Compare the Top Cloud Security Software in the UK as of November 2024 - Page 8

  • 1
    Sangfor Platform-X
    Corporate networks deliver a massive number of critical applications and services, requiring the deployment of multiple security appliances to protect the network, applications and to prevent cyber-attack. As a result, security policy setup and security log analytics have become increasingly complex, requiring threat intelligence to identify and prevent advanced threats. Sangfor Platform-X is a cloud-based security management platform, equipped to manage all Sangfor security products in the cloud by collecting, analyzing, and displaying all security logs. Through integration with Sangfor's cloud-based security solution, Neural-X, Platform-X enables comprehensive security and detection by alerting administrators to attacks or threats in real-time, thus vastly simplifying security operations. Platform-X provides unified hardware status monitoring, firmware upgrade, policy synchronization, and remote login without password.
  • 2
    Cisco Secure Workload
    Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business. Automate micro-segmentation through customized recommendations based on your environment and applications. Granular visibility and control over application components with automatic detection and enforcement of compliance. Track the security posture of applications across your entire environment. Make informed decisions using automatic NIST vulnerabilities data feed.
  • 3
    Gurucul

    Gurucul

    Gurucul

    Data science driven security controls to automate advanced threat detection, remediation and response. Gurucul’s Unified Security and Risk Analytics platform answers the question: Is anomalous behavior risky? This is our competitive advantage and why we’re different than everyone else in this space. We don’t waste your time with alerts on anomalous activity that isn’t risky. We use context to determine whether behavior is risky. Context is critical. Telling you what’s happening is not helpful. Telling you when something bad is happening is the Gurucul difference. That’s information you can act on. We put your data to work. We are the only security analytics company that can consume all your data out-of-the-box. We can ingest data from any source – SIEMs, CRMs, electronic medical records, identity and access management systems, end points – you name it, we ingest it into our enterprise risk engine.
  • 4
    Agile IT

    Agile IT

    AgileIT

    Move to Office 365, Azure, or Dynamics 365 with the confidence of an award winning Microsoft Gold Partner with over 2 million accounts migrated. Protect your business and information with Microsoft 365 (including Enterprise Mobility + Security suite). Empower your organization to take full advantage of Microsoft Teams and SharePoint Online. Change the way you provide endpoint support with Windows 10 managed by Microsoft 365. Workshop with Microsoft experts to meet and maintain state, local, federal, and international compliance, security, and privacy regulations. Move beyond using Microsoft 365 as just an email and file server replacement. Simplify common business practices with Teams, SharePoint, Power Platform and Azure PaaS. Deliver technology improvements that improve YOUR customer’s experience. Proactive support, end-user empowerment. Things just work!
  • 5
    Grip Security
    Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem. Grip shines the industry’s most comprehensive light across known or unknown apps, users, their basic interactions with extreme accuracy that minimizes false positives. Grip maps data flows to enforce security policies and prevent data loss across the entire SaaS portfolio. With Grip, security teams are automatically involved in governing SaaS without becoming a roadblock. Grip channels and unites traffic across every user and device to secure all SaaS applications without requiring incremental resourcing or performance degradation. Grip works both as a standalone platform or complements a forward or reverse proxy CASB, covering the security blind spots they leave behind. Grip brings SaaS security into the modern age. Grip secures all SaaS application access regardless of device or location.
  • 6
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.
  • 7
    Symantec Storage Protection
    Many apps and services running on AWS utilize S3 buckets for storage. Over time, storage can become contaminated with malware, ransomware, and other threats - either from attackers, unwitting users, or other resources. From S3 buckets, threats can propagate to additional apps, users, or databases. Cloud Workload Protection for Storage automatically scan S3 buckets using Symantec’s suite of anti-malware technologies to keep your cloud storage and services clean. Enables secure adoption of containers and serverless technologies such as AWS Lambda. Discovers and blocks the latest threats using Symantec's suite of anti-malware technologies including reputation analysis and advanced machine learning. Industry-leading malware detection and prevention, including Symantec Insight, for fast, scalable, and reliable content scanning.
  • 8
    Trend Vision One

