. Standard features found in cloud computing security software are encryption, sandboxing, and data recovery.

What are the benefits of using cloud computing security?

Cloud computing security software protects against malware, DDoS, and other cyberattacks in the cloud. It can also help avoid server crashes during high traffic periods. Cloud computing security allows companies to cost-effectively and quickly become, and remain, in compliance.

How much does cloud computing security cost?

Cloud computing security software for business varies greatly. Some entry-level products offer a free service tier. Other entry-level options begin at $7 per endpoint/month. Enterprise-level plans range from $1,000/month - $5,000/year per application secured.