---
description: Page 3 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Cloud Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cloud Security Software](https://www.softwareadvice.com.au/directory/4329/cloud-security/software) > [Page 3](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3)

# Cloud Security Software

Canonical: https://www.softwareadvice.com.au/directory/4329/cloud-security/software

Page: 3 / 12\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=4)

-----

## Products

1. [Conecta Suite](https://www.softwareadvice.com.au/software/366554/conecta-suite) — 4.9/5 (47 reviews) — Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team pr...
2. [Incapsula](https://www.softwareadvice.com.au/software/137167/incapsula) — 4.6/5 (47 reviews) — Incapsula is a cloud-based application delivery controller (ADC) platform, which uses a global content delivery netwo...
3. [Zoho Vault](https://www.softwareadvice.com.au/software/395435/zoho-vault) — 4.5/5 (43 reviews) — Zoho Vault is a cloud-based security solution that helps teams manage their online passwords. Users can store and org...
4. [GitGuardian](https://www.softwareadvice.com.au/software/206200/gitguardian) — 4.8/5 (42 reviews) — GitGuardian is an end-to-end NHI security platform designed to help organizations strengthen their Non-Human Identity...
5. [Cato Networks Suite](https://www.softwareadvice.com.au/software/228235/cato-networks-suite) — 4.7/5 (42 reviews) — Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other asse...
6. [AppDynamics](https://www.softwareadvice.com.au/software/433734/appdynamics) — 4.5/5 (41 reviews) — AppDynamics is an AI-powered application performance management (APM) platform that provides businesses with complete...
7. [Workspace ONE](https://www.softwareadvice.com.au/software/445973/workspace-one) — 4.6/5 (40 reviews) — Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage...
8. [NordPass Business](https://www.softwareadvice.com.au/software/405360/nordpass-business) — 4.5/5 (39 reviews) — NordPass Business — The Ultimate Password Manager for Your Organization. Trusted by businesses worldwide, NordPass Bu...
9. [SafeDNS](https://www.softwareadvice.com.au/software/167341/safedns) — 4.7/5 (35 reviews) — SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection...
10. [Runecast](https://www.softwareadvice.com.au/software/321119/runecast-analyzer) — 4.9/5 (34 reviews) — Runecast is a provider of one solution designed to help IT Security and Operations teams like yours effectively manag...
11. [Zivver](https://www.softwareadvice.com.au/software/214024/zivver) — 3.7/5 (33 reviews) — Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure digita...
12. [Qualys Cloud Platform](https://www.softwareadvice.com.au/software/262425/qualysguard-enterprise) — 4.0/5 (33 reviews) — Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize t...
13. [Sumo Logic](https://www.softwareadvice.com.au/software/80463/sumo-logic) — 4.6/5 (33 reviews) — Sumo Logic is a cloud-based log management platform that helps small to large businesses create, manage and archive e...
14. [BooleBox](https://www.softwareadvice.com.au/software/193648/boolebox) — 4.6/5 (33 reviews) — Boolebox is a data protection suite designed to protect sensitive information against unwelcome hackers and third par...
15. [OVHcloud](https://www.softwareadvice.com.au/software/228490/ovhcloud) — 4.1/5 (30 reviews) — As a world-class leader and Europe’s leading cloud services provider, OVHcloud offers services that combine performan...
16. [Logz.io](https://www.softwareadvice.com.au/software/165988/logz-io) — 4.6/5 (30 reviews) — Logz.io is a cloud-based log management and log analysis solution with alerts and machine-learning algorithms. It bas...
17. [Coro](https://www.softwareadvice.com.au/software/287338/coronet) — 4.6/5 (30 reviews) — Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, tran...
18. [Dark Web ID](https://www.softwareadvice.com.au/software/426822/dark-web-id) — 3.7/5 (30 reviews) — Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizati...
19. [Hyperglance](https://www.softwareadvice.com.au/software/381934/hyperglance) — 4.6/5 (29 reviews) — Hyperglance is an intuitive cloud management platform, designed for Cloud Professionals including engineers, architec...
20. [AxCrypt](https://www.softwareadvice.com.au/software/185920/axcrypt) — 4.9/5 (27 reviews) — AxCrypt is an encryption software with 256-bit AES encryption, developed for both businesses and private individuals....
21. [SiteLock](https://www.softwareadvice.com.au/software/112461/sitelock) — 3.3/5 (27 reviews) — SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the...
22. [BetterCloud](https://www.softwareadvice.com.au/software/261938/bettercloud) — 4.0/5 (27 reviews) — BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS manageme...
