---
description: Page 2 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 2 - Best Cloud Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software) > [Page 2](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2)

# Cloud Security Software

Canonical: https://www.softwareadvice.com.au/directory/4329/cloud-security/software

Page: 2 / 12\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3)

-----

## Products

1. [SentinelOne](https://www.softwareadvice.com.au/software/363019/sentinelone) — 4.8/5 (109 reviews) — Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platfo...
2. [GoodAccess](https://www.softwareadvice.com.au/software/186523/goodaccess) — 4.9/5 (103 reviews) — GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Tru...
3. [OneLogin](https://www.softwareadvice.com.au/software/143308/onelogin) — 4.6/5 (92 reviews) — OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web ...
4. [DNSFilter](https://www.softwareadvice.com.au/software/241689/dnsfilter) — 4.7/5 (86 reviews) — DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to ...
5. [Sprinto](https://www.softwareadvice.com.au/software/339129/sprinto) — 4.7/5 (86 reviews) — Sprinto is a cloud-based security compliance automation platform that helps small to large businesses manage their co...
6. [Workato](https://www.softwareadvice.com.au/software/76002/workato) — 4.6/5 (85 reviews) — Workato is an integration platform as a service (iPaaS)-based business intelligence platform designed for organizatio...
7. [ManageEngine ADManager Plus](https://www.softwareadvice.com.au/software/361323/manageengine-admanager-plus) — 4.5/5 (83 reviews) — ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD managem...
8. [Dynatrace](https://www.softwareadvice.com.au/software/234304/dynatrace) — 4.5/5 (82 reviews) — Dynatrace is an AIOps solution designed to help businesses automate multi-cloud processes and streamline collaboratio...
9. [Perimeter 81](https://www.softwareadvice.com.au/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
10. [Phoenix Security](https://www.softwareadvice.com.au/software/352909/appsec-phoenix) — 4.7/5 (74 reviews) — AppSec Phoenix is a software, container and cloud security platform. Users can access vulnerabilities from different ...
11. [Rubrik](https://www.softwareadvice.com.au/software/155236/rubrik) — 4.8/5 (74 reviews) — Rubrik is a data management solution that helps businesses streamline data backup, archiving, offsite replication and...
12. [ALTOSPAM](https://www.softwareadvice.com.au/software/269301/altospam) — 4.8/5 (73 reviews) — ALTOSPAM is a SaaS email security software that addresses all types of structures (company, public service, associati...
13. [ManageEngine ADAudit Plus](https://www.softwareadvice.com.au/software/361342/manageengine-adaudit-plus) — 4.4/5 (71 reviews) — ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensiv...
14. [Lookout](https://www.softwareadvice.com.au/software/379029/lookout) — 4.7/5 (69 reviews) — Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business...
15. [idgard](https://www.softwareadvice.com.au/software/214882/idgard) — 4.6/5 (61 reviews) — idgard – a DriveLock company – combines highly secure data exchange and virtual data rooms in a single solution. Powe...
16. [Orca Security](https://www.softwareadvice.com.au/software/432007/orca-security) — 4.8/5 (60 reviews) — Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud est...
17. [CrowdStrike](https://www.softwareadvice.com.au/software/135499/crowdstrike) — 4.7/5 (55 reviews) — CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus pr...
18. [Cohesity](https://www.softwareadvice.com.au/software/419896/cohesity) — 4.6/5 (53 reviews) — Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, a...
19. [ConnectWise SIEM](https://www.softwareadvice.com.au/software/118233/perch-security) — 4.6/5 (52 reviews) — ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to...
20. [Beagle Security](https://www.softwareadvice.com.au/software/213304/beagle-security) — 4.9/5 (51 reviews) — Discover website security issues at the right time and address them in the right way using Beagle Security. With the ...
21. [BLACKbox](https://www.softwareadvice.com.au/software/368197/blackbox) — 4.5/5 (49 reviews) — BLACKbox provides a cloud-based data loss prevention and data theft prevention solution that prevents data leakage, p...
22. [Zscaler](https://www.softwareadvice.com.au/software/241644/zscaler-internet-access) — 4.3/5 (48 reviews) — Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and...
23. [Commvault Cloud](https://www.softwareadvice.com.au/software/201628/metallic-saas-backup-and-recovery) — 4.6/5 (48 reviews) — Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid enterp...