    Trend Vision One

    Trend Micro

    Stopping adversaries faster and taking control of your cyber risks starts with a single platform. Manage security holistically with comprehensive prevention, detection, and response capabilities powered by AI, leading threat research and intelligence. Trend Vision One supports diverse hybrid IT environments, automates and orchestrates workflows, and delivers expert cybersecurity services, so you can simplify and converge your security operations. The growing attack surface is challenging. Trend Vision One brings comprehensive security to your environment to monitor, secure, and support. Siloed tools create security gaps. Trend Vision One serves teams with these robust capabilities for prevention, detection, and response. Understanding risk exposure is a priority. Leveraging internal and external data sources across the Trend Vision One ecosystem enables greater command of your attack surface risk. Minimize breaches or attacks with deeper insight across key risk factors.
  • 9
    ThreatSpotter

    ThreatSpotter

    AISecureMe

    ThreatSpotter is a compliance cloud security scanner for AWS, Azure, and GCP. It is basically scanning the whole cloud infrastructure against anomaly detection and helps you to achieve the compliance score against all cloud security vulnerabilities. It is basically running on a Machine Learning engine where it basically runs on historical data and provides accurate results with real Threat Analytics. Threat Analytics provides different views according to pie and graph charts from past data. ThreatSpotter takes care of "Shared Responsibility Model" where each and every aspect of cloud infrastructure ensures the compliance check against malware and intrusion attacks. Regular monitoring helps in identifying the container vulnerabilities, intrusion attacks and malware attacks. Ensure the compliance over infrastructure workloads and cloud workloads. Threat analytics dashboard where user and management can see the compliance score trend on weekly, monthly and yearly basis.
    Starting Price: $800 per month
  • 10
    Tufin

    Tufin

    Tufin

    Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment. Customers gain visibility and control across their network, ensure continuous compliance with security standards and embed security enforcement into workflows and development pipelines. Eliminate the security bottleneck and increase the business agility of your organization. Existing manual approaches to managing network changes can take weeks and introduce errors resulting in potential security risks. Organizations across the world rely on Tufin’s policy-based automation to automate visibility and provisioning and maximize business agility and security. Maintaining and demonstrating compliance with industry regulations and internal policies is difficult within today’s complex and fragmented networks. Tufin enables enterprises to ensure continuous compliance and maintain audit readiness.
  • 11
    Kaspersky Hybrid Cloud Security
    At Kaspersky Lab, our philosophy is based on a simple yet important concept. We believe that cybersecurity is there to maintain business sustainability, protecting corporate evolution and digital transformation. Security must partner with infrastructure, rather than building barriers. We apply this philosophy to everything we engineer. Our Hybrid Cloud Security solution provides outstanding multi-layered protection to multi-cloud environments. Wherever you process and store critical business data - in a private or public cloud, or both - we deliver a perfectly balanced combination of agile, continuous security and superior efficiency, protecting your data against the most advanced current and future threats without compromising on systems performance. Proven security for virtual and physical servers, VDI deployments, storage systems and even data channels in your private cloud.
  • 12
    Tencent Cloud Security Operations Center
    By visualizing high volumes of abstract security data and aggregating the big data from Tencent Cloud security products, SOC provides visual representation services and instant threat alarms in three dimensions: security situation overview, host security situation and network security situation. Based on Tencent's big security data and wealth of experience in security, SOC continuously monitors your security conditions and provides real-time alarms for security events to alert you of possible security risks. SOC provides you with intelligent security ratings based on your multi-dimensional security data (such as host and network security data), which enable you to intuitively understand your security situation. In addition, utilizing Tencent's big security data, SOC provides insights into your Internet security situation to help you proactively uncover security risks across the Internet.
  • 13
    Infosys Cobalt
    Infosys Cobalt is a set of services, solutions, and platforms that acts as a force multiplier for cloud-powered enterprise transformation. Infosys Cobalt helps businesses redesign the enterprise, from the core, and also build new cloud-first capabilities to create seamless experiences in public, private and hybrid cloud, across PaaS, SaaS, and IaaS landscapes. With Infosys Cobalt’s community leverage, enterprises can rapidly launch solutions and create business models to meet changing market needs while complying with the most stringent global, regional and industry regulatory and security standards. Enterprises can leverage the full potential of the cloud ecosystem and Infosys Cobalt’s thriving community of business and technology innovators to drive increased business value.
  • 14
    IBM Security Randori Recon
    Get the most authentic view of what’s exposed. Discover what is exposed with our black-box approach. IBM Security Randori Recon builds a map of your attack surface to find exposed assets (on-prem or cloud), shadow IT, and misconfigured systems attackers can find, but you may be missing. Unlike other ASM solutions that rely on IPv4 range scans, our unique center of mass approach enables us to find IPv6 and cloud assets others miss. Only IBM Security Randori Recon gets you on target faster – automatically prioritizing the exposed software attackers are most likely to attack first. Built by attackers to identify attackable software, only Randori Recon provides you a real-time inventory of each instance of exposed and attackable software. Going far beyond vulnerabilities, Randori Recon looks at each target in context to build a unique priority score for each target. Practice makes perfect. Go beyond scanning and improve your team by testing your defenses under real-world conditions.
  • 15
    activeDEFENCE