23. [Invicti](https://www.softwareadvice.com.au/software/174628/netsparker-security-scanner) — 4.7/5 (26 reviews) — Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web appl...
24. [Trend Micro Deep Security](https://www.softwareadvice.com.au/software/241706/trend-micro-deep-security) — 4.4/5 (24 reviews) — Trend Micro Deep Security is a cloud-based platform designed to help businesses of all sizes identify threats and ens...
25. [Atlantic.Net Cloud Platform](https://www.softwareadvice.com.au/software/346368/atlantic-net-cloud-platform) — 5.0/5 (24 reviews) — Atlantic.Net Cloud Platform helps organizations launch and scale their businesses with cloud services and infrastruct...

-----

Page: 3 / 12\
Prev: [Previous page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=4)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.com.au/directory/4528/security/software)
- [Data Loss Prevention Software](https://www.softwareadvice.com.au/directory/4270/data-loss-prevention/software)
- [Vulnerability Management Software](https://www.softwareadvice.com.au/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.com.au/directory/4170/network-security/software)
- [Cloud Management Software](https://www.softwareadvice.com.au/directory/4676/cloud-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.com.au/directory/4329/cloud-security/software)
- [All Categories](https://www.softwareadvice.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Software Advice helps businesses in Australia find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.com.au","url":"https://www.softwareadvice.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice Australia","url":"https://www.softwareadvice.com.au/","@type":"WebSite","@id":"https://www.softwareadvice.com.au/#website","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cloud Security Software","description":"Page 3 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3","about":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#webpage","mainEntity":{"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.softwareadvice.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cloud Security Software","position":2,"item":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Cloud Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Conecta Suite","position":1,"description":"Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.\nBy integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.\nConecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:\n✅ Automatic email signature reapplication;\n✅ Access restrictions by time, system, browser, and IP;\n✅ Custom shift scheduling;\n✅ Automatic or manual device disconnection;\n✅ Deactivation of licenses for former employees;\n✅ Detailed reports on logins and file sharing;\n✅ Custom login screen with company branding;\n✅ Email and Drive file migration between users","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6430a9a4-eb31-4865-a5cb-12699bdde077.png","url":"https://www.softwareadvice.com.au/software/366554/conecta-suite","@type":"ListItem"},{"name":"Incapsula","position":2,"description":"Incapsula is a cloud-based application delivery controller (ADC) platform, which uses a global content delivery network (CDN) to manage website performance, compliance and application security against distributed denial of service (DDoS) attacks across all networks. Designed for all business sizes in education, financial services, gaming, health care and IT industries, it provides solutions to simplify operations and reduce costs by facilitating management of various applications on a single platform.\n\n\nIncapsula’s key features include web threat management, application firewall security, local and global server load balancing, a health monitor, a rule editor, exception handling and virtual patching. Additionally, it protects against all threats, from SQL injections and cross-site scripting (XSS) to remote file inclusion (RFI).\n\n\nSupport is extended via phone, online chat and documentation and pricing is available on request.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bea053c0-89a1-44a1-8db1-0beb01cfe5c2.png","url":"https://www.softwareadvice.com.au/software/137167/incapsula","@type":"ListItem"},{"name":"Zoho Vault","position":3,"description":"Zoho Vault is a cloud-based security solution that helps teams manage their online passwords. Users can store and organize passwords in the database and Zoho Vault encrypts them using AES-256. Teams can share passwords with each other and access privileges can be set for each member. Mobile apps are available for Android and iOS\n\n\nZoho Vault allows users to log in directly to other websites and applications without entering login credentials. They can also establish ownership for all passwords stored in the system and password policies can be established so that team members are required to generate strong passwords.\n\n\nPasswords can be imported in bulk and exported for offline access. An activity can be tracked through audit trails and users can centrally control access to the system. The solution integrates with directories and productivity suites for onboarding.\n\n\nZoho Vault is priced per user on a monthly subscription basis.