Compare the Top Cybersecurity Software that integrates with Dropbox as of October 2025

This a list of Cybersecurity software that integrates with Dropbox. Use the filters on the left to add additional filters for products that have integrations with Dropbox. View the products that work with Dropbox in the table below.

What is Cybersecurity Software for Dropbox?

Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems. Compare and read user reviews of the best Cybersecurity software for Dropbox currently available using the table below. This list is updated regularly.

  • 1
    Google Cloud Platform
    Google Cloud Platform provides a comprehensive suite of cybersecurity services to protect cloud resources, including encryption, identity management, and real-time threat detection. With tools like Google Cloud Armor for DDoS protection and Cloud Security Command Center for security insights, GCP ensures that businesses can safeguard their data and infrastructure. New customers get $300 in free credits to run, test, and deploy workloads, giving them the opportunity to evaluate GCP's security features and ensure robust protection for their applications. GCP’s security tools are designed to protect sensitive data across all layers of the cloud, from data storage to application deployment. Furthermore, Google’s multi-layered approach to security provides proactive defense, which includes automatic security patching, vulnerability scanning, and access control management.
    Leader badge
    Starting Price: Free ($300 in free credits)
    View Software
    Visit Website
  • 2
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
    View Software
    Visit Website
  • 3
    Syncro

    Syncro

    Syncro

    Syncro offers the first Extended Monitoring and Management (XMM) platform purpose-built for midsized MSPs and internal IT teams. The unified platform integrates RMM (endpoint management), professional services automation (PSA), and Microsoft 365 multi-tenant management to help organizations simplify operations, strengthen security, and scale profitably. Syncro delivers powerful automation, native AI capabilities, deep Microsoft 365 integration, and seamless support for 50+ third-party tools—enabling teams to reduce complexity, cut costs, and uncover new revenue opportunities. Its transparent per-user pricing model and commitment to continuous innovation make it an ideal solution for modern IT operations. Learn more at syncromsp.com or follow Syncro on LinkedIn.
    Leader badge
    Starting Price: $129 per user per month
    View Software
    Visit Website
  • 4
    1Password

    1Password

    1Password

    1Password is a secure, scalable, and easy-to-use password manager that's trusted by the world's leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up.
    Leader badge
    Starting Price: $3.99/month/user
  • 5
    Code42

    Code42

    Code42

    Welcome to data security for the collaborative and remote enterprise. Validate proper use of sanctioned collaboration tools, such as Slack and OneDrive. Uncover Shadow IT applications that may indicate gaps in corporate tools or training. Gain visibility into off-network file activity, such as web uploads and cloud sync apps. Quickly detect, investigate and respond to data exfiltration by remote employees. Receive activity alerts based on file type, size or count. Access detailed user activity profiles to speed investigation and response.
  • 6
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
    Starting Price: $9/user
  • 7
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 8
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 9
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.
    Starting Price: $5000
  • 10
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 11
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 12
    SaaS Alerts

    SaaS Alerts

    SaaS Alerts, a Kaseya company

    When it comes to cybersecurity, you need to stay ahead of the game. Our SaaS security platform is designed to do just that. We use cutting-edge technology to detect and stop unauthorized activity in your clients' applications, automatically. MSPs won't find this level of protection anywhere else. MSPs are high-risk targets for bad actors, protect your business by automatically alerting your executive team when any unusual, high-risk behavior occurs within your MSP tool stack. Customize SaaS security event thresholds on a multitude of applications - and be instantly alerted of unusual user behavior so you can immediately act on behalf of your customer to mitigate or eliminate threats.
  • 13
    elba

    elba

    elba

    elba is the ultimate experience to secure your team in their daily work. Scan, monitor, and resolve your vulnerabilities at scale. Your company’s security is super-powered by our collaborative approach. Detect all the sensitive data shared externally, and reduce your risks of data loss. Automatically remediate your potential alerts with the power of employees' context. Get a full visibility of all SaaS apps ever used in your company. Clean unused, non-compliant, and risky apps. Reduce phishing risks by 99% and nudge your employees to activate MFA across all SaaS apps. Educate your collaborators from day one with a delightful experience. At every step of your collaborators' journey, elba ensures that your team is aware and trained in your latest internal policy requirements. Security guidelines, GDPR, SOC2, and more, we got you covered. We dramatically reduce phishing risk, with our automated, hyper-customized phishing. Track their improvement as weeks go by and measure their progress.
  • 14
    Darktrace

    Darktrace

    Darktrace

    Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
  • 15
    Kobil

    Kobil

    Kobil Systems

    Join the new era of secure digital identities and business communications. Our unique platform is developed to facilitate all your business processes with the highest security standards. Start your own journey now! With just a few simple steps, you are able to build your base to leverage your own ecosystem with integrated customers, partners and technologies. Onboard all identities immediately by email, SMS, post or however you wish. Connect and synchronize your user database with just one click or start from scratch with our secure user directory. Create your own super app in minutes; enrich your ecosystem; integrate partners. In just a few minutes you can integrate numerous ready integrations with no coding and developers needed. KOBIL's next generation digital identity solution supports you in every conceivable (identity) use case scenario. Enable identities to securely log in to your or your partners' websites, apps or mini apps.
  • 16
    Symantec Secure Access Service Edge (SASE)
    SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 17
    Cyber360

    Cyber360

    CENTRL

    Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more.
  • Previous
  • You're on page 1
  • Next