Best Cloud Security Software47BluKrypt1https://media.trustradius.com/product-logos/NZ/8O/BVO3L99W4AA7.PNGSpinbackup for Business2https://media.trustradius.com/product-logos/i4/U2/EH1AXMN04OQO.PNGEgress Secure Workspace3https://media.trustradius.com/product-logos/Uk/Hg/D1ITV4T8FB7U.JPEGTelos Ghost4https://media.trustradius.com/vendor-logos/77/YY/2JB25JE4WBIH-180x180.JPEGAvanan Cloud Security Platform5https://media.trustradius.com/product-logos/Zs/mI/IN5W7RX8HVDZ.JPEGUnisys Stealth6https://media.trustradius.com/vendor-logos/ih/uf/FI6S542IVPJK-180x180.JPEGSanerNow7https://media.trustradius.com/product-logos/iu/sT/7Z323ZWKNG8R.PNGOutpost24 Elastic Workload Protector8https://media.trustradius.com/product-logos/7x/i6/QXKTIBTLK4L7.JPEGInfocyte HUNT9https://media.trustradius.com/product-logos/P9/PO/IX2QT1G8G8BK.JPEGProofpoint Cloud Account Defense (PCAD)10https://media.trustradius.com/vendor-logos/8m/3w/841F4UFBJE69-180x180.JPEGJupiterOne11https://media.trustradius.com/product-logos/8J/nU/G67ME2T2AQPB.JPEGIBM Cloud Hyper Protect DBaaS12https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGIBM Cloud Security Advisor13https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGIBM Cloud Activity Tracker14https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGIBM Cloud Certificate Manager15https://media.trustradius.com/product-logos/Uv/Xp/77N37PEPH17Z-180x180.PNGCMIT Secure16https://media.trustradius.com/vendor-logos/wn/n3/TX0X53G9Q6HE-180x180.JPEGCentilytics17https://media.trustradius.com/product-logos/Tn/uo/O1SLC9D2TK25.JPEGBooz Allen Virtual Cloud Defense18https://media.trustradius.com/vendor-logos/A5/Re/I6ZJNEFVKXWQ-180x180.JPEGDxOdyssey19https://media.trustradius.com/product-logos/GV/Kc/PDUHWTRXOWIV.PNGHornetsecurity 365 Total Protection20https://media.trustradius.com/product-logos/Et/vr/BC3NWLMJ6WQZ.JPEGSecuronix SNYPR Cloud Platform21https://media.trustradius.com/vendor-logos/Dk/eQ/LT6ACXBGZJBO-180x180.JPEGMobileIron Access22https://media.trustradius.com/vendor-logos/eC/a9/MB3QWU5RNKKR-180x180.PNGSymantec Cloud Workload Protection23https://media.trustradius.com/vendor-logos/4q/QY/K9TTG2FGRKUZ-180x180.PNGCheck Point CloudGuard24https://media.trustradius.com/vendor-logos/N5/Pq/9GTB1XOCNWCX.pngCheck Point Infinity25https://media.trustradius.com/vendor-logos/N5/Pq/9GTB1XOCNWCX.png

Cloud Security Software

Best Cloud Security Software

TrustMaps are two-dimensional charts that compare products based on satisfaction ratings and research frequency by prospective buyers. Products must have 5 or more ratings to appear on this TrustMap.

Cloud Security Software Overview

What is Cloud Security Software?

Cloud Security Software a set of technologies and policies designed to ensure regulatory compliance and protect information, data applications and infrastructure associated with cloud computing.

How it Differs from Traditional Security

Providers of cloud computing technology such as Software-as-a-Service or Infrastructure-as-a-Service, or Platform-as-a-Service have a responsibility to protect their customers' data through stringent security measures.


Cloud computing technology resources are shared among very large numbers of customers and, for this reason, questions of access control, privacy, data security, data protection, and business continuity and backup are paramount.


All cloud computing providers must provide a base level of security to mitigate these concerns to ensure that customers are in compliance with all relevant regulations.


However, end users of these resources also have responsibility for ensuring that measures are taken to protect their applications through the use of strong passwords and authentication measures.

Pricing Information

Cloud security software for business varies greatly in price depending on capabilities and scalability. Enterprise level products may cost as much as $5,000 per year per application secured. In addition, there are significant costs in hiring the right engineers to build and operate these systems.

Cloud Security Products

Listings (26-50 of 60)

We don't have enough ratings and reviews to provide an overall score.

Parablu in Burlingame, California offers BluKrypt, a cloud access security broker.