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/85bb00d1-4239-4541-ba0f-596306acad53.png","url":"https://www.softwareadvice.com.au/software/395435/zoho-vault","@type":"ListItem"},{"name":"GitGuardian","position":4,"description":"GitGuardian is an end-to-end NHI security platform designed to help organizations strengthen their Non-Human Identity (NHI) security posture and address compliance standards and regulations. As attackers increasingly target NHIs, such as service accounts, service principals, and applications, protecting and managing these critical assets has become paramount. NHIs rely on “secrets” like API keys and certificates for authentication, and their rapid proliferation has led to significant secrets sprawl.\n\nGitGuardian’s platform is built on two core pillars: **Secrets Security** and **NHI Governance**, delivering a holistic approach to NHI security.\n\nWith **Secrets Security**, GitGuardian aims to eliminate leaks and sprawl, detecting compromised or misused secrets across both public and internal environments. This foundation of NHI security is strengthened by monitoring for incidents, policy violations, and illegitimate use of secrets. GitGuardian offers three powerful products under its **Secrets Security** umbrella.\n\nGitGuardian’s **Secrets Detection** tackles internal secrets sprawl by identifying sensitive data in source code and developer productivity tools. The platform supports over 420 types of secrets, including API keys, private keys, and database credentials. With a robust policy engine, security teams can enforce rules across major version control systems (VCSs) like GitHub, GitLab, BitBucket, and Azure DevOps, CI/CD tools such as Jenkins, Travis CI as well as tools like Slack, Jira, container registries, and more.\n\n**GitGuardian Public Monitoring** scans public GitHub repositories, detecting sensitive information in both organizational and developers' public personal repos. This is crucial, as 80% of corporate secrets leaked on public GitHub stem from personal accounts.\n\n**GitGuardian Honeytoken** deploys decoy secrets that lure attackers looking for active secrets across your assets. Any unauthorized access attempts will trigger immediate alerts, enabling rapid detection and response during the software development lifecycle.\n\n**With NHI Governance**, GitGuardian offers a centralized inventory of secrets, tracking their context and usage. This enables teams to detect high-risk secrets, manage their rotation, and leverage analytics to enhance the overall NHI security posture. Together, **Secrets Security** and **NHI Governance** work symmetrically: one track focuses on detecting compromised secrets, while the other manages legitimate usages of secrets and their lifecycle.\n\nTrusted by over 600,000 developers and recognized as the top security app on GitHub Marketplace, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF, and Bouygues Telecom, ensuring robust protection for their sensitive secrets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/82ad43c2-b2f2-4c4f-aa59-bb660d5f3727.png","url":"https://www.softwareadvice.com.au/software/206200/gitguardian","@type":"ListItem"},{"name":"Cato Networks Suite","position":5,"description":"Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other assets across the organizations on a unified and secure network. It enables businesses to manage traffic optimization and routing for wide area networks (WAN) and cloud traffic to ensure maximum uptime.\n\nCato Networks Suite allows enterprises to share and route data using a converged network of point of presence (PoP) access points to improve data access speed. The platform offers an integrated stack of security applications, which includes firewalls, secure web gateway with URL filtering (SWG), anti-malware protection, IPS-as-a-service (IPS) and managed threat detection and response (MDR) system. Additionally, administrators can track usage of various applications, network topology/ activities and trends.\n\nCato Networks Suite lets managers enable or disable connectivity between sites, restrict or allow specific applications and monitor security events. Pricing details are available on request and support is extended via email and an online portal.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/979dc7eb-f9d0-4b41-a083-8aebcd2576e0.png","url":"https://www.softwareadvice.com.au/software/228235/cato-networks-suite","@type":"ListItem"},{"name":"AppDynamics","position":6,"description":"AppDynamics is an AI-powered application performance management (APM) platform that provides businesses with complete observability over the performance of their IT infrastructure. Unifying full-stack performance monitoring, AppDynamics can turn IT performance into profit by providing insights and visibility over every component, from servers to cloud-native environments.\n\n\nAppDynamics can manage, monitor, and analyze the performance of enterprise business applications with dynamic IT monitoring, application mapping, automatic issue detection, root-cause diagnosis, and real-time performance intelligence. With auto-discovery capabilities, AppDynamic can capture business transactions by tracking every component of any application and visualizing these components in a topology map. For performance monitoring, baselines are automatically created to track the fluctuating patterns of any performance metric. Automatic detection capabilities can identify performance anomalies and notify IT departments before the anomaly becomes an issue.\n\n\nAdditionally, AppDynamics can assist IT administrators with resolving issues in live environments by assessing application behavior and performance using business transaction snapshots. With AppDynamics' customizable business intelligence dashboard, Business iQ, non-technical users can view business health and performance to make clear and informed decisions.