Logiciels de sécurité cloud

Un logiciel de sécurité cloud aide les entreprises à protéger les données et les applications dans le cloud en fournissant des fonctions de surveillance, de détection et de gestion des menaces de sécurité.

Pourquoi Capterra est gratuit
Avanan is the premier security solution for cloud-based email, messaging, and collaboration. Deploying in minutes, Avanans unique, multi-vendor security solution leverages the industrys best technologies to protect organizations from advanced threats such as phishing, malware, data leakage, account takeover, and shadow IT. En savoir plus sur Avanan Cloud Security Platform In just one click, secure enterprise SaaS applications such as Office 365, G Suite, Slack, and more against the latest threats. En savoir plus sur Avanan Cloud Security Platform

par Sumo Logic

(12 avis)
Sumo Logic simplifies how you collect and analyze machine data so that your team gets the insights they need to drive the best customer experience on your application. With the Sumo Logic service, you can accelerate modern application delivery, monitor and troubleshoot in real time and improve your security and compliance posture. Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. En savoir plus sur Sumo Logic Sumo Logic delivers the only cloud-native, real-time machine data analytics platform that provides Continuous Intelligence. En savoir plus sur Sumo Logic

par LifeOmic

(0 avis)
JupiterOne simplifies cloud security operations by being your single-source of security truth. Leverage the power of search, relationship visualization and automation to keep your digital environment up-to-date and secure. JupiterOne has direct integrations that automatically import and update your digital assets, a policy builder that you can customize and create in minutes and a simple search functionality for identifying issues and producing evidence of compliance. En savoir plus sur JupiterOne JupiterOne simplifies cloud security operations by being your single-source of security truth with search & relationship visualization. En savoir plus sur JupiterOne
Intelligent Discovery automates the manual process of AWS security vulnerability detection and threat identification. Our custom, read-only, collection tool identifies security threats and delivers comprehensive remediation instructions. En savoir plus sur Intelligent Discovery Intelligent Discovery© is an AWS specific application for security threat & vulnerability detection with remediation and auditing. En savoir plus sur Intelligent Discovery
Élimine tous les types de menaces, notamment les virus, les logiciels malveillants, les ransomwares, les rootkits, les vers et les logiciels espions grâce à l'option de balayage dans le cloud pour une performance et une détection encore meilleures. ESET utilise des technologies multicouches qui vont bien au-delà des capacités de l'antivirus de base. Anti-spyware, antihameçonnage, contrôle web, anti-spam et protection contre les botnets avec gestion à distance. En savoir plus sur ESET Endpoint Security Anti-spyware, antihameçonnage, contrôle web, anti-spam et protection contre les botnets avec gestion à distance. En savoir plus sur ESET Endpoint Security
Alert Logic¿s SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more ¿ with 24/7 support & SOC services. En savoir plus sur Alert Logic Cybersecurity Alert Logic seamlessly connects platform, threat intelligence & experts to deliver optimal security coverage across any environment. En savoir plus sur Alert Logic Cybersecurity

par TitanHQ

(176 avis)
Filtre web basé sur les DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de hameçonnage, tout en fournissant un contrôle du contenu web. Il filtre plus d'un demi-milliard de requêtes DNS chaque jour, identifie 60 000 itérations de logiciels malveillants par jour et compte plus de 7 500 clients. Il existe des versions via cloud et via plateforme. Améliorez votre cybersécurité dès maintenant. Essayez la version d'essai gratuite de WebTitan dès aujourd'hui, support inclus. En savoir plus sur WebTitan Filtre web basé sur le DNS qui bloque les logiciels malveillants, les ransomwares et les tentatives de phishing tout en fournissant un contrôle du contenu web En savoir plus sur WebTitan

par CloudSploit

(0 avis)
CloudSploit scans configurations of AWS accounts, looking for security concerns. Open source, with a fully free option. On SANS's Secure DevOps Toolchain. Amazon Partner. En savoir plus sur CloudSploit Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source. En savoir plus sur CloudSploit

