Parablu in Burlingame, California offers BluKrypt, a cloud access security broker.
Cloud Security Software
Best Cloud Security Software
TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 5 or more ratings to appear on this TrustMap.
Cloud Security Software Overview
What is Cloud Security Software?
Cloud Security Software a set of technologies and policies designed to ensure regulatory compliance and protect information, data applications and infrastructure associated with cloud computing.
How it Differs from Traditional Security
Providers of cloud computing technology such as Software-as-a-Service or Infrastructure-as-a-Service, or Platform-as-a-Service have a responsibility to protect their customers' data through stringent security measures.
Cloud computing technology resources are shared among very large numbers of customers and, for this reason, questions of access control, privacy, data security, data protection, and business continuity and backup are paramount.
All cloud computing providers must provide a base level of security to mitigate these concerns to ensure that customers are in compliance with all relevant regulations.
However, end users of these resources also have responsibility for ensuring that measures are taken to protect their applications through the use of strong passwords and authentication measures.
Pricing InformationCloud security software for business varies greatly in price depending on capabilities and scalability. Enterprise level products may cost as much as $5,000 per year per application secured. In addition, there are significant costs in hiring the right engineers to build and operate these systems.
Cloud Security Products
Listings (26-50 of 60)
Spinbackup is a Cloud-to-Cloud Backup and Cloud Cybersecurity solutions provider for G Suite. With the use of machine learning algorithms, Spinbackup protects organizations against data leak and loss disasters in the cloud by letting G Suite administrators back up their sensitive data, identify s...
Switch Secure Workspace is a collaboration platform that is designed to allow users to work at their desk or on the go whilst maintaining compliance in an encrypted environment.According to the vendor, key business benefits include: From the cloud: Switch Secure Workspace enables users to store, ...
Telos Corporation acquired Armored Cloud in 2015 and now offers it as Telos Ghost, a security platform emphasizing user anonymity and undetectability in cloud access and activity as its means of providing protection to security threats related to user activity.
Avanan connects leading security technologies to the most widely used enterprise cloud applications, in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in seconds. Because it ...
Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite , designed to protect the enterprise network, could services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention.
A platform of Tools for endpoint security and systems management needs. Saner Platform queries systems to find aberrations, and helps systems to retain normality. SanerNow has six different tools that are listed below Vulnerability Management (VM)Patch Management (PM)Asset Management (AM)Complian...
Elastic Workload Protector, or EWP, is a cloud analytics and security solution from Outpost24, after the company's acquisition of SecludIT The solution integrates a vulnerability scanner Ensures continuous security by scanning, detecting risks, notifying the company and proposing actionnable rem...
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware an...
Proofpoint Cloud Account Defense (PCAD) is a cloud-based file security option which detects compromised Office 365 accounts using threat intelligence and contextual data.
JupiterOne promises to: Accelerate compliance and certification audits such as HITRUST, SOC2, PCI, ISO27001 and NIST by assisting companies in creating their security policies, processes and controls as well as easily producing evidence for controls. Automate security instrumentation and orchestr...
Hyper Protect DBaaS protects against threats of data breach and data manipulation leveraging the strengths of LinuxONE pervasive encryption, scalability, performance and IBM Secure Service Container technology.
With IBM® Cloud Security Advisor, allows users to view the security posture of IBM Cloud through a single, centralized dashboard.
Cloud Activity Tracker allows cloud administrators, security and developers to search and analyze how their users and applications interact with IBM Cloud services.
Use the Certificate Manager service to manage SSL certificates for your IBM Cloud-based apps and services.
Austin-based CMIT Solutions offers CMIT Secure, a layered cybersecurity product bundling the company's flagship products with access blocking and control, SIEM, threat assessment and consultation, DNS filtering, and intelligent firewall, to protect enterprise cloud resources and applications.
Centilytics, an Intelligent cloud management platform, serves as a governance, security & optimization tool to save unnecessary cloud spend with a 360-degree visibility. According to the vendor, it pinpoints loopholes in the cloud infrastructure to put the resources into optimum utilization a...
Booz Allen Hamilton now offers their Virtual Cloud Defense cybersecurity suite for enterprise cloud, providing a range of advanced services including DoD risk management, end point protection and situational awareness, IAM, and available consulting services from Booz Allen Cyber.
DxOdyssey is lightweight software that enables you to create highly available application-level micro-tunnels from any host, to any host, anywhere – across any mix of platforms. The vendor aims to do so more easily, more securely, and more discreetly than any other solution on the market. Using D...
With 365 Total Protection, Hornetsecurity offers users a comprehensive package for enterprise security management in conjunction with Microsoft Office 365. The Enterprise version gives users enhanced functionality and protection, and covers legally compliant email archiving with advanced features...
The Secoronix SNYPR Cloud Platform is the Addison-based company's security platform for securing access and monitoring activity in a hybrid cloud activity, providing data ingestion and control for hybrid on-premise and cloud infrastructure enterprise environments.
MobileIron headquartered in Mountain View offers MobileIron Access, a cloud security option for protecting cloud infrastructure and services.
Symantec provides cloud security via the Symantec Cloud Workload Protection application, providing auto-discovery and vulnerability protection of cloud applications and services.
Check Point Software Technologies offers CloudGuard, a cloud security option for securing IaaS and PaaS infrastructure.
Check Point Software Technologies provides Check Point Infinity, a subscription based comprehensive enterprise security product suite combining network, cloud and endpoint security applications integrated into a single service priced on a per person basis.