\n\n\nAppDynamics can be enhanced through integration with a number of industry solutions such as Jira, Kubernetes, AWS, Azure, and much more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d01a53c3-a7cb-4f8e-a229-4e9af4545e0b.jpeg","url":"https://www.softwareadvice.com.au/software/433734/appdynamics","@type":"ListItem"},{"name":"Workspace ONE","position":7,"description":"Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage and deliver any app anywhere and on any device. It provides one source of truth for end user access,  provisioning, security, compliance, and management across all devices","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c6cdd3de-a711-4714-84b9-b152bcdf6e3b.png","url":"https://www.softwareadvice.com.au/software/445973/workspace-one","@type":"ListItem"},{"name":"NordPass Business","position":8,"description":"NordPass Business — The Ultimate Password Manager for Your Organization.\n\nTrusted by businesses worldwide, NordPass Business offers a cutting-edge, zero-knowledge security architecture password management solution for businesses of all sizes and industries.\n\nNordPass Business is designed to empower organizations by simplifying password management, enhancing security, and improving productivity.\n\nNordPass Business provides an array of features that make it an indispensable tool for businesses:\n- Log in to your accounts instantly.\n- Safely share access and sensitive data between teams.\n- Smoothly onboard and offboard employees.\n- Enforce a company-wide password policy.\n- Receive instant breach alerts.\n- Identify weak, old, or reused passwords.\n- Get access to the activity log of all employees\nAnd more.\n\nYou can also use passkeys - a new type of authentication that allows users to securely log in to websites and applications without having to enter their password.\n\nUnlock your team's full potential by letting NordPass take the load off their hands without sacrificing security!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b147dceb-38d5-4aad-a161-8a06ef2df474.png","url":"https://www.softwareadvice.com.au/software/405360/nordpass-business","@type":"ListItem"},{"name":"SafeDNS","position":9,"description":"SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection against dangerous, inappropriate and irrelevant sites. The solution also caters to educational institutions and home users.\n\n\nSafeDNS can be installed on individual devices and on routers to protect all users on a network. The SafeDNS service helps users block entire content categories and specific websites. The solution filters out botnets, malicious and phishing websites and most of online advertising such as context ads, video and audio advertisements, banners and pop-ups.\n\n\nSafeDNS filters online content according to user-introduced filtering rules. The SafeDNS service resolves DNS requests and matches them with its existing database of categorized internet resources.\n\n\nThe service is compliant with the Children's Internet Protection Act (CIPA) and is appropriate for educational institutions including K-12 schools and higher education. It also offers an allowlist-only mode which enables network administrators give users access to permitted websites from the user's allowlist.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0f42c621-01dc-4513-8253-079efce52947.png","url":"https://www.softwareadvice.com.au/software/167341/safedns","@type":"ListItem"},{"name":"Runecast","position":10,"description":"Runecast is a provider of one solution designed to help IT Security and Operations teams like yours effectively manage and mitigate risks. Our platform offers a range of valuable features to enhance your operational efficiency and ensure system stability.\n\nWith Runecast and its agentless scanning capabilities, you gain access to comprehensive vulnerability management, security hardening guidelines, best practices, configuration management, container security, security compliance, and hardware compatibility validation. We aim to simplify the planning process for vSphere upgrades by offering a user-friendly method to validate hardware compatibility.\n\nOur platform automates vulnerability management and security standards compliance audits across various platforms, such as AWS, Azure, GCP, Kubernetes, VMware, Windows, and Linux OS. Through automated processes, we aim to save you time and effort, providing you with fit-gap analysis and remediation scripts.\n\nWe also offer support for Cloud Security Posture Management (CSPM), Kubernetes Security Posture Management (KSPM), and Governance, Risk Management, and Compliance (GRC). We strive to assist you in maintaining compliance with industry standards and frameworks that include BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog.\n\nOur AI knowledge parser, Runecast AI Knowledge Automation (RAIKA), provides your teams with regular updates and insights, helping them stay informed about potential risks. Designed with hybrid and multi-cloud environments in mind, Runecast aims to save you time and money while securing your workloads.\n\nWe pride ourselves on providing actionable insights and customizable reporting capabilities. Our platform allows for tailored reporting based on specific needs, helping you analyze patterns and generate audit reports. Each finding is accompanied by remediation guidance to empower your team to take action.\n\nYour privacy and control over your data are important to us. Runecast operates fully on-premises, ensuring that your data remains under your control. We offer a customizable rules engine, allowing you to define your own security policies.