Best Cloud Security Software in Germany - Page 2

Compare the Top Cloud Security Software in Germany as of November 2025 - Page 2

  • 1
    Microsoft Defender for Cloud
    Microsoft Defender for Cloud is a solution for cloud security posture management (CSPM) and cloud workload protection (CWP) that finds weak spots across your cloud configuration, helps strengthen the overall security posture of your environment, and can protect workloads across multicloud and hybrid environments from evolving threats. Get a continuous assessment of the security of your cloud resources running in Azure, AWS, and Google Cloud. Use built-in policies and prioritized recommendations that are aligned to key industry and regulatory standards or build custom requirements that meet your organization's needs. Use actionable insights to automate recommendations and help ensure that resources are configured securely and meet your compliance needs. Microsoft Defender for Cloud enables you to protect against evolving threats across multicloud and hybrid environments.
    Starting Price: $0.02 per server per hour
  • 2
    Splunk Enterprise
    Splunk Enterprise is a powerful platform that turns data into actionable insights across security, IT, and business operations. It enables organizations to search, analyze, and visualize data from virtually any source, providing a unified view across edge, cloud, and hybrid environments. With real-time monitoring, alerts, and dashboards, teams can detect issues quickly and act decisively. Splunk AI and machine learning features predict problems before they happen, improving resilience and decision-making. The platform scales to handle terabytes of data and integrates with thousands of apps, making it a flexible solution for enterprises of all sizes. Trusted by leading organizations worldwide, Splunk helps teams move from visibility to action.
  • 3
    Rublon

    Rublon

    Rublon

    Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
    Starting Price: $1/month/user
  • 4
    MalCare

    MalCare

    MalCare

    Instant WordPress malware removal at 25% of the industry cost. Detects complex malware other plugins frequently miss. With it’s smart “Cloud Scan”, MalCare’s malware scanner will never impact your website performance nor overload your server. Ever. Clean your malware in less than 60 seconds. Our safe malware removal technology ensures that your website never breaks. MalCare comes with an inbuilt smart and powerful Firewall for real-time protection from Hackers and bots. It is the simplest WordPress Security plugin that doesn’t need any technical knowledge. You can get set and ready in just 50 secs. The brands you trust, trust MalCare to keep them safe. MalCare is trusted by Intel, Dolby True HD, CodeinWP, Site Care, WP Curve, Valet, among others. Our servers do all the heavy lifting so your site can focus on serving your customers.
    Starting Price: $99 per year
  • 5
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 6
    PreVeil

    PreVeil

    PreVeil

    PreVeil applies end-to-end encryption in a radically different way. We protect organizations’ email & files from phishing, spoofing, BEC & more. Seamless for users. Easy for admins. PreVeil provides the enterprise with an easy-to-use encrypted email and encrypted cloud storage solution to protect important email and files. Moreover, PreVeil uses the gold standard of end-to-end encryption to secure data. PreVeil also provides the enterprise with a “Trusted Community” for communicating with fellow employees, contractors, vendors or other third parties. With a Trusted Community, employees can communicate and exchange information without worrying about being phished, spoofed, becoming victims of BEC, or having their admins compromised.
    Starting Price: $20 per user per month
  • 7
    AppTrana

    AppTrana

    Indusface

    Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.
    Starting Price: $99/month
  • 8
    Push Security

    Push Security

    Push Security

    Map out your entire cloud identity attack surface and harden it against identity-based attacks. Push is a vulnerability scanner for your cloud identities. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and the vulnerabilities putting your business at risk. - Get real-time visibility of all your cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. Prevent your employees creating insecure identities. - Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk. - Improve employee security awareness by equipping them to self-remediate security issues. Try it for free today.
    Starting Price: $5 per employee per month
  • 9
    Coro

    Coro

    Coro Cybersecurity

    Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity, enabling you to enforce a wide range of security, compliance and governance policies. We scan every email for phishing, malware, ransomware and automatically eliminate threats. We automatically identify and block insider threats, accounts hacking, and malicious activities. We scan every file and email, or any data share for PII/PCI/PHI, and prevent confidential information leakage.
    Starting Price: $8.99 per user per month
  • 10
    Kaspersky Security Cloud
    Get our best apps & features under one account. 6 premium products & apps for Windows, macOS, Android & iOS – all in one place & packed with 100s of features. Includes antivirus, anti-ransomware, mobile security, password management, VPN* & parental controls. Plus privacy tools, data leak detection, Home Wi-Fi security & payment protection – all easy to manage remotely. Find out if your private accounts data is leaked & get advice on what to do next. Get notified in real time if an unknown app attempts to connect to your webcam or mic*. Plus get personalized alerts & warnings sent straight to your devices to keep you safe. Take advantage of cloud-based security that keeps your devices fast and easy to use. Predict & fix issues with your hard drive by viewing metrics that report on its health. Manage storage space and battery life on your Android devices with specially built tools.
    Starting Price: $53.99 per year
  • 11
    CloudSploit

