Best Cloud Security Software in Germany - Page 3

Compare the Top Cloud Security Software in Germany as of November 2025 - Page 3

  • 1
    Cloudaware

    Cloudaware

    Cloudaware

    Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. Cloudaware is designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware integrates out-of-the-box with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and over 50 other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.
    Starting Price: $0.008/CI/month
  • 2
    ImmuniWeb

    ImmuniWeb

    ImmuniWeb

    ImmuniWeb SA is a global application security company operating in over 50 countries, headquartered in Geneva, Switzerland. Most of ImmuniWeb customers come from regulated industries, such as banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring. The data is later leveraged for a threat-aware and risk-based Application Penetration Testing for web, mobile, and API security testing. ImmuniWeb is the only company that offers a contractual zero false-positives SLA with a money-back guarantee. ImmuniWeb’s AI technology is a recipient of numerous awards and recognitions, including Gartner Cool Vendor, IDC Innovator, and the winner of “SC Award Europe” in the “Best Usage of Machine Learning and AI” category. ImmuniWeb® Community Edition runs over 100,000 daily tests, being one of the largest application security communities
    Starting Price: $499/month
  • 3
    Fidelis Halo

    Fidelis Halo

    Fidelis Security

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!
    Starting Price: Free
  • 4
    Cloudnosys

    Cloudnosys

    Cloudnosys

    Cloudnosys platform delivers security, compliance, cost and DevOps automation. Continually scan your entire AWS services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc. Provides DevOps automation such as on/off/snooze, snapshot management and identifies costs savings by improving asset utilization for Azure and AWS. Meet PCI, HIPAA, FISMA, AWS CIS Benchmark compliance quickly. Provides easy guided remediation and audit functions to meet compliance.
    Starting Price: $10/instance/month
  • 5
    CloudEye

    CloudEye

    Cloudnosys

    Unified view of all risks built from machine data and contextual analysis that delivers Security and Compliance Solutions for modern public clouds. Cloudnosys best practice rules track and monitor your AWS and Azure services for security and compliance violations. Dashboard and reports keep you fully informed of any risks which are identified by region. Ensure that you have policy guardrails in place to meet security and compliance. Rapidly detect and remediate risks across your resource configurations, network architecture, IAM policies and more. For instance, you can actively track and monitor publicly exposed S3, and EBS volumes. Providing complete governance, and risk management functions for the cloud assets. Cloudnosys platform delivers security, compliance, and DevOps automation. Continually scan your entire AWS, Azure & GCP services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc.
    Starting Price: $75.00/month
  • 6
    VIPRE Endpoint Security

    VIPRE Endpoint Security

    VIPRE Security Group

    VIPRE Endpoint delivers comprehensive defense against today’s sophisticated malware without the complexity of other solutions. We keep your total cost of ownership low while providing advanced security powered by machine learning, real-time behavioral analysis, and a global threat intelligence network. VIPRE combines a modern endpoint solution with time-saving efficiencies, ensuring your organization stays secure and operational. Protecting files, applications, and networks, VIPRE offers complete malware defense. It also helps enforce internet usage policies with granular controls that support employer duty-of-care. Dynamic dashboards provide real-time insights into the status of your endpoint environment, making it easier to monitor and manage security across your organization. Available as a core next-generation AV solution, a full EDR solution, or a combined EDR+MDR solution, we have a package that will work for you.
    Starting Price: $34/seat/year
  • 7
    Detectify

    Detectify

    Detectify

    Detectify sets the standard for External Attack Surface Management (EASM), providing 99.7% accurate vulnerability assessments. ProdSec and AppSec teams trust Detectify to expose exactly how attackers will exploit their Internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks crowdsourced through its global community of elite ethical hackers, exposing critical weaknesses before it’s too late. Detectify is available on the global market, except US-sanctioned countries. It is tech-agnostic, which means you can deploy the scanning engines as long as you are hosted in the cloud. Currently, Detectify is trusted by 1500+ security-conscious companies including popular app-makers King, Trello, Grammarly. No matter how much security knowledge you have, Detectify helps you stay on top of security and build safer web applications.
    Starting Price: $89 per month
  • 8
    CySight

