---
description: Page 9 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 9 - Best Cloud Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software) > [Page 9](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9)

# Cloud Security Software

Canonical: https://www.softwareadvice.co.uk/directory/4329/cloud-security/software

Page: 9 / 12\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=8)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=10)

-----

## Products

1. [Jit](https://www.softwareadvice.co.uk/software/437826/jit) — 5.0/5 (1 reviews) — Jit enables full application and cloud security coverage in minutes with codified security plans. Using these plans, ...
2. [Netacea Bot Management](https://www.softwareadvice.co.uk/software/354582/netacea) — 5.0/5 (1 reviews) — Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicio...
3. [Wiz](https://www.softwareadvice.co.uk/software/415533/wiz) — 5.0/5 (1 reviews) — Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments. Wiz secures e...
4. [CheckRed](https://www.softwareadvice.co.uk/software/516435/CheckRed) — 5.0/5 (1 reviews) — CheckRed serves as a unified platform for managing security postures in both SaaS and cloud environments. It identifi...
5. [Fidelis Halo](https://www.softwareadvice.co.uk/software/436958/fidelis-halo) — 4.0/5 (1 reviews) — Fidelis Halo is a cloud-native application protection (CNAPP) platform that helps businesses secure servers, containe...
6. [Oasis Defender](https://www.softwareadvice.co.uk/software/524031/Oasis-Defender) — 5.0/5 (1 reviews) — Oasis Defender is an AI-driven Cloud Security Posture Management (CSPM) tool designed to enhance the security of mult...
7. [Controllo](https://www.softwareadvice.co.uk/software/525684/Controllo) — 5.0/5 (1 reviews) — Controllo is an AI-enabled governance, risk, and compliance (GRC) automation tool. It streamlines the process of achi...
8. [Radiant Security](https://www.softwareadvice.co.uk/software/397854/radiant-security) — 5.0/5 (1 reviews) — Radiant Security is a computer security solution that leverages artificial intelligence (AI) technology to streamline...
9. [Ericsson NetCloud Manager](https://www.softwareadvice.co.uk/software/449682/NetCloud) — 5.0/5 (1 reviews) — Ericsson NetCloud Manager is an AI-powered, cloud-native application optimized for cellular networks. It enables secu...
10. [MDI Cloud](https://www.softwareadvice.co.uk/software/449594/FreeDocs) — 5.0/5 (1 reviews) — MDI Cloud is a cloud-based document and data management platform. It caters to a wide range of industries such as con...
11. [PingFederate](https://www.softwareadvice.co.uk/software/332266/pingfederate) — 5.0/5 (1 reviews) — PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorizat...
12. [Intezer Protect](https://www.softwareadvice.co.uk/software/221587/intezer-protect) (0 reviews) — Intezer Protect is a security orchestration, automation and response (SOAR) platform designed to help businesses dete...
13. [Reblaze](https://www.softwareadvice.co.uk/software/231982/reblaze) (0 reviews) — Reblaze is a cloud-based web security software that can integrate with other solutions for extra security. The Reblaz...
14. [CloudGuard](https://www.softwareadvice.co.uk/software/240602/cloudguard) (0 reviews) — CloudGuard is a container security solution that helps businesses handle posture management, vulnerability assessment...
15. [ThreatWatch](https://www.softwareadvice.co.uk/software/240650/threatwatch) (0 reviews) — ThreatWatch is a cloud-based solution that helps businesses conduct risk assessments and identify potential vulnerabi...
16. [Area 1](https://www.softwareadvice.co.uk/software/241946/area-1-horizon) (0 reviews) — Area 1 Horizon is a secure email gateway software designed to help businesses detect and mitigate phishing attacks ac...
17. [swIDch Auth SDK](https://www.softwareadvice.co.uk/software/320674/otac) (0 reviews) — swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOT...
18. [Volterra](https://www.softwareadvice.co.uk/software/318237/volterra) (0 reviews) — F5's Volterra is a distributed cloud platform to deploy, connect, secure, and manage applications and data across mul...