\n\nRunecast holds certifications from VMware for VMware Cloud on AWS and CIS certifications for VMware, AWS, and Windows Server. In 2020, Gartner recognized us as a \"Cool Vendor\" in their Performance Analysis for Cloud-Native Architectures report.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d21b54d1-b23a-4a89-aeb2-015c03e1e5ed.png","url":"https://www.softwareadvice.com.au/software/321119/runecast-analyzer","@type":"ListItem"},{"name":"Zivver","position":11,"description":"Zivver is the effortless, smart, secure digital communications platform powering the next generation of secure digital communications.\n\nZivver is outbound email security that prevents human error, influencing behavioural changes in real-time by alerting your people to potential security risks, like an unusual recipient, and making it easy for them to take appropriate security measures. \n\nIt integrates seamlessly with popular clients like Outlook and also scans attachments so users can send confidential data securely, up to 5TB in one email, without interrupting their workflow. After sending, control is retained, with the ability to set expiration times, retract messages fully and check who has read them. Logging and analytics help organisations to further identify potential risks. Equally important, recipients of a Zivver-secured email can read their message without having to make an account.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ef570345-18c5-478a-a323-e226ca5aa2f1.png","url":"https://www.softwareadvice.com.au/software/214024/zivver","@type":"ListItem"},{"name":"Qualys Cloud Platform","position":12,"description":"Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attacks and address potential threats.\n\nThe platform allows managers to track expired licenses, application versions and out-of-date operating systems to maintain asset inventory. Qualys Cloud enables teams to evaluate files in accordance with payment card industry data security standard (PCI DSS) and health insurance portability and accountability act (HIPAA) compliance protocols. Additionally, operators can access endpoints to quarantine files, fix misconfigurations and remove exploits on a unified interface.\n\nQualys Cloud offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Amazon Web Services, Microsoft Azure and Google Cloud Platform. Pricing is available on request and support is extended via knowledge base, phone, chat, email, FAQs and forum.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/296fda38-71c2-40bb-91b2-b8813c1a7c14.png","url":"https://www.softwareadvice.com.au/software/262425/qualysguard-enterprise","@type":"ListItem"},{"name":"Sumo Logic","position":13,"description":"Sumo Logic is a cloud-based log management platform that helps small to large businesses create, manage and archive event logs for auditing, issue tracking and compliance. The centralized platform comes with real-time analytics module for users to identify, investigate and resolve cyber threats, data breaches, and compliance negligence. \n\n\nDesigned for professionals in development, engineering, IT, customer success, product, data science, security sectors, features of Sumo Logic include multiple user profiles, access controls, auto-scheduled searches, real-time alerts, identification of potential threats, custom reports and more. The system allows users to break data into silos and improve collaboration through shareable dashboards, reports and custom searches.\n\n\nSumo Logic comes with an application programming interface, which allows enterprises to modify as well as integrate the platform with several third-party software such as Artifactory, MongoDB, Data Volume, CrowdStrike, Apache, Google Apps, Heroku, Microsoft SQL Server, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/831933d9-71e3-4cff-81b6-34e39e50bcb2.png","url":"https://www.softwareadvice.com.au/software/80463/sumo-logic","@type":"ListItem"},{"name":"BooleBox","position":14,"description":"Boolebox is a data protection suite designed to protect sensitive information against unwelcome hackers and third parties. Although no system is completely invulnerable, the application aims to provide nearly unbreakable high-level data protection. It is suitable for all businesses and can secure all data types.\n\nThe Boolebox data protection suite has a control panel that allows administrators to activate or deactivate specific security features. Key data types that the application protects include emails and passwords and the application also offers file protection for documents stored on computers and during transfer processes. \n\nBoolebox is mainly for large or small businesses and the security solution is scalable to meet company needs. The application uses data encryption technology schemes that meet all GDPR requirements. Users can access the platform via a web browser and the software offers applications that users can download and install on devices or local networks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bb9ca65c-aaf7-40e4-8f11-053e2aefcc97.png","url":"https://www.softwareadvice.com.au/software/193648/boolebox","@type":"ListItem"},{"name":"OVHcloud","position":15,"description":"As a world-class leader and Europe’s leading cloud services provider, OVHcloud offers services that combine performance, security, accessibility and sustainability.\nThe company supports 1.6 million customers across 140 countries in managing, securing and scaling up their digital infrastructure.