par Skybox Security

(0 avis)
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. En savoir plus sur Vulnerability Control Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. En savoir plus sur Vulnerability Control
TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type including PCI, PII, PHI and even unstructured data formats and integrate with nearly any processor or endpoint. En savoir plus sur Cloud-Based Tokenization Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types. En savoir plus sur Cloud-Based Tokenization

par Lacework

(0 avis)
Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Laceworks unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance. En savoir plus sur Lacework Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks. En savoir plus sur Lacework

par SiteLock

(13 avis)
SiteLock est le leader mondial de la sécurité des sites web, protégeant actuellement plus de cinq millions de sites web. L'entreprise fournit des solutions de sécurité évoluées basées sur le cloud pour les organisations de toutes tailles. Les produits SiteLock incluent une analyse quotidienne avec suppression automatique des logiciels malveillants, un pare-feu d'application web géré avec un CDN global pour un site web rapide et puissant, une protection DDoS avancée et un personnel d'assistance téléphonique basé aux États-Unis 24h/24, 7j/7. SiteLock est le leader mondial de la sécurité des sites web, protégeant actuellement plus de cinq millions de sites web.

par Dome9 Security

(1 avis)
SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments. SaaS-based solution purpose-built to provide security and compliance across all public and hybrid cloud infrastructure environments.

par Intego

(1 avis)
Anti-virus Mac solution designed to monitor online employee activity and protect your network. Anti-virus Mac solution designed to monitor online employee activity and protect your network.

par Threat Stack

(0 avis)
Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more. Cloud security solutions for businesses that help in risk assessment, customer compliance, security monitoring and much more.

par CloudPassage

(0 avis)
CloudPassage Halo is an award-winning security solution purpose-built for the cloud that helps you automatically discover cloud assets, reduce your attack surface, and find and respond to critical risks other tools miss. The solution automates security and compliance for any mix of hybrid cloud infrastructure components (servers, containers, IaaS resources & services) with the speed, scalability, portability and automation needed to succeed in these new environments. Cloud infrastructure security solution that helps reduce your attack surface, and find and respond to critical risks other tools miss.

par ZEROSPAM

(120 avis)
Protégez votre messagerie contre le ransomware, le spear phishing et toutes les autres menaces. ZEROSPAM est une solution de messagerie sécurisée basée sur le cloud hautement efficace et facile à utiliser, avec un taux de capture de 99,9 % contre toutes les formes de menaces transmises par e-mail. Entièrement compatible avec Office 365, elle offre une protection supérieure contre le ransomware et le phishing, la meilleure protection contre le spear phishing du secteur et un taux de faux positifs très faible. L'équipe orientée services de ZEROSPAM propose un anti-spam complet et extrêmement précis. Une solution anti-spam basée sur le cloud qui offre une protection supérieure contre les menaces transmises par e-mail telles que le ransomware et le spear phishing.
Deep Security delivers multiple XGen threat defense techniques for protecting runtime physical, virtual and cloud workloads, and containers. Reducing the number of security tools, a single dashboard combines capabilities with full visibility into leading environments like VMware and AWS. Deep Security lowers the cost and complexity of securing workloads across multiple environments that virtually shield servers from the latest advanced threats like ransomware and network-based vulnerabilities. Protect your business across physical, virtual cloud and container environments with central visibility and control.

par NetApp

(8 avis)
Logiciel permettant aux utilisateurs d'améliorer l'efficacité du stockage en contrôlant à distance l'infrastructure numérique. Logiciel permettant aux utilisateurs d'améliorer l'efficacité du stockage en contrôlant à distance l'infrastructure numérique.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence. Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.

par Palo Alto Networks

(2 avis)
Prevent data loss and threats with this virtualized firewall for private and public cloud environments. Prevent data loss and threats with this virtualized firewall for private and public cloud environments.
Stealthwatch Cloud automatically detects early indicators of compromise. These include insider threat activity, malware, and multistaged attacks. Improve security and incident response across the distributed network, from the office to the public cloud. Detect threats in real time. Reduce false positives. Gain actionable security intelligence to make your security team more efficient. And do it all while lowering costs. Protect your cloud assets and private network. Improve security and incident response across the distributed network.