19. [Crowdsec](https://www.softwareadvice.co.uk/software/267630/crowdsec) (0 reviews) — CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributi...
20. [Lepide Data Security Platform](https://www.softwareadvice.co.uk/software/248829/lepide-data-security-platform) (0 reviews) — Lepide Data Security Platform is a software solution created for all data security cases and across all data sources....
21. [HCL AppScan](https://www.softwareadvice.co.uk/software/257144/appscan) (0 reviews) — HCL AppScan is a suite of application security testing platforms, technologies, and services that help organizations ...
22. [SpamTitan Plus](https://www.softwareadvice.co.uk/software/336936/spamtitan-plus) (0 reviews) — SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspic...
23. [Caveonix](https://www.softwareadvice.co.uk/software/359369/riskforesight) (0 reviews) — Caveonix Cloud is a risk management platform compatible with IBM Cloud, AWS, Azure, OpenStack, Google Cloud, VMware a...
24. [ThreatKey](https://www.softwareadvice.co.uk/software/359274/threatkey) (0 reviews) — ThreatKey is a security solution that helps businesses manage their cloud and SaaS security posture. When setting up ...
25. [Anjuna Seaglass](https://www.softwareadvice.co.uk/software/361785/anjuna) (0 reviews) — Anjuna Confidential Computing software makes it simple for enterprises to implement Confidential Computing - allowing...

-----

Page: 9 / 12\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=8)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=10)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Data Loss Prevention Software](https://www.softwareadvice.co.uk/directory/4270/data-loss-prevention/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [Cloud Integration Software](https://www.softwareadvice.co.uk/directory/4676/cloud-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cloud Security Software","description":"Page 9 - Discover the best Cloud Security Software for your organisation. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9","about":{"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cloud Security Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software","@type":"ListItem"},{"name":"Page 9","position":3,"item":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 9 - Best Cloud Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Jit","position":1,"description":"Jit enables full application and cloud security coverage in minutes with codified security plans. Using these plans, you can tailor a developer security toolchain to your use case and implement it across your repos in Jit’s clickable interface.\n\nFrom there, Jit unifies the execution and UX of the entire developer security toolchain, and delivers it within a unique in-PR experience. For the first time, developers can view security scanning, security advice, and remediation code entirely within the PR, so they never need to leave their environment.\n\nAll of Jit's findings actually matter, because Jit can determine whether a vulnerability is exploitable in production. This prevents overwhelming lists of long false positives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4f1d6749-7e32-4eef-86af-590c50ea2eaa.jpeg","url":"https://www.softwareadvice.co.uk/software/437826/jit","@type":"ListItem"},{"name":"Netacea Bot Management","position":2,"description":"Netacea Bot Management is a bot attack protection solution for businesses. It uses machine learning to detect malicious bots, respond to attacks, and adapt to evolving threats. Netacea provides real-time threat data and can build on existing security stacks. Businesses can use this scalable solution to protect websites, mobile apps, and APIs. It integrates with third-party solutions such as Akamai, Magento, CloudFlare, and others. No hardware is required to use this solution. \n\nNetacea Bot Management includes an Intent Analytics engine that identifies the reasons behind bot activity and sophisticated attacks. It can protect against credential stuffing, account takeover, data scraping, and other types of threats. Netacea mitigates unwanted bot traffic without affecting human traffic. The platform includes dashboards, risk scoring, and reputation analysis to help businesses make informed decisions.\n\nPricing information is provided on request by Netacea. Support is provided by phone, email, and other online resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbf81c6-5592-420b-b7a4-1c1069353078.png","url":"https://www.softwareadvice.co.uk/software/354582/netacea","@type":"ListItem"},{"name":"Wiz","position":3,"description":"Wiz enables organizations globally to rapidly identify and remove critical risks in cloud environments.