24. [Guardio](https://www.softwareadvice.com.au/software/248573/guardio) — 4.4/5 (48 reviews) — Guardio is a Google Chrome extension designed to help businesses across a variety of industries protect private infor...
25. [ManageEngine ADSelfService Plus](https://www.softwareadvice.com.au/software/360383/manageengine-adselfservice-plus) — 4.6/5 (47 reviews) — ADSelfService Plus is an identity security solution that ensures secure and seamless access to enterprise resources a...

-----

Page: 2 / 12\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.com.au/directory/4528/security/software)
- [Data Loss Prevention Software](https://www.softwareadvice.com.au/directory/4270/data-loss-prevention/software)
- [Vulnerability Management Software](https://www.softwareadvice.com.au/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.com.au/directory/4170/network-security/software)
- [Cloud Management Software](https://www.softwareadvice.com.au/directory/4676/cloud-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@type":"WebSite","@id":"https://www.softwareadvice.com.au/#website","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cloud Security Software","description":"Page 2 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2","about":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#webpage","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cloud Security Software","position":2,"item":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Best Cloud Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"SentinelOne","position":1,"description":"Designed with Fortune 500 and Global 2000 companies in mind, SentinelOne is a leading autonomous cybersecurity platform specializing in AI-powered endpoint protection. \n\nThe autonomous agent platform allows users to detect threats across multiple vectors and resolve system attacks. SentinelOne's endpoint detection and response (EDR) module automates mitigation of bugs/issues and ensure immunity against newly discovered threats. Additionally, the artificial intelligence (AI)-based solution performs recurring scans to detect various threats including malware, trojans, worms and more, preserving end-user productivity within the organization.\n\n\nSentinelOne allows integration with various third-party applications such as Tanium, Splunk, Okta, Fortinet and BigFix. The application can also be deployed in an on-premise environment. Pricing is available on annual subscription and support is extended via documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dbe48f25-9e50-4c70-bc05-1f84a811f2df.png","url":"https://www.softwareadvice.com.au/software/363019/sentinelone","@type":"ListItem"},{"name":"GoodAccess","position":2,"description":"GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. \n\nBy leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. \n\nOur platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. \n\nGoodAccess serves businesses with 50-5000 employees across diverse industries, particularly those adopting multi-cloud and SaaS environments.\n\nStart your 14-day full-featured free trial.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f55a07d-b749-4b55-9def-de441bfbb8b2.png","url":"https://www.softwareadvice.com.au/software/186523/goodaccess","@type":"ListItem"},{"name":"OneLogin","position":3,"description":"OneLogin is a cloud-based identity and access management solution that helps users control access to facilities, web applications, data centers, cloud storage and more. Key features include single sign-on, web access management, adaptive and multi-factor authentication and mobile identity tracking.\n\n\nOneLogin’s web access management tool integrates with the existing web servers and helps businesses secure their web applications. Its adaptive authentication feature uses machine learning to determine the kind of security access that users need to fill in order to access the system. The solution uses a multi-factor authentication system that validates users’ identity through standard user ID and passwords along with one-time passwords (OTP) shared via mobile app and text messages, Duo Security, RSA and more.\n\n\nOneLogin is available on a per user per month subscription basis. Support is offered via phone, email and an online knowledge repository. The solution is used in a variety of businesses including education, energy, manufacturing, government, finance and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/920aaefd-244a-4931-8332-43973d59fe68.png","url":"https://www.softwareadvice.com.au/software/143308/onelogin","@type":"ListItem"},{"name":"DNSFilter","position":4,"description":"DNSFilter is a cloud-based cybersecurity software that helps businesses leverage AI technology and DNS protection to streamline threat detection and content filtering processes. Professionals can classify unknown websites into multiple categories and block malicious web content to prevent malware or ransomware activities. \n\nRoaming Client - Prevent access to unwanted and malicious content on all devices, on and off your network. Get credit for switching from Cisco Umbrella Roaming Client.\n\nDNS Filtering - Block threats at the DNS level and make internet browsing safer and faster.\n\nContent Filtering - Customize the content you'd like to block and allow with our machine-learning content filtering capabilities.