    activeDEFENCE

    activereach

    From malware to advanced persistent threats (APT) to extortion & internal breaches, threats to your organisation’s infrastructure are unrelenting. Today’s businesses must consider smartphones, tablets, and consumerization of IT, combined with telecommuters, contractors, partners, and business-critical services hosted in the cloud. Security is more important than ever—and far more complex. To defend your information and systems, you need an adaptable, multi-layered defensive strategy that encompasses all the components of your IT environment, from the network to the perimeter, data, applications and endpoints, minimising and managing the weak points and vulnerabilities that expose your organisation to risk. activereach’s end-to-end portfolio of network security solutions can protect your business from advancing threats, enhance network performance, and optimise operational efficiencies.
  • 16
    SAINTcloud

    SAINTcloud

    Carson & SAINT Corporations

    The cost of defending your most critical technology resources and information rises every year. Increased threats and tight budgets challenge even the most robust risk-management program. Carson & SAINT developed SAINTcloud vulnerability management to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to implement and maintain on-premise infrastructure and software. This means you can spend more time reducing risks and less time managing the tools you use. No software to install – set up and running in minutes. Full vulnerability scanning, penetration testing, social engineering, configuration, compliance, and reporting in one product. Role-based access controls for separation of duties and accountability. Internal host and remote site scans from the cloud.
  • 17
    Lightspin

    Lightspin

    Lightspin

    Our advanced patent-pending graph-based technology enables proactive discovery and remediation of known and unknown threats. Whether it's a misconfiguration, weak configuration, over-permissive policy, or a CVE, we empower your teams to address and eliminate all threats to your cloud stack. Prioritization of the most critical issues means your team can focus on what matters most. Our root cause analysis dramatically reduces the number of alerts and general findings, enabling teams to address those that are most crucial. Protect your cloud environment while advancing along the digital transformation. It correlates between the Kubernetes layer to the cloud layer and integrates seamlessly with your existing workflow. Get a rapid visual assessment of your cloud environment using known cloud vendor APIs, from the infrastructure level down to the single microservice level.
  • 18
    IBM Managed Security Services
    Explore the latest managed security services for today's hybrid cloud world. As your trusted advisors, IBM Security™ specialists help you address your security needs, from the simplest to the most complex, monitoring and managing security incidents 24/7/365. Our people, technology, facilities and processes are among the best in the world. Your organization may have working tools and processes but could benefit from trusted security advisors. IBM®Managed Security Services can augment your security program with tailored services, including threat, cloud, infrastructure, data, identity and response management. Some organizations require help with developing a continuous improvement process to protect their enterprise during multi-year projects. IBM MSS specialists can help optimize, fine-tune, and improve security program efficiency for the long-term. Protect critical assets from vulnerabilities, detect advanced threats and quickly respond and recover from disruptions.
  • 19
    Permiso