\nOVHcloud offers a wide variety of services for a range of uses, including web hosting, public and private cloud, databases, artificial intelligence, machine learning, container orchestration, and more.\nIt facilitates migration projects, whether they are hybrid, cloud or multi-cloud, with different deployment modes: multi-AZ, Local Zones or on-premises.\nAs a trusted cloud provider, OVHcloud guarantees its customers sovereignty over their data, as well as full control and transparency over its processing and location. The company also agrees to never exploit their customers’ data – neither to train its AI models nor for commercial purposes.\nFor 25 years, the company has designed, assembled and maintained its own servers, and has run its datacentres from all over the world. It also controls its proprietary fibre optic network, so that its infrastructures are protected against threats, compliant with standards, and supported by an ultra-resilient network – all thanks to its anti-DDoS expertise and innovations. Its built-in, resilient layer 4-7 protection ensures stable, fast and secure connectivity.\nOVHcloud holds multiple high-level certifications: \n•\tSOC 1, 2 and 3\n•\tHDS/HIPAA \n•\tEBA ACPE\n•\tPCI DSS\n•\tISO/IEC 27001, 27017, 27018, 27701\n•\tSecNumCloud\nThanks to its integrated model, OVHcloud can optimise every cost category to offer its customers one of the best price-performance ratios on the market. This edge is based on its commitment to open, responsible and democratic access to technology, while meeting the strategic challenges of data protection and technological independence, all within a fully customisable cloud service.\nBy directly managing its own global network, it optimises data flows, reduces latency, and increases reliability.\nPricing is transparent and predictable, with no additional fees for incoming and outgoing traffic (excluding datacentres located in APAC) and API calls.\nOVHcloud’s dedicated servers combine high reliability, customisation and scalability. Users benefit from rapid deployment, automated access, and control of all software layers, including the operating system.\nFor private cloud needs, the company offers services based on industrial standards, such as VMware and Nutanix, to deploy a tailored infrastructure in a dedicated environment.\nIts public cloud, mainly based on OpenStack and Kubernetes, offers on-demand DevOps services on shared servers. It guarantees interoperability and hybridity via API, with bespoke resources (computing, storage, network) and advanced services such as data analysis, AI, machine learning, containers, management, and more.\nIts Web Cloud services offer simple and accessible tools designed to support individuals and businesses in their digital transformation. With a rich marketplace and an active network of partners, OVHcloud helps teams overcome any technological challenges they may have.\nOVHcloud combines expertise, flexibility and resilience to help their customers adapt and perform while keeping their costs under control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c339122d-f44c-4c2d-847d-2628632085a4.jpeg","url":"https://www.softwareadvice.com.au/software/228490/ovhcloud","@type":"ListItem"},{"name":"Logz.io","position":16,"description":"Logz.io is a cloud-based log management and log analysis solution with alerts and machine-learning algorithms. It based on open-source log analysis platform the ELK Stack (Elasticsearch, Logstash, Kibana). Key features include alerts, user controls, log parsing, live trails, audit trails, archiving and ELK apps.\n\n\nUsers can create alerts for log messages and get notified via email or a messaging app using endpoints. Logz.io provides automatic parsing capability with MySQL, MongoDB, Jenkins, HAProxy and Nagios logs.\n\n\nLogz.io allows users to share visualizations and dashboards with team members, and they can manage team members rights to access data. It also supports Single Sign-On, Okta and OneLogin.\n\n\nLogz.io is HIPPA, SOC 2 Type 2, PCI Level 1, GDPR and ISO27001 compliant. It also provides a variety of built-in integrations with major applications and platforms including AWS, Docker, Ruby, Python and Java.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3ee2f193-1f20-4e82-84e4-4bd9bed34c7c.png","url":"https://www.softwareadvice.com.au/software/165988/logz-io","@type":"ListItem"},{"name":"Coro","position":17,"description":"Coro is a cybersecurity solution that helps businesses in various industrial verticals including IT, healthcare, transportation, and legal services secure devices, users, and data against online threats via a unified portal. The application automatically identifies and blocks phishing attempts across public networks, emails and applications’ access/share requests.\n\nCoro allows organizations to manage access to practice and confidential data and enforce compliance with security and governance policies. It offers a host of features such as a centralized dashboard, reports, threat monitoring, real-time notification and more. Additionally, administrators can define default actions like restoration/deletion of quarantined files and monitor activities of users across departments. \n\nCoro’s integrated ransomware and malware detection system automatically scans and quarantines documents, emails and cloud apps like Microsoft 365, Dropbox and Salesforce. It is available for free and on monthly/annual subscriptions. Support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7bb65fb-d004-4062-bff9-6fa16d33474d.png","url":"https://www.softwareadvice.com.au/software/287338/coronet","@type":"ListItem"},{"name":"Dark Web ID","position":18,"description":"Designed for MSP and internal teams, Dark Web ID is a cloud-based threat monitoring solution that protects organizations from cybersecurity breaches on the dark web. Dark Web ID monitors the dark web for threat intelligence about stolen credentials and organizational data to help businesses identify potential security breaches. Features include threat monitoring and response, real-time data analysis and validation, security alerts, and more.