\n\nFast & Easy Implementation - 53% of DNSFilter customers get up-and-running within 1 day. \n\nOur product is powered by artificial intelligence that analyzes domains in real time, meaning we stop more threats than our competitors whom often take weeks through human review.\n\nDNSFilter comes with a dashboard, which allows organizations to gain an overview of active sites, top domains, and other metrics on a centralized platform. Managers can block specific categories of content related to chat & instant messaging, social networking, adult content and more. Additionally, it lets users generate activity reports to monitor most active networks, total requests and queries per second.\n\nDNSFilter provides an API, which enables businesses to integrate the platform with various third-party applications. Pricing is available on monthly subscriptions and support is extended via phone, email and other online measures.\n\nWe're a U.S. based and operate a global anycast network with the most advertised network peers in the industry and offer fair, transparent pricing and no contracts or commitments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6cdcad23-bf7e-4ced-9261-e52302787fcf.png","url":"https://www.softwareadvice.com.au/software/241689/dnsfilter","@type":"ListItem"},{"name":"Sprinto","position":5,"description":"Sprinto is a cloud-based security compliance automation platform that helps small to large businesses manage their compliance programs. The platform provides the tools and support needed to organize, monitor and scale security compliance efforts. It offers out-of-the-box compliance programs for popular frameworks such as SOC 2, ISO, NIST, GDPR and HIPAA. Sprinto also has automated compliance workflows that help users manage tasks, escalations, and notifications to maintain continuous compliance. Additionally, its continuous control monitoring capabilities keep compliance programs up to date. The built-in risk assessment module helps identify and manage compliance gaps through quantitative and qualitative analysis.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da028944-fcb6-4035-9a06-1c8cfdadb68f.png","url":"https://www.softwareadvice.com.au/software/339129/sprinto","@type":"ListItem"},{"name":"Workato","position":6,"description":"Workato is an integration platform as a service (iPaaS)-based business intelligence platform designed for organizations of any size. It enables IT teams and businesses to carry out enterprise-level integrations and process automation using artificial intelligence and machine learning technology.\n\nFeatures of Workato include data and app integration, process automation through clicks, built-in optimizations and more. The platform has an interface that allows technical and non-technical users to design simple and complex workflows. Additionally, it provides build interactive and intelligent custom chatbots to help facilitate and automate business operations.\n\nWorkato integrates with various cloud and on-premise apps for customer relationship management, enterprise resource planning, human resources, messaging and more. It provides pre-built connectors for enterprise applications and lets users rollback to older versions, with an option to upgrade. \n\nWorkato’s pricing is available on monthly subscriptions and support is provided through forum, email, chat and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ec74fbc-84ab-488d-b82a-0cf8242c16d7.png","url":"https://www.softwareadvice.com.au/software/76002/workato","@type":"ListItem"},{"name":"ManageEngine ADManager Plus","position":7,"description":"ManageEngine ADManager Plus is an identity governance and administration solution that helps admins handle AD management and reporting tasks with ease. Its all-inclusive reports for diverse AD functionalities play a vital role in data-driven decision-making. ADManager Plus also has risk assessment indicators that monitor your organization's AD environment for potential risks, risk exposure management to view potential attack paths that could leave your privileged entities vulnerable, and access certification campaigns to review user access regularly.\nIt seamlessly integrates with leading ITSM, SIEM, and HCM solutions and other third-party applications using custom APIs to enhance the scalability of IT resource management, improve the efficiency of administrative tasks, and provide consistency while handling enterprise data.\nADManager Plus offers the option to back up your data and restore it when required, preventing data loss.\nIts core features include:\n\nUser provisioning\nManage user identities and access privileges throughout the user's life span in an organization. Create accounts in AD, Microsoft 365, and Google Workspace and carry out other management tasks like password resets, account unlocks, and template-based account updates.\n\nRisk assessment\nIdentify potential security risks of your AD using a risk score indicator. Prompt decisions based on it can help mitigate the identified risks and take the security of the organization up a notch.\n\nRisk exposure management\nVisualize potential attack paths that hackers could exploit to gain access to your AD privileged entities and view required remediation measures to secure them.\n\nAccess certification campaign\nReview the user privileges using periodic audit campaigns to ensure their access is authorized and appropriate. This helps your organization follow the principle of least privilege so that admins can have better control of user access.