par SecureAuth

(1 avis)
Contrôle d'accès adaptatif, permettant aux organisations de déterminer les identités en toute sécurité. Contrôle d'accès adaptatif, permettant aux organisations de déterminer les identités en toute sécurité.
Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of tokens and two-factor authentication methods. Authentication as-a-Service that secures access to your data and applications in the cloud with a wide range of authentication methods.

par CA Technologies

(1 avis)
Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess security risks. Web Application Scanning (WAS) solution that makes it possible to monitor SaaS applications, find vulnerabilities and assess risks.

par ThreatTrack Security

(1 avis)
Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud. Add visibility to your endpoint security with dynamic dashboards and detailed system reports in the cloud.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security. Zscaler delivers the entire gateway security stack as an easily deployed cloud service.
Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows Security Policy Management Software for IBM i, UNIX, Linux, AIX, and Windows

par C3M

(1 avis)
C3M is a unique security management solution giving enterprises complete control over their cloud environment and the ability to manage compliance with HIPAA, PCI-DSS, GDPR, GLBA, ISO 27001, NIST and other relevant compliances, all at the click of a button. C3M monitors an enterprise's cloud infrastructure 24/7, combining it with C3M's real-time analytics platform to detect resources that drift from security best practices and auto-remediate any violations back to a compliant state. A platform ensuring total cloud control along with ease of managing cloud security and compliance across multiple cloud environments.

par Multapplied Networks

(1 avis)
White label SD-WAN for ISP, MSP, & telecoms. White label SD-WAN for ISP, MSP, & telecoms.

par Entrust Datacard

(1 avis)
Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth. Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.
DataDome est spécialisé dans la protection et l'accélération des activités numériques. Grâce à cette solution de gestion de robot pilotée par IA, les entreprises peuvent améliorer les performances des sites web surchargés par un scraping intensif ; protéger les données des utilisateurs contre les pirates ; prendre de meilleures décisions marketing et commerciales grâce à des données analytiques non contaminées par le trafic de robots. Développez et exécutez votre stratégie de gestion de robot grâce au tableau de bord, aux rapports et aux alertes en temps réel. Solution de gestion de robot pilotée par IA pour protéger tous vos points de vulnérabilité (sites web, applications, etc.) et accélérer votre activité numérique.

par Marty Soft Conception

(0 avis)
Secures and easily protects a Windows Remote Desktop Server against cyber criminals. RDS-Shield is a standalone Windows Service managing a lot of servers events, and an intuitive Administration interface. Forget the complexity of GPO & AD. Simply say : Now, all users of this group are in Highly secured user environment, but in this same group, this account will be in Secured user session, when other will work in Kiosk Mode. Set Hours Restrictions with Time Zone and Homeland access. Secures and easily protects a Windows Remote Desktop Server against cyber criminals.

par Akamai Technologies

(0 avis)
Threat protection software that detects access by spiteful domains and stops them from exfiltrating data. Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.

par Rohde & Schwarz Cybersecurity

(0 avis)
Rohde & Schwarz Cybersecurity vous aide à sécuriser vos applications sur le cloud et vos services web.

par Cato Networks

(0 avis)
Gère un réseau étendu, mesure la qualité du transport en temps réel et utilise le routage basé sur les règles pour acheminer le trafic spécifique à l'application. Gère un réseau étendu, mesure la qualité du transport en temps réel et utilise le routage basé sur les règles pour acheminer le trafic spécifique à l'application.
Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized management interface. Detect and mitigate malware threats with the use of machine-learning behavioral analysis, auditing tool, and centralized dashboard.

par Forcepoint

(0 avis)
Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, real-time user activity monitoring, and more. Cloud Access Security Broker (CASB) solution enables endpoint access control, malware detection, user activity monitoring, and more.
NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security defense solution. NCR Network and Security Services protects restaurant and retail network and IT infrastructures with a multi-layered security solution.