\n\n\nDark Web ID assists MSP and internal IT teams with monitoring the transfer of stolen credentials across hidden chat rooms, private websites, P2P networks, social media platforms, black market sites, and more. With threat response, Dark Web IT will alert organizations when customer or employee credentials are found and take the necessary action to inform teams before any breaches occur.\n\n\nDark Web ID provides flexible threat reporting and is able to integrate with third-party cybersecurity platforms using an integrated API.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6de1646f-1b5d-40f7-ada6-4494ba1c0a0c.png","url":"https://www.softwareadvice.com.au/software/426822/dark-web-id","@type":"ListItem"},{"name":"Hyperglance","position":19,"description":"Hyperglance is an intuitive cloud management platform, designed for Cloud Professionals including engineers, architects, FinOps, engineers, and SecOps. All deployed within the boundaries of the cloud, the solution offers features such as architectural diagramming, cloud resource inventorying, security & compliance management, automation, and cost management. \n\nIs the cloud environment out of control?\n- Aggregates cloud inventory that users can quickly search, filter and export\n- Manages cloud environments with one single dashboard\n- Full cloud resource inventory across single or multiple clouds\n\nSpending countless hours understanding and documenting cloud environment?\n- Automatic, exportable, and interactive architecture diagrams automatically created live in minutes\n- Power query features enable deep search of inventory and its metadata\n- Automatically documents the cloud\n- Generates detailed architectural diagrams and export them as VSDX, PNG or CSV\n\nAre cloud costs becoming unmanageable?\n- Cost optimizations to reduce cloud bill by up to 30% or more\n- See exactly where users are spending money across their cloud, even contextualized within their cloud diagram\n- Takes advantage of AWS reserved-instances (RI) & right-sizing recommendations\n\nIs cloud security & compliance a top of mind concern?\n- Cloud security & compliance monitoring; comply with key frameworks - AWS Well-Architected, NIST, CIS, HIPPA, PCI DSS, FedRAMP, DISA and others\n- 200+ built-in customizable rules & alerts to optimize environments\n- Views issues, in context, with powerful and interactive architectural diagrams\n- Library of automations enables users to remediate issues in real-time","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/484f0e6c-37a5-4c9e-a45c-35c305190461.jpeg","url":"https://www.softwareadvice.com.au/software/381934/hyperglance","@type":"ListItem"},{"name":"AxCrypt","position":20,"description":"AxCrypt is an encryption software with 256-bit AES encryption, developed for both businesses and private individuals. The Premium and Business subscriptions offer cloud storage awareness and key sharing to enable file sharing between users. This allows the user to comply with data protection regulation, whilst simultaneously protecting vital files from data breaches.  \n\n\nAxCrypt Premium and Business subscriptions offer a password manager and generator to ensure cybersecurity across processes. The solution is available in a variety of languages, including English, Dutch, French, German, Italian, Korean, Portuguese, Spanish, Swedish, Turkish, Russian, Polish and more.\n\nFEATURES:\n\n- File Encryption: Use AxCrypt to encrypt sensitive documents, photos, videos, and other files in your phone’s storage.\n\n- Cloud File Encryption: AxCrypt integrates with Google Drive, OneDrive, and Dropbox to secure files stored on them.\n\n- Password Manager: Use AxCrypt’s built-in password manager to generate, save, and manage strong passwords. You can also securely save credit and debit card information and write encrypted notes.\n\n- Secure File Sharing: Encrypted files can be shared with others using just an email address. Only the shared recipients can access and modify the file.\n\n- Master Key: Manage, reset, and recover encrypted accounts within your organizations if someone forgets their password.\n\n- Desktop Version: Auto-encrypt files on your Windows or Mac and sync encrypted files to your cloud storage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ddd86105-42cb-4c25-af2e-64cb34d25428.png","url":"https://www.softwareadvice.com.au/software/185920/axcrypt","@type":"ListItem"},{"name":"SiteLock","position":21,"description":"SiteLock is a cloud-based security platform, which helps accelerate website performance, conversions and protects the online business against hackers. Designed for all industries, the platform provides solutions for vulnerability management, database protection and compliance maintenance across all applications.\n\n\nKey features of SiteLock include search engine monitoring and spam blacklists, detecting malware and automatically initiating the removal process, protection of the WordPress database and vulnerability patching of core client management systems.