\n\nReport management\nADManager Plus offers more than 200 prepackaged reports on objects such as users, computers, groups, OUs, and more, plus custom reports with advanced filters, ensuring admins have crucial information at their fingertips. They can carry out tasks by utilizing the in-line management actions available in the report.\n\nWorkflow\nAdmins can define workflow agents like requester, reviewer, approver and executor for every AD management action performed using ADManager Plus. Configure SLAs to ensure the timely execution of tasks by sending frequent notifications, changing priority, and reassigning requests.\n\nDelegation\nEquip non-admin users to execute routine AD administrative tasks by assigning them custom help desk roles, balancing the workload of IT admins.\n\nAutomation\nEliminate manual AD tasks by automating them to be executed at specified time intervals. For critical tasks, implement a business workflow so that the automation is supervised.\n\nOrchestration\nPerform event-driven management actions using predefined templates. Integrate HCM applications with ADManager Plus to activate bidirectional data sync between HCM applications and AD using webhooks.\n\nIntegration\nIntegrate with third-party applications using REST APIs and webhooks. Various ITSM, SIEM, and HCM tools can be integrated with ADManager Plus for centralized management and meeting compliance audit needs.\n\nBackup and recovery\nPrevent and manage data loss by periodically backing up AD, Google Workspace, and Microsoft Entra ID and recovering it when required.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/28958cda-088c-4757-b48b-8054d0ef96d9.png","url":"https://www.softwareadvice.com.au/software/361323/manageengine-admanager-plus","@type":"ListItem"},{"name":"Dynatrace","position":8,"description":"Dynatrace is an AIOps solution designed to help businesses automate multi-cloud processes and streamline collaboration across multiple teams through purpose-built use cases. Its filtering capabilities enable supervisors to search for specific entities according to requirements.\n\nThe system offers built-in support for several technologies such as OneAgent, ActiveMQ, Amazon Connect, Android Webkit, Ansible Tower, Azure Application Gateway and more. Dynatrace allows administrators to configure access permissions for staff members and track processes across web and mobile application tiers. Additionally, it helps businesses drill down into analyzed components and gain visibility into dependency details, user experience insights and performance metrics. \n\nDynatrace provides open API, which helps businesses integrate the platform with various third-party systems such as Slack, ServiceNow, GitHub and Google Analytics, among others. The product is available on annual subscriptions and support is extended via live chat, documentation, forums, phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68183a9d-ab05-4850-890c-50d319013242.png","url":"https://www.softwareadvice.com.au/software/234304/dynatrace","@type":"ListItem"},{"name":"Perimeter 81","position":9,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.com.au/software/230245/perimeter-81","@type":"ListItem"},{"name":"Phoenix Security","position":10,"description":"AppSec Phoenix is a software, container and cloud security platform. Users can access vulnerabilities from different scanners in one single risk-based platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f43e083-6503-4d1f-9571-d65283f665b4.jpeg","url":"https://www.softwareadvice.com.au/software/352909/appsec-phoenix","@type":"ListItem"},{"name":"Rubrik","position":11,"description":"Rubrik is a data management solution that helps businesses streamline data backup, archiving, offsite replication and compliance management operations via a unified portal. It enables organizations to detect anomalies and protect business data against ransomware and other online threats.\n\nThe application allows employees to search various files, databases and applications using predictive search capability. Features of Rubrik include role-based permissions, auditing, analytics, access control and more. Additionally, it lets managers define protection policies, configure disaster recovery workflows and generate and share custom reports with internal and external stakeholders via email.\n\nRubrik comes with an application programming interface (API), which facilitates integration with several third-party platforms such as ServiceNow, Terraform, Splunk, Ansible, VMWare and more. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/de1f3f27-66db-449f-a8c2-e64839525873.png","url":"https://www.softwareadvice.com.au/software/155236/rubrik","@type":"ListItem"},{"name":"ALTOSPAM","position":12,"description":"ALTOSPAM is a SaaS email security software that addresses all types of structures (company, public service, association) of all sizes. The principle of operation consists in making transit the flow of messaging of our customers to clean them (removal of spam, viruses, scams and other phishing) before retransmitting it to the server of messaging of the company. \n\nThe implementation of the service is done in a few seconds and thus allows very quickly to protect all the emails of the customer company.