par Threat X

(0 avis)
Threat X is a SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution. Ideal for organizations across all industries with 5+ external-facing web apps looking to secure their high-volume web, cloud, & legacy apps, APIs, & microservices against an evolving threat landscape. Get your free trial today and see how Threat X delivers complete visibility and the most precise threat detection and neutralization capabilities available. SaaS-based intelligent web application firewall with DDoS, Bot, and CDN capabilities in one solution.
Elastic Workload Protector est une solution d’analyse Cloud intégrant un scanner de vulnérabilités. Grâce à cela, les infrastructures des entreprises sont protégées en permanence car elles connaissent chaque nouvelle vulnérabilité ou menace potentielle et disposent de rapports détaillés avec des solutions de remédiation adaptées. EWP protège toutes sortes d’infrastructures (traditionnelles, Cloud, virtualisées, hybrides) et les conteneurs. Sa fonction brevetée « Clone & Scan » permet aux clients de réaliser des analyses en profondeur sans impacter la production. Elastic Workload Protector (EWP) est une solution de sécurité du Cloud aidant les entreprises à protéger leurs infrastructures en continu.

par Tigera

(0 avis)
Solution for secure application connectivity for the cloud-native world. Solution for secure application connectivity for the cloud-native world.

par OPAQ Networks

(0 avis)
A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report. A streamlined assessment of technical security controls and compliance maturity yields a baseline assessment report.

par Check Point Software Technologies

(0 avis)
Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications. Check Points CloudGuard SaaS is the only security solution that prevents attacks on SaaS applications.

par Barracuda Networks

(0 avis)
Protection and Performance for the Cloud Era Protection and Performance for the Cloud Era

par Palo Alto Networks

(0 avis)
Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments. Achieve compliance and manage security risks across your Amazon Web Services, Microsoft Azure, and Google Cloud environments.
A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices. A data privacy platform that complies with GDPR regulations and manages data privacy risks through web, social and mobile devices.

par Bolt SaaS

(0 avis)
If you are only using a VPN or cloud backup, you are still vulnerable! Our Complete Security Suite provides you with overall protection of your ecosystem via VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager. Use Bolt SaaS to protect yourself on private and public WiFi from illicit monitoring, ISP spying, hackers, ransomware attacks, government intrusion, phishing schemes, among so many other security threats. VPN is not enough! Our Complete Security Suite includes VPN, SmartDNS, unlimited encrypted cloud backup/storage, and password manager.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.

par Cequence Security

(0 avis)
Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications. The extensible software platform can be deployed on premises or in the cloud. It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine. Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

par Maddox

(0 avis)
Built-In Data Leak Prevention Keep connectivity secure and prevent information leakage through no-caching and no data-storing protocols. Cost-Effective & Trusted Secure & Seamless Connectivity Promote a secure digital workspace by working in the office and on-the-go, with secure access to corporate resources. Simple Installation & Mgt No data center restructuring, SAN, VPN etc. User Flexibility User privacy & enterprise data co-exist, your business can now take advantage of BYOD. Remote-access service for business. A secure environment seamlessly access on-premise corporate systems & cloud services w/ any device!
Alcide is a cloud-native security leader with the mission to empower DevOps and security teams to manage application and networking security through the intelligent automation of security policies applied uniformly, regardless of the workload and infrastructure. Alcide's cloud-native security platform provides a single view & control into distributed and cloud-native environments.

par Coronet

(0 avis)
We make complex cloud security simple Our mission is to become the world leader in providing organizations of every size with out-of-premises security for their cloud applications, bring-your-own-devices, and communications over public networks. Coronet provides end to end data breach protection for companies that use the cloud.

par Cossack Labs

(0 avis)
Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends. Acra provides selective encryption, multi-layered access control, database leakage prevention and intrusion detection capabilities in a convenient, developer-friendly package. Acra brings encryption and data leakage prevention to distributed applications, web and mobile apps with database backends.

par Protego

(0 avis)
Serverless security automated in 20 minutes. Serverless security automated in 20 minutes.