\n\nWiz secures everything organizations build and run in the cloud. Founded in 2020, Wiz is the fastest-growing software company in the world, scaling from $1M to $200M ARR in 2 years. \n\nWiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c8e9e142-5db8-4181-9e0c-61cfa621362c.png","url":"https://www.softwareadvice.co.uk/software/415533/wiz","@type":"ListItem"},{"name":"CheckRed","position":4,"description":"CheckRed serves as a unified platform for managing security postures in both SaaS and cloud environments. It identifies misconfigurations in commonly used SaaS applications such as Microsoft 365, Salesforce, ServiceNow, and Okta. It also extends its functionality to cloud environments including AWS, Azure, and GCP.\n\nThis platform is tailored to meet the needs of security teams in various sectors such as finance, healthcare, MSSPs, and technology companies. These teams often require a solution to secure their hybrid and multi-cloud architectures. CheckRed enhances security posture by identifying and rectifying misconfigurations across accounts, geographies, and businesses.\n\nCheckRed's features include compliance monitoring and reporting for standards such as HIPAA and PCI-DSS. It offers a comprehensive view of assets and risks on a single dashboard. Alerts are ranked based on their severity, and each alert comes with contextualized remediation instructions to facilitate a swift response. By simplifying audits and reducing alert fatigue, CheckRed allows security teams to concentrate on the most pressing issues.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e2724f3b-1b3e-4690-9adc-bfda7f7cbd06.jpeg","url":"https://www.softwareadvice.co.uk/software/516435/CheckRed","@type":"ListItem"},{"name":"Fidelis Halo","position":5,"description":"Fidelis Halo is a cloud-native application protection (CNAPP) platform that helps businesses secure servers, containers, and cloud assets. The platform enables administrators to protect, detect, remediate, and continually improve security for public, private, hybrid, and multi-cloud environments. \n\nAdditionally, Fidelis Halo offers comprehensive file integrity monitoring, built-in log-based intrusion detection, and portability without reconfiguration, ensuring compliance across cloud, on-premises, and virtual environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/be1e917a-c1e2-4f80-b1dd-3cac5673101f.png","url":"https://www.softwareadvice.co.uk/software/436958/fidelis-halo","@type":"ListItem"},{"name":"Oasis Defender","position":6,"description":"Oasis Defender is an AI-driven Cloud Security Posture Management (CSPM) tool designed to enhance the security of multi-cloud environments such as AWS, Azure, GCP, Huawei Cloud, DigitalOcean and Kubernetes.\nIt provides comprehensive protection through automated analysis, real-time monitoring, and easy-to-understand visualizations. Below are its key features and benefits:\n\n\nKey Features include:\n\nMulti-Cloud Visualization\n  - Cloud Map: Full visibility into network infrastructure across clouds.\n  - Policy Map: View and manage cloud security policies.\n  - Security Map: Identify and resolve security vulnerabilities.\n\n\nAutomated Security Analysis\n  - Network Security: Analyzes networks based on industry best practices, offering detailed, actionable remediation steps.\n  - Data Storage Security: Examines data stores for access controls, permissions, and potential vulnerabilities.\n\n\nAgentless Architecture\n  - Fast Onboarding: Simple, instant setup without agents.\n  - Seamless Integration: Works with existing cloud infrastructure without disruption.\n  - Minimizes Risks: Reduces security gaps and attack vectors by preserving the existing topology.\n\n\nBenefits\n- Effortless Security: Oasis Defender automates the most complex parts of cloud security, reducing manual effort and human error.\n- Comprehensive Protection: Ensures end-to-end security across multiple cloud environments with minimal configuration.\n- Scalable Solution: Suitable for businesses of all sizes, from startups to large enterprises, with flexible deployment options.\n- Peace of Mind: By automating threat detection and offering real-time insights, it allows businesses to focus on growth, knowing their cloud infrastructure is secure and compliant.