\n\nALTOSPAM is an email protection solution for all businesses, associations and local authorities. \n\nALTOSPAM is compatible with all emails server, Office 365 and all emails services. \n\nTry ALTOSPAM for free for 3 weeks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2c848ad4-2e41-45a8-8aff-b800732b4840.png","url":"https://www.softwareadvice.com.au/software/269301/altospam","@type":"ListItem"},{"name":"ManageEngine ADAudit Plus","position":13,"description":"ManageEngine ADAudit Plus is a Windows auditing, security, and compliance solution. Key features include comprehensive logon auditing, detailed change monitoring, real-time risk alerting, and streamlined compliance reporting for Active Directory, Azure AD, file servers, Windows servers and workstations.  It helps users monitor and generate real-time change audit reports on Active Directory objects such as users, computers, groups, organizational units and more. Auditing user logon and logoff activity provides deeper insights into user behavior and helps detect anomalous logons using UBA. ADAudit Plus also alerts users in real-time through SMS or email notifications whenever any critical changes to the contents or configurations of Active Directory are detected. \n\nADAudit Plus offers its services through an annual subscription model, and users can access support resources via an online knowledge base, email, phone, and chat. The platform boasts a range of top features that cater to the specific needs of Windows Server environments. These features include real-time change notifications, allowing users to receive instant alerts on system alterations and user activities. Windows logon monitoring functionality enables the continuous tracking of user logon activities and related data, while account lockout analysis helps to identify the root causes of authentication failures. Additionally, the tool offers robust file change monitoring capabilities, enabling auditing of file accesses and permission modifications across various file systems.\n\nOther notable features encompass security and compliance reporting tools, Azure AD auditing capabilities, privileged user monitoring, and detailed reporting on activities related to ADFS, USB usage, and printer activities. Furthermore, ADAudit Plus provides functionalities for employee time tracking, monitoring active and idle time on workstations, as well as file integrity monitoring features to oversee file modifications, deletions, and access permission changes within the network. ADAudit Plus provides its services on an annual subscription basis. Support is available through an online knowledge base, email, phone, and chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4223f3a6-931e-4338-b0bc-a9fd0b954c69.png","url":"https://www.softwareadvice.com.au/software/361342/manageengine-adaudit-plus","@type":"ListItem"},{"name":"Lookout","position":14,"description":"Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, and implement security policies. Lookout can increase visibility and provide protection for teams who are working remotely while using mobile devices and cloud technology.\n\nLookout works as a single security platform that protects data from endpoints to the cloud, without the need for multiple standalone solutions. It includes real-time protection for phishing attacks, custom web filtering for inappropriate web content, data protection in email, SaaS, and IaaS applications, plus more. \n\nPricing information is provided on request by Lookout. Support is available via an FAQ page, online portal, and other resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/764d1f7c-5498-40f5-8da4-941ec7ddb41c.png","url":"https://www.softwareadvice.com.au/software/379029/lookout","@type":"ListItem"},{"name":"idgard","position":15,"description":"idgard – a DriveLock company – combines highly secure data exchange and virtual data rooms in a single solution. Powered by patented Sealed Cloud technology, sensitive information remains fully under user control during transfer, storage, and processing, and is protected against unauthorized access. The platform meets the highest security and compliance requirements, ensuring GDPR-compliant handling of sensitive data.  \n\nAs part of DriveLock, idgard is integrated into the HYPERSECURE Platform. The idgard solution for secure data transfer complements DriveLock's endpoint, data and detection and response functions to form a holistic security architecture. This combination enables companies to maintain their digital sovereignty and comply with regulatory requirements. \n\nMore than 200,000 users across more than 1,200 organizations – from the public sector to healthcare and financial services – already rely on idgard for efficient, legally compliant digital collaboration.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45d9bfc3-7b94-4332-befd-aa54f1528f28.jpeg","url":"https://www.softwareadvice.com.au/software/214882/idgard","@type":"ListItem"},{"name":"Orca Security","position":16,"description":"Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform  that provides security teams with 100% coverage of their entire cloud environment.