\n\n\nSiteLock’s TrueCode (SAST), static application security testing module, helps find common vulnerabilities in all applications with in-depth analysis. Its TrueShield Web Application Firewall (WAF) filters out malicious traffic and prevents attacks. The software offers compatibility with any hosting environment and maintains compliance with Payment Card Industry (PCI) data security standards.\n\n\nSiteLock allows application programming interface (API) integration and comes with an iOS mobile application. It is available on a monthly subscription and extends 24/7 customer support via phone, email, chat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6dc6f5dd-7237-4f5c-a5cf-b4098df41023.png","url":"https://www.softwareadvice.com.au/software/112461/sitelock","@type":"ListItem"},{"name":"BetterCloud","position":22,"description":"BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlining and automating critical work like user lifecycle processes and day-to-day operations, BetterCloud's thousands of customers enjoy greater operational efficiency and employee productivity.\n\nHeadquartered in New York City, with a product and engineering office in Atlanta, GA as well as innovation hubs & remote talent across the U.S., BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8cd9b89c-b82d-4b96-8c9b-6abd2bbd2367.jpeg","url":"https://www.softwareadvice.com.au/software/261938/bettercloud","@type":"ListItem"},{"name":"Invicti","position":23,"description":"Invicti is an application security platform designed to identify, validate and prioritize vulnerabilities in web applications and APIs. It incorporates Application Security Posture Management capabilities to support security operations across large application portfolios. The platform is used by organizations in sectors such as government, IT, telecommunications, financial services and healthcare to help maintain compliance standards and manage security at scale.\n\nThe platform includes Dynamic Application Security Testing, Static Application Security Testing, Software Composition Analysis, container security scanning and API security testing. Its scanning engine validates detected vulnerabilities to confirm they are exploitable. It identifies websites, applications, APIs and hidden assets within an organization and prioritizes high-risk applications for testing. The Application Security Posture Management feature consolidates findings from various security tools, providing a centralized view for vulnerability management and risk assessment.\n\nInvicti offers AI-powered remediation guidance, identifying the exact code locations of vulnerabilities and providing detailed resolution steps for developers. It supports integration with various development and security tools through a REST API and is compatible with CI/CD pipelines and DevOps workflows. The platform includes flexible deployment options and role-based access control to manage security across extensive application environments while maintaining accuracy and performance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.softwareadvice.com.au/software/174628/netsparker-security-scanner","@type":"ListItem"},{"name":"Trend Micro Deep Security","position":24,"description":"Trend Micro Deep Security is a cloud-based platform designed to help businesses of all sizes identify threats and ensure runtime security for workloads across physical, virtual, cloud and container environments by leveraging machine learning and virtual patching technologies. Features include incident response and remediation, system lockdown, device discovery, firewall, botnet tracking and event whitelisting. \n\nThe solution lets IT administrators view alert status, history, activities along with software updates on a centralized dashboard. Trend Micro Deep Security allows IT teams to automate security deployment, manage policies, conduct health checks and prepare compliance reports. Its container image scanning feature helps engineers track vulnerabilities, secrets, malware and compliance disruptions in the build pipeline. \n\nTrend Micro Deep Security offers integration with multiple third-party SOAR, SIEM and orchestration tools such as Puppet, Ansible or Chef. It offers hourly pricing and extends support via documentation and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8ef5f86f-1aa9-49fc-8c0f-92e11fd7a0c7.png","url":"https://www.softwareadvice.com.au/software/241706/trend-micro-deep-security","@type":"ListItem"},{"name":"Atlantic.Net Cloud Platform","position":25,"description":"Atlantic.Net Cloud Platform helps organizations launch and scale their businesses with cloud services and infrastructure. Key features include cloud virtual servers, secure block storage, snapshots, regulatory compliance, control panel, dedicated hosts, cloud backups, and managed services. \n\nThe ACP secure control panel enables teams to create and manage cloud virtual servers, SSH keys, DNS records, block storage, private and public IPs, and more from within a single platform. The solution allows managers to restore servers to the point in time when a snapshot was taken, create new servers from snapshots, or transfer a copy of snapshots to another location.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/78c1de0c-00d8-45c7-a276-498eb15e8826.jpeg","url":"https://www.softwareadvice.com.au/software/346368/atlantic-net-cloud-platform","@type":"ListItem"}],"@id":"https://www.softwareadvice.com.au/directory/4329/cloud-security/software?page=3#itemlist","numberOfItems":25}
</script>