\n\nOasis Defender is the ideal CSPM tool for organizations seeking an easy-to-deploy, highly effective solution for securing their cloud environments while maintaining compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4275edce-1a6f-446f-aab4-e5511c3fd203.jpeg","url":"https://www.softwareadvice.co.uk/software/524031/Oasis-Defender","@type":"ListItem"},{"name":"Controllo","position":7,"description":"Controllo is an AI-enabled governance, risk, and compliance (GRC) automation tool. It streamlines the process of achieving multi-framework certifications such as SOC 2, HIPAA, ISO 27001, PCI and GDPR. \n\nControllo offers a 360-degree view of an organization's compliance status against several frameworks. These frameworks are mapped to each other, along with the associated risks and control implementation. The tool integrates seamlessly with ticketing systems like Jira and ServiceNow, as well as communication tools. Additionally, the platform prioritizes vulnerabilities based on their real, impactful cyber risk to the organization, rather than just technical severity scores.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2dce6ad6-0ad4-480e-8e7e-dda48b014166.jpeg","url":"https://www.softwareadvice.co.uk/software/525684/Controllo","@type":"ListItem"},{"name":"Radiant Security","position":8,"description":"Radiant Security is a computer security solution that leverages artificial intelligence (AI) technology to streamline and automate the workflows of security analysts. It provides a gen AI assistant that helps administrators detect security incidents and initiate remediation. Radiant Security also helps automate alert triage and investigation, providing incident summaries, root cause analysis and response plans for each incident. Additionally, the response plans can also be executed manually by analysts or through response actions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5669b782-4aa6-4a91-9b5e-e0117e6668d9.png","url":"https://www.softwareadvice.co.uk/software/397854/radiant-security","@type":"ListItem"},{"name":"Ericsson NetCloud Manager","position":9,"description":"Ericsson NetCloud Manager is an AI-powered, cloud-native application optimized for cellular networks.  It enables secure, scalable management of endpoints that support public and private cellular connectivity—whether at fixed locations, in vehicles, and IoT devices operating in challenging connectivity environments.  NetCloud Manager enables lean IT operations to deploy Wireless WAN solutions with zero-touch provisioning, real-time monitoring, and centralized control accessible via browser or mobile app.  \n\nThe platform also orchestrates secure access service edge (SASE) implementations through NetCloud SASE services, which enforce zero-trust access and traffic steering policies with a unified policy engine—establishing a robust zero-trust foundation and comprehensive protection for any organization.   \n\nAI-driven features—including the NetCloud Virtual Assistant (ANA), provide guidance and accelerate issue resolution. Backed by global cloud infrastructure and unified visibility, NetCloud Manager empowers IT teams to confidently deploy, scale, and secure Wireless WANs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/24f24abe-43b0-4dc4-907e-d1898446e8e7.png","url":"https://www.softwareadvice.co.uk/software/449682/NetCloud","@type":"ListItem"},{"name":"MDI Cloud","position":10,"description":"MDI Cloud is a cloud-based document and data management platform. It caters to a wide range of industries such as construction, healthcare, legal, education, financial services, manufacturing, aerospace, retail, government, energy, pharmaceutical, not-for-profit, and emergency services..It provides a secure and centralised space for storing, organising, and collaborating on documents.\n\nWith MDI Cloud, users can streamline workflows by automating repetitive tasks, from document filing to email data extraction. The platform’s advanced search capabilities allow users to locate any file or data instantly. It also offers customisable document retention settings, ensuring compliance and reducing the risk of data loss.\n\nIt faciliates collaboration with real-time editing and version control, eliminating the task of merging updates across multiple files. MDI Cloud also supports digital signing, streamlining document approval processes. For added productivity, the AI Assistant helps summarise long documents or redact sensitive information accurately. By transitioning from mixed document management to a secure digital space, the solution simplifies complex processes and promotes responsible data management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/98b78a2b-2cb2-4351-811b-5232b6f5030a.png","url":"https://www.softwareadvice.co.uk/software/449594/FreeDocs","@type":"ListItem"},{"name":"PingFederate","position":11,"description":"PingFederate is a cloud-based software designed to streamline user authentication and single sign-on (SSO) authorization process. With support for industry-standard identity protocols like OAuth, OpenID Connect, SAML, and WS-Federation, it integrates with existing systems and offers rapid deployment capabilities.