    CySight

    IdeaData

    CySight's Dropless Collection method provides absolute data retention, enabling the most data orientated decision making and cost-effective workflow for any organization, significantly enhancing network performance, network security and cyber intelligence to the highest level. With a Unique approach, CySight delivers comparative baselining, superior granularity, scalable collection, root cause analysis and QoS Analysis. All Designed to run independently or work together as a powerful single unit. CySight empowers communication and application visibility for networking, security, billing and compliance with high-end integrated network traffic analytics, granular forensics, cybersecurity intelligence, cloud usage, internet-of-things analytics, peering and billing to medium and large enterprise customers and service providers. Our objective at CySight is to reveal your data’s potential and eliminate all blind spots.
    Starting Price: $299/month
  • 9
    Cribl Stream
    Cribl Stream allows you to implement an observability pipeline which helps you parse, restructure, and enrich data in flight - before you pay to analyze it. Get the right data, where you want, in the formats you need. Route data to the best tool for the job - or all the tools for the job - by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders. As much as 50% of log and metric data goes unused – null fields, duplicate data, and fields that offer zero analytical value. With Cribl Stream, you can trim wasted data streams and analyze only what you need. Cribl Stream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the Cribl Stream universal receiver to collect from any machine data source - and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIs
    Starting Price: Free (1TB / Day)
  • 10
    VNS3

    VNS3

    Cohesive Networks

    The all-in-one networking device promising connectivity, security and flexibility at a fraction of the cost. Launch a VNS3 image through a public cloud marketplace. We are available in AWS, Azure and GCP. Via private image sharing. We will gladly share a private image with your account. We can also provide a VDI/VDK file which you can import into your environment of choice, be that VMWare or a locked down cloud environment. The Cohesive Networks support team will provide you a license in minutes. Upgrading your VNS3 controller's license can be done via the VNS3 console or the API. The VNS3 Overlay Network is an optional feature that provides end-to-end encryption, increased performance (in most cloud environments), and IP address mobility across regions and cloud providers. An overlay network is layered over the native networking layers, but can be independent from all underlying hardware and software. The overlay is dependent on the native networking layers.
    Starting Price: $150 per month
  • 11
    BitNinja

    BitNinja

    BitNinja.com

    BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. It requires no maintenance, just keep running in the background and protecting your and your customer’s servers while you can concentrate on other aspects of your business with peace of mind. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Furthermore, you can easily manage all the modules and features on the unified dashboard and check how the the software catches malicious traffic in real-time.
    Starting Price: $10 per server
  • 12
    Tricent

    Tricent

    Tricent

    Tricent is the #1 file-sharing governance SaaS platform that helps organizations make their file-sharing more secure and compliant without sacrificing collaboration. For Microsoft 365 OneDrive & Sharepoint, and Google Workspace MyDrives and Shared Drives. Tricent enables administrators to: 🚀 Effortless Onboarding in less than 30 Minutes. 🔍 Unparalleled Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Bulk Remediation Made Simple: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. . 💪🏼 Customizable Governance Policies: Set different cycles for different user groups 🔮 Stay Ahead with Abnormality Detection: Our machine learning feature keeps you informed, detecting anomalies before they escalate *Only Google Workspace
    Starting Price: €18/year/user
  • 13
    Bitcanopy

    Bitcanopy

    Bitcanopy

    Automated AWS security. Hands-off AWS infrastructure insights and remediation. Ensure AWS Config is enabled in all regions. Identify and stop S3 public read/write/full control. Automatically enforce S3 objects and volumes encryption. Stop login from invalid IP address. Stop non-compliant dev resources. Delete unused elastic load balancers. Automatically apply IP restriction policy on AWS resources. Delete new internet-facing ELBs. Only keep certain port open based on pre-defined policy. RDS - Terminate unencrypted public instances. Monitor and remediate your infrastructure agains 100+ such rules that include compliance against AWS CIS benchmarks and AWS Best Practices.
    Starting Price: $75 per month
  • 14
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 15
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 16
    Enginsight

    Enginsight

    Enginsight

    Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities. The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface. Scan your systems automatically and immediately recognize the security status of your IT infrastructure. 100% self-developed (security by design) and has no dependencies on third-party tools. Permanently scan your IT environment for existing devices and create a live image of your IT infrastructure. Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux . Start your 15 day free trial now.
    Starting Price: $12.99 per month
  • 17
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing security infrastructure.
    Starting Price: $2000 per month
  • 18
    Barracuda WAF-as-a-Service
    Configuring traditional web application firewalls can take days of effort. But Barracuda WAF-as-a-Service—a full-featured, cloud-delivered application security service—breaks the mold. Deploy it, configure it, and put it into full production—protecting all your apps from all the threats—in just minutes.
  • 19
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 20
    Cato SASE