    Permiso

    Permiso

    If you work with a CSPM, you already have up-to-date cloud security practices. That’s good. But it’s not enough. To truly take control, you need to know what’s happening in your cloud right now and who’s doing it. Permiso grants you that power. With current solutions (like SIEMs) it can take hours or days just to figure out why your identities are acting suspiciously or just plain reckless. With Permiso you can crack the case in minutes. Not all activity is worth your attention. Think of it like your connected doorbell camera at home. You don’t want to be woken up every time a cat wanders onto your doorstep. But a masked dude with a crowbar? Better take a look. Permiso focuses only on activities that are worth your time. Permiso isn’t another service to tell you your cloud has holes in it. Of course, it does! Permiso tells you if those holes are currently being exploited and, most importantly, who’s doing it.
  • 20
    Concourse Labs

    Concourse Labs

    Concourse Labs

    Prevent internet exposure, unencrypted data, misconfigurations, secrets abuse, and more from being deployed into code repositories and in production. Concourse Labs’ platform quickly integrates into existing CI/CD toolchains to remove security and compliance friction, so developers can deliver code rapidly and safely. Our agentless technology continually evaluates cloud usage and automatically tests for drift, attack, misconfiguration, and misuse. Get actionable (and auditable) results in seconds, not weeks. Empower developers with immediate and specific cloud-native guidance, so they can remediate violations without needing security team intervention, and do so using their existing development tools. Fixes are automatically validated for compliance with policy. Validate complex expressions and eliminate dangerous false negatives by uncovering violations below the root stack that may be hiding within complex nested stacks.
  • 21
    Versa SASE

    Versa SASE

    Versa Networks

    Versa SASE integrates a comprehensive set of services through VOS™ delivering security, networking, SD-WAN, and analytics. Built to run in the most complex environments, Versa SASE provides the flexibility and elasticity for simple, scalable, and secure deployments. Versa SASE integrates security, networking, SD-WAN, and analytics within a single software operating system delivered via the cloud, on-premises, or as a blended combination of both. Versa SASE delivers secure, scalable, and reliable enterprise-wide networking and security while increasing multi-cloud application performance and dramatically driving down costs. Versa SASE is built as a complete integration of best-of-breed security, advanced networking, industry-leading SD-WAN, genuine multi-tenancy, and sophisticated analytics in a single Enterprise-class carrier-grade operating system (VOS™) that operates at exceptional scale. Learn more about the technology of Secure Access Service Edge.
  • 22
    DevOcean

    DevOcean

    DevOcean Security

    DevOcean is the first platform to discover your cloud apps, bring together insights from all security tools, and automate the remediation lifecycle. Shift in responsibilities and fragmented tooling extend the remediation lifecycle and drive up costs. DevOcean enables security teams to clearly see every cloud-related risk, providing an efficient and simple way to prioritize and remediate security vulnerabilities across all of an app’s layers. Remediating critical risks with efficient security workflows.
  • 23
    Laminar

    Laminar

    Laminar

    In cloud environments developers and data scientists have the power to capture, copy and manipulate data whenever they see fit. The pace of change is so rapid that data in the cloud is largely invisible to security and governance teams. As cloud data is unknown and not visible to security it is often unprotected, exposed and vulnerable to both external and internal threats. Manual approaches to verify and enforce data security policies are no longer adequate. They are out of date the moment they are complete as the pace of change is too rapid to keep up. Further, data movement within the cloud (such as across geographies) can easily overcome controls and compliance. Data accesses are not monitored typically because security and governance teams don't know which instances to turn logging on and lack information about application dependencies to distinguish between authorized and unauthorized data accesses or to look for anomalies.
  • 24
    Nutanix Security Central
    NCM Security Central unifies cloud security operations for your workloads and data on any cloud type while automating incident response with intelligent analysis and regulatory compliance. Build an automated, multi-cloud response dashboard and platform for critical initiatives like defense-in-depth and Zero Trust (ZTA). Quickly assess your risk of a security incident by understanding the vulnerabilities in your apps and data before you’re compromised. Instantly comply with industry standards using custom audits across clouds from public to on-premises without a heavy management lift. Correlate potential security vulnerabilities using Qualys’ scanning integration, then leverage the power of Nutanix X-Play to automate incident response or create micro-segmentation workflows. Gain asset visibility across workloads anywhere, then audit these findings against standards like CIS, NIST CSF v1.1, PCI-DSS v3.2.1, HIPAA for public clouds, or PCI-DSS v3.2.1 and DISA STIG for Nutanix on-prem.
  • 25
    Trava