\n\nPingFederate simplifies the implementation of federated identity networks, supporting browser-based SSO and integrating with a wide range of cloud, mobile, SaaS, API, and on-premises applications. Security measures such as multi-factor authentication (MFA), contextual MFA, and adaptive authentication help protect against unauthorized access and data breaches. It offers consistent sign-on and registration processes across channels, with pre-built templates for user registration and profile management. The platform also allows administrators to easily configure authentication policies, evaluate user request conditions, and create customized policies.\n\nWith PingFederate, organizations can achieve centralized identity management, eliminate insecure password practices, reduce the risk of unauthorized access, and minimize friction in the user experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4fbe4a74-0e98-4246-83b4-2061452b9a58.png","url":"https://www.softwareadvice.co.uk/software/332266/pingfederate","@type":"ListItem"},{"name":"Intezer Protect","position":12,"description":"Intezer Protect is a security orchestration, automation and response (SOAR) platform designed to help businesses determine potential vulnerabilities across public/private cloud environments. Supervisors can perform root cause analysis of incidents, identify unauthorized codes and receive contextual alerts about threats. \n\nIntezer Protect comes with a dashboard, which allows organizations to analyze and gain an overview of asset performance or system status on a centralized platform. Developers can track memory deviations across native cloud stacks, identify high-risk applications, misconfigurations or shell commands and terminate them according to requirements. Additionally, users can secure cloud infrastructures in compliance with the National Institute of Standards and Technology (NIST) and the Center for Internet Security (CIS).\n\nIntezer Protect facilitates integration with several third-party applications, such as Splunk, Puppet, Slack and more. The product is available for free as well as on annual subscriptions and support is extended via live chat and an inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9016d827-a571-4998-8437-bc2c27ee4376.jpeg","url":"https://www.softwareadvice.co.uk/software/221587/intezer-protect","@type":"ListItem"},{"name":"Reblaze","position":13,"description":"Reblaze is a cloud-based web security software that can integrate with other solutions for extra security. The Reblaze WAF is deployed as part of a unique private cloud and does not use shared clouds to avoid vulnerabilities. The software scrubs and blocks hostile web traffic without affecting legitimate traffic. This solution is designed to prevent attacks while saving downtime that can affect businesses. \n\nReblaze provides advanced bot management, DDoS protection, human behavioral analysis, next-generation WAF, API security, automated resource scaling, and more. Its web application firewall protects against malicious payloads, code and SQL injection, form manipulation, cookie and session poisoning, and other types of attacks. \n\nPricing details are provided on request by Reblaze Technologies. Support is available via phone, email, and other online resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7b1781af-6f1c-4611-a01a-b88ca2ef88cc.png","url":"https://www.softwareadvice.co.uk/software/231982/reblaze","@type":"ListItem"},{"name":"CloudGuard","position":14,"description":"CloudGuard is a container security solution that helps businesses handle posture management, vulnerability assessment and workload protection operations. It enables DevOps teams to identify compliance risks and security threats, define policies and gain an overview of cloud assets including network topology and firewalls.\n\nCloudGuard allows users to visualize data flows and run GSL queries for immediate incident response purposes. It lets IT professionals analyze and identify suspicious elastic container service (ECS) activities. Additionally, it provides a host of features such as compliance management, application security, analytics, user management, an activity dashboard and more.