\n\nInstead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dc4da2bc-b63d-49f4-a76e-5b0814fe7d80.jpeg","url":"https://www.softwareadvice.com.au/software/432007/orca-security","@type":"ListItem"},{"name":"CrowdStrike","position":17,"description":"CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. \n\n\nThe application helps network administrators monitor malicious activities, apply mitigation techniques and block data tampering across multiple devices. System engineers can use the solution to detect unauthorized access in real-time, review and categorize hackers under blacklist or whitelist. Additionally, it helps users identify and block various malware activities such as polymorphic, obfuscated and more. \n\n\nCrowdStrike comes with a feature which enables managers to provide user-based access to USBs, monitor usage and track security risks. It comes with a mobile application for Android and is available on an annual subscription. The solution offers different support options to customers, including email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e223712f-b823-4608-92e0-14d1f76a5f6e.png","url":"https://www.softwareadvice.com.au/software/135499/crowdstrike","@type":"ListItem"},{"name":"Cohesity","position":18,"description":"Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, and get value from data—across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale. Cohesity solutions can be delivered as a service, self-managed, or provided by a Cohesity-powered partner. Cohesity is headquartered in San Jose, CA and is trusted by the world’s largest enterprises, including six of the Fortune 10 and 42 of the Fortune 100.\n\nCohesity is designed to help businesses manage and encrypt enterprise data from ransomware and malware attacks. The platform enables managers to consolidate backup point products and securely recover data.\n\nAdministrators can assign custom policies to multiple jobs across businesses in accordance with service level agreements (SLAs). Cohesity offers a mass restore feature, which allows teams to instantly recover virtual machines (VMs) and files. Additionally, supervisors can secure data in the public cloud in compliance with multi-factor authentication (MFA), role-based access control (RBAC), and SOC II Type 1 certification.\n\nCohesity lets stakeholders automatically move backed-up data to archives and utilize AI-based tools to detect and defend against ransomware attacks. Pricing is available on request and support is extended via phone, email and an online contact form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2be927d0-6de9-4021-a3f8-fc6032e2a62b.png","url":"https://www.softwareadvice.com.au/software/419896/cohesity","@type":"ListItem"},{"name":"ConnectWise SIEM","position":19,"description":"ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities, which assist administrators with evaluating threat alerts, logs and related information.\n\n\nConnectWise SIEM allows enterprises to detect potential threats, security issues and malicious activities across the network and connected devices via a unified portal. IT professionals can gain visibility into Windows logs, active assets, HIPAA and PCI DSS compliance, networking status and other metrics via a dashboard. Additionally, users can evaluate issues, instance and other events through real-time alerts and store the information in a repository for future reference.\n\n\nConnectWise SIEM supports integration with a variety of third-party applications such as G Suite, Microsoft teams, Cisco, Salesforce, Bitdefender, Freshdesk, and more. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34dcfe8-0d4f-4a8b-8316-e96618c26019.png","url":"https://www.softwareadvice.com.au/software/118233/perch-security","@type":"ListItem"},{"name":"Beagle Security","position":20,"description":"Discover website security issues at the right time and address them in the right way using Beagle Security.\n\nWith the ability to automate vulnerability assessment and accelerate remediation, you can secure your web applications from the latest cyber threats easily. Security tests can be scheduled on a recurring basis to have vulnerability assessments on an ongoing basis and keep track of website security. \n\nThe DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, Jira, Asana, or Trello right during the development phase.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d64bd889-0939-4439-8b97-c160f6f51aa8.png","url":"https://www.softwareadvice.com.au/software/213304/beagle-security","@type":"ListItem"},{"name":"BLACKbox","position":21,"description":"BLACKbox provides a cloud-based data loss prevention and data theft prevention solution that prevents data leakage, protects intellectual property, and safeguards information assets.\n\nIt becomes difficult to maintain continuity if data is lost, as this can happen in a number of different situations. Leakage or theft of sensitive data exposes the company to significant liabilities. The all-inclusive data loss prevention and data theft prevention solution is designed for small and medium businesses looking to protect their intellectual property or confidential data as well as maintain continuity of operations and prevent insider threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d9928651-8005-47a8-8f85-a8077beb9c33.jpeg","url":"https://www.softwareadvice.com.au/software/368197/blackbox","@type":"ListItem"},{"name":"Zscaler","position":22,"description":"Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious web content including malware callbacks, scripts, botnets and browser exploits.\n\nOrganizations can remediate misconfigurations for SaaS and PaaS applications, identify instances of confidential data loss and monitor access to streaming, social media, email or other web applications. Zscaler allows administrators to configure access permissions based on user, group, time, location or quota and utilize reports to gain insights into web transactions across multiple geographies. Additionally, enterprises can enforce bandwidth policies, inspect Secure Sockets Layer (SSL) traffic and analyze unknown files to detect malicious behavior.