    CloudSploit

    CloudSploit

    Cloud security best practices as a service. CloudSploit is the leading open source security configuration monitoring tool for cloud infrastructure. Cloud security experts from around the world collaborate to create a repository of tests for cloud infrastructure such as AWS, Azure, GitHub, and Oracle Cloud.
    Starting Price: $7.17/month
  • 12
    Panda Fusion 360

    Panda Fusion 360

    WatchGuard Technologies

    Fusion 360 combines our Systems Management and Adaptive Defense 360 solutions to unify RMM with EPP and EDR capabilities. This holistic solution combines the best of two worlds to provide advanced endpoint security, centralized IT management, monitoring and remote support capabilities. Fusion 360 ensures the classification of 100% of the running processes on all your endpoints with our Zero-Trust and Threat Hunting services. Cloud-based centralized management for devices and systems, with real-time monitoring, inventory and remote support. Advanced prevention, detection and response technologies against breaches.
  • 13
    Skybox Security

    Skybox Security

    Skybox Security

    The Skybox approach to risk-based vulnerability management starts with fresh vulnerability data from your entire network — physical IT, multi–cloud and operational technology (OT). Skybox uses a wide range of sources, including asset and patch management systems and network devices, to assess vulnerabilities without a scan. We also collect, centralize and merge data from multiple scanners to give you the most accurate vulnerability assessments on demand. Centralize and enhance vulnerability management processes from discovery to prioritization and remediation. Harness the power vulnerability and asset data, as well as network topology and security controls. Use network modeling and attack simulation to find exposed vulnerabilities. Augment vulnerability data with intelligence on the current threat landscape. Know your best remediation option, including patching, IPS signatures and network–based changes.
  • 14
    Cequence Security

    Cequence Security

    Cequence Security

    Start analyzing and protecting your APIs with passive, inline or API-based integration with any existing network component – API gateway, proxy, CDN or ingress controller. Predefined policies, fine-tuned using threat patterns observed in protecting billions of API transactions per day delivers unmatched, out-of-the-box protection. A rich user interface and an open, API-based architecture enables integration with threat intelligence feeds, CI/CD framework tools, other security components, and SIEM/SOAR/XDR solutions. Patented ML-based analysis eliminates JavaScript and SDK integration pen-alties such as extended development cycles, slow page loads and forced mobile-app upgrades. ML-based analysis generates a unique Behavioral Fingerprint to determine malicious intent and continually tracks attackers as they retool.
  • 15
    Barracuda CloudGen Firewall
    Get comprehensive protection for on-premises and multi-cloud deployment using the firewall built in and for the cloud. Frictionless, cloud-hosted Advanced Threat Protection detects and blocks advanced threats, including zero-day and ransomware attacks. Gain rapid protection against the newest threats with the help of a global threat intelligence network fed by millions of data collection points. Modern cyber threats such as ransomware and advanced persistent threats, targeted attacks, and zero-day threats, require progressively sophisticated defense techniques that balance accurate threat detection with fast response times. Barracuda CloudGen Firewall offers a comprehensive set of next-generation firewall technologies to ensure real-time network protection against a broad range of network threats, vulnerabilities, and exploits, including SQL injections, cross-site scripting, denial of service attacks, trojans, viruses, worms, spyware, and many more.
  • 16
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 17
    WebARX

    WebARX

    WebARX

    Protect websites from plugin vulnerabilities. WebARX is not just a security plugin – it is much more. Block malicious traffic with our lightweight web application firewall. Create your own firewall rules with WebARX firewall engine. Monitor your websites for possible security issues and vulnerabilities. WebARX is actively updated and helps you adapt the latest security practices. Generate weekly security reports and stay alerted when anything needs your immediate attention.
    Starting Price: $14.99 per month
  • 18
    Jit