\n\nCloudGuard comes with an application programming interface (API), which facilitates integration with several third-party platforms such as Terraform, Amazon Web Services (AWS), Google Cloud Platform, Slack, Microsoft Azure, Splunk, ServiceNow and more. Pricing is available on request and support is extended via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/36b15eb8-0a7e-4f9f-b13b-cb56dc30dec1.jpeg","url":"https://www.softwareadvice.co.uk/software/240602/cloudguard","@type":"ListItem"},{"name":"ThreatWatch","position":15,"description":"ThreatWatch is a cloud-based solution that helps businesses conduct risk assessments and identify potential vulnerabilities across applications. Professionals can utilize natural language processing (NLP) algorithms to collect data and gain insights into frequent patches or workarounds. \n\nThreatWatch allows organizations to conduct security scans and self-certify codes or artifacts using artificial intelligence (AI)-enabled threat intelligence. Managers can identify malware across third-party assets and generate remediation scores based on several factors, including weaponization, exploitability and more. Additionally, it lets users generate administrative reports to help them monitor ongoing trends across the web. \n\nThreatWatch facilitates integration with various third-party applications, such as Slack, MS Teams, ServiceNow, and more. Pricing is available on request and support is extended via documentation and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/053134ed-384d-40fe-8064-a2519a7878e3.jpeg","url":"https://www.softwareadvice.co.uk/software/240650/threatwatch","@type":"ListItem"},{"name":"Area 1","position":16,"description":"Area 1 Horizon is a secure email gateway software designed to help businesses detect and mitigate phishing attacks across web pages, emails and networks. It provides business email compromise (BEC) filtering functionality, enabling managers to identify spoofed users and targets.\n\nAdministrators can gain insights into active phishing campaigns and receive notifications regarding blocked web-based advertisements. Area 1 Horizon allows teams to block phishing command-and-control (C2) communications and prevent data exfiltration processes. Additionally, operators can use web crawling, user impersonation and sandbox testing to discover malware and phishing attacks. \n\nArea 1 Horizon offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Splunk, IBM QRadar, Sumo Logic, LogRhythm and Palo Alto Networks. Support is extended via phone, email and an online contact form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e20c7724-8626-48c1-88d0-c2c67587dadb.png","url":"https://www.softwareadvice.co.uk/software/241946/area-1-horizon","@type":"ListItem"},{"name":"swIDch Auth SDK","position":17,"description":"swIDch Auth SDK provides multiple robust authentication features such as FIDO-certified biometric authentication, mOTP authentication for easy mobile application, and the world’s first one-way dynamic code OTAC login. \n\nswIDch Auth SDK's various functions are verified by FIDO alliance providing super secure passwordless authentication. The SDK also provides mobile OTP function that runs on a mobile application including the use of PIN inputs or fingerprint recognition, alongside mobile OTP which generates a one-time OTP number providing the same level of solid security as standard OTPs.\n\nFor an extra level of added security, swIDch Auth SDK provides login functions based on swIDch’s unparalleled  authentication technology, OTAC (One-Time Authentication Code). Even in a networkless environment, OTAC can identify users and devices by generating a one-time random code, providing an impenetrable authentication environment in cyber security.\n\nswIDch Auth SDK unprecedented pricing policy aims to empower organisations to develop innovative products and services, especially regarding authentication, identity and access management. The Pioneer membership, which consists of a one-pack license, is $5,000 whilst its Enterprise membership charges $45,000 allowing Unlimited Licensing for internal systems and 20 licenses for reselling. Both these memberships come with technical support services to help with any queries and technical requirements.\n\nswIDch Auth SDK is designed to empower System Integration companies, security solution vendors, organisations and enterprises, who want to deploy their developers and security teams to provide reliable all-in-one authentication based on proven international standard authentication security technology. Save time and increase efficiency with swIDch Auth SDK.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ca86be52-cbd8-41d4-b08e-4c46e5926ad1.jpeg","url":"https://www.softwareadvice.co.uk/software/320674/otac","@type":"ListItem"},{"name":"Volterra","position":18,"description":"F5's Volterra is a distributed cloud platform to deploy, connect, secure, and manage applications and data across multiple clouds, private and public, and at edge locations. Volterra’s global network allows you to secure cloud applications and put critical transactions and workloads closer to end users for a faster and safer digital experience.\n\nVolterra assists DevOps and NetOps teams ease operations, security, and performance challenges with two primary products:\n\nVoltMesh – SaaS-based offering consolidating networking and security services across cloud and edge sites along with the ability to offload applications to Volterra’s global network.