\n\nZscaler facilitates integration with several third-party technology providers such as AT&T, VMware, Accenture, Splunk and more. Pricing is available on request and support is extended via live chat, documentation, knowledge base, forums, FAQs, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a6796f9-1449-4617-8dd6-deb7827a0caa.png","url":"https://www.softwareadvice.com.au/software/241644/zscaler-internet-access","@type":"ListItem"},{"name":"Commvault Cloud","position":23,"description":"Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid \nenterprise at the lowest TCO, in the face of ransomware and other cyber threats. Commvault Cloud unifies the \nbest data security with the fastest recovery, advanced AI, and the power of a broad partner ecosystem to help \nthe world’s largest organizations reduce risk, minimize downtime, and keep business moving forward.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9dce9b3c-496c-4ec4-9325-7965c9bbe8a2.jpeg","url":"https://www.softwareadvice.com.au/software/201628/metallic-saas-backup-and-recovery","@type":"ListItem"},{"name":"Guardio","position":24,"description":"Guardio is a Google Chrome extension designed to help businesses across a variety of industries protect private information and browse the web securely and quickly. Key features include suspicious site detection, on-demand scan, phishing alerts, real-time removal, and personal dashboard.\n\nTeams using Guardio can remove malicious extensions, check for privacy violations, block harmful websites, and stop unwanted notifications. The platform enables managers to keep track of email accounts and receive alerts on data breaches to take immediate action and ensure safety. Additionally, it enables teams to eliminate malicious and intrusive notifications that are potentially harmful.\n\nGuardio allows organizations to detect and prevent previously known threats by cross-referencing information across multiple available sources. It is available on a monthly subscription and support is extended via FAQs, knowledge base, and an online inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/909a6001-975d-4061-85cc-d060491621de.png","url":"https://www.softwareadvice.com.au/software/248573/guardio","@type":"ListItem"},{"name":"ManageEngine ADSelfService Plus","position":25,"description":"ADSelfService Plus is an identity security solution that ensures secure and seamless access to enterprise resources and establishes a Zero Trust environment. With adaptive multi-factor authentication (MFA), single sign-on (SSO), self-service password management, a password policy enhancer, remote work enablement, and workforce self-service, ADSelfService Plus provides your employees with secure, simple access to the resources they need. ADSelfService Plus helps keep identity-based threats out, fast-tracks application onboarding, improves password security, reduces help desk tickets, and empowers remote workforces.\nThe core features of ADSelfService Plus include:\nAdaptive MFA\nEnable context-based MFA with 19 different authentication factors for endpoint and application logins.\nEnterprise SSO\nAllow users to access all enterprise applications with a single, secure authentication flow.\nPassword management and security\nSimplify password management with self-service password resets and account unlocks, strong password policies, and password expiry notifications.\nEnterprise self-service\nDelegate profile updates and group subscriptions to end users and monitor these self-service actions with approval workflows.\nRemote work enablement\nEnhance remote work with cached credential updates, secure logins, and mobile password management.\nPowerful integrations\nEstablish an efficient and secure IT environment through integration with SIEM, ITSM, and IAM tools.\nReporting and auditing\nSimplify auditing with predefined, actionable reports about authentication failures, logon attempts, and blocked users.\n\nHighlights\n- Keep identity-based threats out with adaptive MFA for endpoints\n- Eliminate password fatigue by providing users with secure and seamless access to enterprise applications using SSO and password sync\n- Minimize help desk workload by drastically reducing password-related tickets using password self-service\n- Fortify weak passwords with strong password policies\n- Secure remote work by providing protected access to resources even outside the corporate network\n- Remind users to change their AD password before it expires using password expiration notifications\n- Keep users' AD profile details up to date by allowing them to securely perform directory self-updates\n- Comply with regulatory standards, like the GDPR, NIST, and the PCI DSS\n- Create a Zero Trust network infrastructure.\n\nManageEngine also offers Onboarding for ADSelfService Plus which is our holistic solution implementation service by experts for your unique business requirements. Get onboarding services here \nhttps://www.manageengine.com/onboarding/iam-and-siem-onboarding.html?utm_source=Softwareadvice&utm_medium=onboardingl&utm_campaign=product_listing_default","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/06249093-2b5e-414f-a618-0ce8af36eac1.png","url":"https://www.softwareadvice.com.au/software/360383/manageengine-adselfservice-plus","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2#itemlist","numberOfItems":25}
</script>