We don't have enough ratings and reviews to provide an overall score.

Spinbackup is a Cloud-to-Cloud Backup and Cloud Cybersecurity solutions provider for G Suite. With the use of machine learning algorithms, Spinbackup protects organizations against data leak and loss disasters in the cloud by letting G Suite administrators back up their sensitive data, identify s...

We don't have enough ratings and reviews to provide an overall score.

Switch Secure Workspace is a collaboration platform that is designed to allow users to work at their desk or on the go whilst maintaining compliance in an encrypted environment.According to the vendor, key business benefits include: From the cloud: Switch Secure Workspace enables users to store, ...

We don't have enough ratings and reviews to provide an overall score.

Telos Corporation acquired Armored Cloud in 2015 and now offers it as Telos Ghost, a security platform emphasizing user anonymity and undetectability in cloud access and activity as its means of providing protection to security threats related to user activity.

We don't have enough ratings and reviews to provide an overall score.

Avanan connects leading security technologies to the most widely used enterprise cloud applications, in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in seconds. Because it ...

We don't have enough ratings and reviews to provide an overall score.

Unisys offers the Stealth product cybersecurity and software-defined microsegmentation suite , designed to protect the enterprise network, could services, and data via cloaking and encryption, provide network visibility, and also provide detection and correlation for advanced threat prevention.

We don't have enough ratings and reviews to provide an overall score.

A platform of Tools for endpoint security and systems management needs. Saner Platform queries systems to find aberrations, and helps systems to retain normality. SanerNow has six different tools that are listed below Vulnerability Management (VM)Patch Management (PM)Asset Management (AM)Complian...

We don't have enough ratings and reviews to provide an overall score.

Elastic Workload Protector, or EWP, is a cloud analytics and security solution from Outpost24, after the company's acquisition of SecludIT The solution integrates a vulnerability scanner Ensures continuous security by scanning, detecting risks, notifying the company and proposing actionnable rem...

We don't have enough ratings and reviews to provide an overall score.

Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware an...

We don't have enough ratings and reviews to provide an overall score.

JupiterOne promises to: Accelerate compliance and certification audits such as HITRUST, SOC2, PCI, ISO27001 and NIST by assisting companies in creating their security policies, processes and controls as well as easily producing evidence for controls. Automate security instrumentation and orchestr...

We don't have enough ratings and reviews to provide an overall score.

Austin-based CMIT Solutions offers CMIT Secure, a layered cybersecurity product bundling the company's flagship products with access blocking and control, SIEM, threat assessment and consultation, DNS filtering, and intelligent firewall, to protect enterprise cloud resources and applications.

We don't have enough ratings and reviews to provide an overall score.

Centilytics, an Intelligent cloud management platform, serves as a governance, security & optimization tool to save unnecessary cloud spend with a 360-degree visibility. According to the vendor, it pinpoints loopholes in the cloud infrastructure to put the resources into optimum utilization a...

We don't have enough ratings and reviews to provide an overall score.

Booz Allen Hamilton now offers their Virtual Cloud Defense cybersecurity suite for enterprise cloud, providing a range of advanced services including DoD risk management, end point protection and situational awareness, IAM, and available consulting services from Booz Allen Cyber.

We don't have enough ratings and reviews to provide an overall score.

DxOdyssey is lightweight software that enables you to create highly available application-level micro-tunnels from any host, to any host, anywhere – across any mix of platforms. The vendor aims to do so more easily, more securely, and more discreetly than any other solution on the market. Using D...

We don't have enough ratings and reviews to provide an overall score.

With 365 Total Protection, Hornetsecurity offers users a comprehensive package for enterprise security management in conjunction with Microsoft Office 365. The Enterprise version gives users enhanced functionality and protection, and covers legally compliant email archiving with advanced features...

We don't have enough ratings and reviews to provide an overall score.

The Secoronix SNYPR Cloud Platform is the Addison-based company's security platform for securing access and monitoring activity in a hybrid cloud activity, providing data ingestion and control for hybrid on-premise and cloud infrastructure enterprise environments.

We don't have enough ratings and reviews to provide an overall score.

MobileIron headquartered in Mountain View offers MobileIron Access, a cloud security option for protecting cloud infrastructure and services.

We don't have enough ratings and reviews to provide an overall score.

Check Point Software Technologies provides Check Point Infinity, a subscription based comprehensive enterprise security product suite combining network, cloud and endpoint security applications integrated into a single service priced on a per person basis.