\n\nVoltStack – SaaS solution automating deployment, security, and operations of distributed apps and infrastructure across edge, public/private clouds and Volterra’s global application delivery network.\n\nVolterra’s solutions solve for:\n\nMulti-Cloud\n•\tConsolidate networking, security, and application delivery across cloud providers\n•\tAdvanced Kubernetes gateway with integrated security and API services across one or more clusters\n•\tGlobally distributed application gateway to deliver fast performing SaaS apps\n\nNetwork Cloud\n•\tSecure and accelerate private, hybrid or multi-cloud web applications and APIs\n•\tNetwork-hosted workloads to improve end user static and dynamic content experiences\n•\tDDoS, advanced security, and IP transit services for private or hybrid clouds\n\nEdge Cloud\n•\tCloud-native compute, storage, network, and security services across edge sites\n•\tSecure edge gateway to consolidate SDWAN, security, and API gateways\n•\tVolterra’s global network to securely connect distributed edge sites to cloud providers\n\nVolterra helps NetOps and DevOps teams improve the performance and security of their critical apps – both modern microservices-based and distributed ones, as well as traditionally designed web apps. Volterra’s architecture and solutions provide the operational simplicity, visibility, and infrastructure abstraction requires by today’s faster IT organizations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b44eb074-8d2f-4a1f-8b47-b3f69fa989af.png","url":"https://www.softwareadvice.co.uk/software/318237/volterra","@type":"ListItem"},{"name":"Crowdsec","position":19,"description":"CrowdSec aims to provide a crowd-sourced approach to common infrastructure defense problems. It does so by distributing free & open-source software allowing users to protect themselves and share information about malevolent actors within its user network.\n\nThis platform uses a decoupled approach (detect here, remedy there) and an inference engine that leverages leaky buckets, YAML & Grok patterns to identify aggressive behaviors. It acquires signals from various data sources like logs or cloud trails, Kafka, etc., normalizes them, enriches them to apply heuristics and triggers a bouncer to deal with the threat, if need be. Since it’s written in Go, it’s compatible with almost any environment, fast in execution, and resource conservative.\n\nCrowdSec captures all aggression signals (timestamp, IP, behavior) and sends them for curation. That way, it establishes a reliable IP blacklist that is constantly redistributed to the network members in order to achieve a form of digital herd Immunity. An IP caught aggressing WordPress sites will quickly be banned by all members using CrowdSec that subscribed to the WordPress defense collection.\n\nWhile CrowdSec is in charge of the detection, the reaction is performed by “bouncers” that aim to be deployable at any level of the applicative / infrastructure stack:\n- via Nftables/Iptables/Pf based on an IP set \n- via Nginx LUA scripting\n- via WordPress plugin\nOr GCP/AWS/Azure firewall, slack or scripting, notifications, etc.\n\nBouncers can enforce several types of remediation such as blocking, sending a captcha, notifying, lower rights, speed, send a 2FA request, etc. Chained leaky buckets can help sort opportunistic attacks from targeted ones. \n\nThis approach, combined with a declarative configuration and a stateless behavior, makes it an efficient tool to enhance the security of modern stacks (containers, k8s, serverless and more generally automatically deployed infrastructures).\n\nWhenever an attack is locally blocked/detected by Crowd watch, the “meta” information of the attack is shared amongst participants (source IP, date, and triggered scenario) for redistribution to network members.\n\nSome other notable features include:\n- a public hub to find, share and amend parsers, scenarios, and blockers\n- permissive open-source license (MIT) to stay business-friendly\n- Communication channels to interact with each other","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5360345c-9716-4719-bc5b-e72bada903c2.png","url":"https://www.softwareadvice.co.uk/software/267630/crowdsec","@type":"ListItem"},{"name":"Lepide Data Security Platform","position":20,"description":"Lepide Data Security Platform is a software solution created for all data security cases and across all data sources. The platform helps users protect their sensitive data from corrupt user accounts as well as from any unknown and rogue users. The software provides users with the following data protection tools: an active directory for