    Cato SASE

    Cato Networks

    Cato enables customers to gradually transform their WAN for the digital business. Cato SASE Cloud is a global converged cloud-native service that securely and optimally connects all branches, datacenters, people, and clouds. Cato can be gradually deployed to replace or augment legacy network services and security point solutions. Secure Access Service Edge (SASE) is a new enterprise networking category introduced by Gartner. SASE converges SD-WAN and network security point solutions (FWaaS, CASB, SWG, and ZTNA) into a unified, cloud-native service. In the past, network access was implemented with point solutions, managed as silos that were complex and costly. This hurt IT agility. With SASE, enterprises can reduce the time to develop new products, deliver them to the market, and respond to changes in business conditions or the competitive landscape.
    Starting Price: $1.00/year
  • 21
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface. You get a clear view of every single asset an attacker could reach — what they are and how they relate to your business. Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 22
    SOC Prime Platform
    SOC Prime operates the world’s largest and most advanced platform for collective cyber defense that cultivates collaboration from a global cybersecurity community and curates the most up-to-date Sigma rules compatible with over 28 SIEM, EDR, and XDR platforms. SOC Prime’s innovation, backed by the vendor-agnostic and zero-trust cybersecurity approach, and cutting-edge technology leveraging Sigma language and MITRE ATT&CK® as core pillars are recognized by the independent research companies, credited by the leading SIEM, XDR & MDR vendors, and trusted by 8,000+ organizations from 155 countries, including 42% of Fortune 100, 21% of Forbes Global 2000, 90+ public sector institutions, and 300+ MSSP and MDR providers. Driven by its advanced cybersecurity solutions, Threat Detection Marketplace, Uncoder AI, and Attack Detective, SOC Prime enables organizations to risk-optimize their cybersecurity posture while improving the ROI of their SOC investments.
  • 23
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 24
    Templarbit

    Templarbit

    Templarbit

    Monitor and defend Apps with data-driven security. Templarbit is redefining runtime security by building it from the ground up to be cloud native and powered by data intelligence. This modern, data-driven approach allows you to secure APIs and Web Apps faster and more effectively. Templarbit Sonar provides you with blazing fast security monitoring that delivers insights into the availability, performance, and security configuration of websites, APIs, and Web Applications. It's a beautiful and fast way to establish continuous security monitoring on your apps, enabling you to measure everything out of the box without having to install any packages, agents, or libraries. Sonar covers a wide range of checks that every software company should have in place including uptime, response time, and a deep scan of your security configuration.
    Starting Price: $99 per month
  • 25
    BluBracket Code Security Suite
    The first comprehensive security solution for code in the enterprise. Software is more valuable than ever. It’s also more collaborative, open and complex—making it a threat to corporate security. BluBracket gives companies visibility into where source code introduces security risk while also enabling them to fully secure their code—without altering developer workflows or productivity. You can’t secure what you can’t see, and today’s collaborative coding tools equals code proliferation that companies have no visibility into. BluBracket gives companies a BluPrint of their code environments so they know where their code is and who has access to it, both inside and outside the organization. And most importantly, with one click you can classify the most important code, so you can show a detailed chain of custody for any audit or compliance needs.
    Starting Price: $2500 per month
  • 26
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
    Starting Price: $1,118 per year
  • 27
    Cubbit for Teams
    Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.
    Starting Price: €6 per user, per month
  • 28
    OpsCompass

    OpsCompass

    OpsCompass

    Our SaaS solution provides a single dashboard with real-time and action-oriented insights across compliance, security, and cost management. It’s simple to deploy, intuitive to use, and as flexible as the cloud itself. Best of all, our software makes it easy to fold cloud operations into your existing processes with your existing personnel. As soon as you sign into OpsCompass your cloud environment is scanned, evaluated, and a "Company Compliance Score" is produced. This overall score is based on what resources are in and out of compliance according to which frameworks they pertain to. Delivered through a single, always-on dashboard, OpsCompass gives your existing team the real-time insights they need to maintain a more secure, more compliant, and more affordable multi-cloud environment. OpsCompass monitors every event happening inside your cloud environment, everything your company and your team are alerting to, and the change that occurs over a period of time
    Starting Price: $0
  • 29
    Prophaze WAF

    Prophaze WAF

    Prophaze Technologies

    Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
    Starting Price: $299 per month
  • 30
    Elastic Cloud
    Enterprise search, observability, and security for the cloud. Quickly and easily find information, gain insights, and protect your technology investment whether you run on Amazon Web Services, Google Cloud, or Microsoft Azure. We handle the maintenance and upkeep, so you can focus on gaining the insights that help you run your business. Configuration and deployment are a breeze. Simple scaling, custom plugins, and architecture optimized for log and time series data are only a taste of what’s possible. Get the complete Elastic experience with features like machine learning, Canvas, APM, index lifecycle management, Elastic App Search, Elastic Workplace Search, and more — exclusively available here. Logging and metrics are just the start. Bring your diverse data together to address security, observability, and other critical use cases.
    Starting Price: $16 per month