    Trava

    Trava

    Your cybersecurity needs are unique and require unique solutions. We meet you where you are and walk you through your assessment, compliance, and insurance journey, every step of the way. Your destination may be achieving compliance with industry certifications such as SOC2 or ISO27001, but it doesn’t stop there. With Trava, our modern tools can help you bridge the gap between where you are and where you want to be by giving you the control to assess your risk, repair the most vulnerable areas, and transfer risk through insurance. Our platform is simple, we provide you better security/risk insights on your potential clients so that carriers can make a more informed policy quote decision (which usually means a lower quote than your competitors). Compliance is an important part of a comprehensive cybersecurity plan. At Trava, we help you along your compliance journey. Expand your service offerings, increase revenue, and become a trusted strategic partner to your clients.
  • 26
    Carbide

    Carbide

    Carbide

    Get compliant, prevent breaches, and save money with a security and privacy program that doesn’t slow down your growth. While “checkbox”-style security and privacy can seem attractive, it builds security debt that multiplies with each new regulation and every new security questionnaire. Instead, Carbide makes enterprise-class security accessible to companies of all sizes. That means that start-ups get the step-by-step support they need to design and implement strong security and privacy, while established security teams gain back valuable time by capitalizing on the automation and efficiency provided by the platform. Adopting a security and privacy posture that goes beyond checkbox compliance is possible even without a large security team. Carbide breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.
  • 27
    Unosecur

    Unosecur

    Unosecur

    Eliminate cloud permissions gap and maintain continuous security across multi-cloud environments. Central logging for all IAM credentials to provide granular insights and policy control, enforcing just-in-time permissions. Deep analytics to detect and mitigate privilege misconfigurations by applying least privilege principles, access control & right-sizing. Get audits for identity and access privileges and compliance at any time. Insightful reports for risk assessment, investigations, and forensics are always available and updated. Connect your cloud environment to Unosecur hassle-free within minutes and a few steps. Unosecur's advanced dashboard will give you full visibility of your cloud identity posture within a few hours after onboarding. Now, you are ready to remediate and report any identity and access permissions gap and perform access right-sizing at any time. Identity and access governance.
  • 28
    Britive

    Britive

    Britive

    Permanent elevated privileges leave you open to increased data loss & account damage due to insider threats & hackers 24/7. Temporarily granting & expiring Just In Time Privileges with Britive instead minimizes the potential blast radius of your privileged human and machine identities. Maintain zero standing privileges (ZSP) across your cloud services, without the hassle of building a DIY cloud PAM solution. Hardcoded API keys and credentials, typically with elevated privileges, are sitting targets for exploits, and there are 20x more machine IDs using them than there are human users. Granting & revoking Just-in-Time (JIT) secrets with Britive can significantly reduce your credential exposure. Eliminate static secrets & maintain zero standing privileges (ZSP) for machine IDs. Most cloud accounts become over-privileged over time. Contractors & employees often maintain access after they leave.
  • 29
    BeyondTrust Cloud Privilege Broker
    Cloud Privilege Broker gives your team the tools to visualize and manage entitlements across the multi-cloud infrastructure. Cloud-agnostic, centralized dashboard with key metrics. Continuous discovery of users, roles, policies, and endpoints across all supported cloud platforms. Granular policy recommendations across IaaS and PaaS platforms from a single interface. BeyondTrust Cloud Privilege Broker (CPB) is an entitlements and permissions management solution that enables customers to visualize and manage cloud access risk in hybrid and multi-cloud environments, all from a single interface. Each cloud service provider has its own access management tools, but they only manage their own environments and do not scale to cover others. This leaves teams to swivel from console to console, attempting to manage permissions separately for each cloud provider, with different ways to apply policy from one platform to the next.
  • 30
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks—using Rego, the simple and powerful open source language of OPA. Govern your IaC security for cloud resources, Kubernetes, and containers in one place and ensure consistent policy enforcement across the development lifecycle. View the results of security and compliance checks on IaC across your organization. Access and export tenant-wide, IaC-specific security and compliance reports.