tracking movement, threat identification and detection, data auditing, content scanning and more. Users can use the platform to analyzes threats in real-time and to integrate with other softwares such as splunk, Radar, FireEye and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/061ce824-f569-43e5-8b7b-3aebbc625076.png","url":"https://www.softwareadvice.co.uk/software/248829/lepide-data-security-platform","@type":"ListItem"},{"name":"HCL AppScan","position":21,"description":"HCL AppScan is a suite of application security testing platforms, technologies, and services that help organizations detect and remediate vulnerabilities throughout the software development lifecycle (SDLC). Powerful static, dynamic, interactive, and open-source scanning engines (DAST, SAST, IAST, SCA, API) quickly and accurately test code, web applications, APIs, mobile applications, containers, and open-source components with the help of AI and machine learning capabilities. Centralized dashboards provide visibility, oversight, compliance policies, and reporting. HCL AppScan’s scanning engines are maintained by expert security researchers and are continuously updated to remain current with recent technologies, vulnerabilities, and attack vectors. With HCL AppScan, organizations can manage their application security posture and reduce risk across their entire software supply chain.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/689f3629-4ebe-4055-96fc-1cb2288b05ef.png","url":"https://www.softwareadvice.co.uk/software/257144/appscan","@type":"ListItem"},{"name":"SpamTitan Plus","position":22,"description":"SpamTitan Plus is an anti-phishing solution that helps businesses with identifying, neutralizing, and blocking suspicious or malicious links. The main features of SpamTitan Plus include time-of-click analysis, malicious link neutralization, URL inspection, and URL rewriting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63a0fb5e-2805-4807-88a8-86141963bd37.png","url":"https://www.softwareadvice.co.uk/software/336936/spamtitan-plus","@type":"ListItem"},{"name":"Caveonix","position":23,"description":"Caveonix Cloud is a risk management platform compatible with IBM Cloud, AWS, Azure, OpenStack, Google Cloud, VMware and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3bcf9158-f766-4281-b7cc-75ab9037695e.jpeg","url":"https://www.softwareadvice.co.uk/software/359369/riskforesight","@type":"ListItem"},{"name":"ThreatKey","position":24,"description":"ThreatKey is a security solution that helps businesses manage their cloud and SaaS security posture. When setting up cloud or SaaS environments, the smallest misconfiguration can be a potential loophole for business data leaks. Our platform integrates with AWS, Azure, GCP, and SaaS apps like Zoom, Slack, Teams, Box, GitHub, Office 365, Google Workspace, and Okta. Once integrated, ThreatKey continually scans them and if a misconfiguration is detected, it provides an actionable alert to quickly remediate the issue.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f50e63d2-a03f-45f4-95ca-0ab133cb8889.jpeg","url":"https://www.softwareadvice.co.uk/software/359274/threatkey","@type":"ListItem"},{"name":"Anjuna Seaglass","position":25,"description":"Anjuna Confidential Computing software makes it simple for enterprises to implement Confidential Computing - allowing applications to operate in complete privacy and isolation, instantly, without modification. This software supports custom and legacy applications—even packaged software such as databases and machine learning systems. Both on-site and in the cloud, Anjuna's broad support provides data security across AWS Nitro, Azure, AMD SEV, Intel SGX, and other technologies.\n\nUse cases successfully implemented and have worked on include:\n\n-    Secure Cloud-Migration\n-    Database Protection\n-    Crypto MPC & Blockchain Protection\n-    Key Management Systems (KMS)\n-    Hardened DevSecOps\n\n\nAnjuna’s software is deployed on each cloud instance that runs applications requiring protection. At runtime, Anjuna’s software isolates applications and data from threats by automatically placing them in a secure enclave. Anjuna’s method for isolating applications and data in a secure enclave varies depending on which enclave technology is used: AWS Nitro, Azure with Intel SGX, or AMD SEV. Anjuna's software integrates out-of-the-box. The technical specifications for these integrations are stored in a plain text file loaded at runtime.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d899d6c6-4e46-49be-8607-911af9395ba6.png","url":"https://www.softwareadvice.co.uk/software/361785/anjuna","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4329/cloud-security/software?page=9#itemlist","numberOfItems":25}
</script>