    Jit

    Jit

    DevOps ain’t easy! We are hearing more and more about the breakdown and friction where Dev meets Ops, so let’s not even talk about all the other shift-left domains that add another layer of complexity in the middle like DevSecOps. Where this comes with the need to implement and integrate dozens of security tools in their SDLC. But what if it doesn’t have to be difficult? Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 19
    Backslash Security
    Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation. By identifying genuine attack paths to reachable code, we enable you to fix only the code and open-source software that is truly in use and reachable. Avoid unnecessary overloading of development teams with irrelevant vulnerabilities. Prioritize risk mitigation efforts more effectively, ensuring a focused and efficient security approach. Reduce the noise CSPM, CNAPP, and other runtime tools create by removing unreachable packages before running your applications. Meticulously analyze your software components and dependencies, identifying any known vulnerabilities or outdated libraries that could pose a threat. Backslash analyzes both direct and transitive packages, ensuring 100% reachability coverage. It outperforms existing tools that solely focus on direct packages, accounting for only 11% of packages.
  • 20
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 21
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 22
    Trend Micro Cloud App Security
    Enhance the security of Office 365, Google Workspace, and other cloud services by leveraging sandbox malware analysis for ransomware, BEC, and other advanced threats. The security included with Office 365 filters known antivirus threats, but 95% of today’s malware will only infect one device and is unknown to traditional antivirus techniques. Direct cloud-to-cloud integration: Uses APIs to enhance protection without complications. Sets up quickly and automatically: API integration requires no software to install, no user setting changes, no proxy to deploy, and no MX record to change.
  • 23
    Check Point CloudGuard

    Check Point CloudGuard

    Check Point Software Technologies

    The Check Point CloudGuard platform provides you cloud native security, with advanced threat prevention for all your assets and workloads – in your public, private, hybrid or multi-cloud environment – providing you unified security to automate security everywhere. Prevention First Email Security: Stop zero-day attacks. Remain ahead of attackers with unparalleled global threat intel. Leverage the power of layered email security. Native Solution, at the Speed of Your Business: Fast, straightforward deployment of invisible inline API based prevention. Unified Solution for Cloud Email & Office Suites: Granular insights and clear reporting with a single dashboard and license fee across mailboxes and enterprise apps. Check Point CloudGuard provides cloud native security for all your assets and workloads, across multi-clouds, allowing you to automate security everywhere, with unified threat prevention and posture management.
  • 24
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 25
    Carbon Black EDR
    Carbon Black Endpoint Detection and Response (EDR) by Broadcom offers a comprehensive solution for detecting, investigating, and responding to cybersecurity threats on endpoints. It utilizes advanced behavioral analysis and machine learning to identify suspicious activities in real time, providing security teams with actionable insights to prevent data breaches and mitigate risks. With its cloud-based architecture, Carbon Black EDR enables continuous monitoring, visibility into endpoint activity, and automated threat response. It’s designed to support organizations of all sizes by improving threat detection, reducing investigation time, and enhancing overall endpoint security.
  • 26
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 27
    Imperva Application Security Platform
    Imperva's Application Security Platform offers comprehensive protection for applications and APIs, addressing modern threats without compromising performance. The platform integrates Web Application Firewall (WAF), Advanced Bot Protection, API Security, DDoS Protection, Client-Side Protection, and Runtime Protection to safeguard against vulnerabilities and attacks. By leveraging advanced analytics and automated threat mitigation, Imperva ensures that applications remain secure across cloud, on-premises, and hybrid environments.
  • 28
    Cisco Umbrella
    Cisco Umbrella's cloud-delivered security enables an immediate improvement in security and compliance posture. That's because DNS is at the heart of every internet connection request. Securing the DNS layer means blocking malicious domains, IP addresses, and cloud applications before a connection is ever established. More than 30,000 organizations depend upon Umbrella DNS to deliver a fast, safe, and reliable internet experience that is simple to deploy and easy to manage. A recent study by GigaOM ranked Cisco #1 in DNS-layer security, and our DNS security contributed to Miercom ranking Cisco #1 in the industry in its laboratory testing of SSE threat efficacy. When you are looking to build upon DNS-layer protection with additional user protection capabilities, including ZTNA, SWG, CASB, DLP, and more, see Cisco Secure Access. Cisco Secure Access features a single client, single manager, and single policy construct protection for multi-function internet access protection and integrated
  • 29
    ContentKeeper

    ContentKeeper

    ContentKeeper Technologies

    Today's organizations require a security solution that scales for future expansion, integrates seamlessly with existing technology, centralizes policy management and provides control across remote locations and mobile users. ContentKeeper’s Secure Internet Gateway (SIG) helps prevent malware and ensures policy management on any device. Our Multi-layered Web Security Platform approach provides full visibility into web traffic and activity, without impacting network performance or adding complexity. Uses multiple layers of defense, including machine learning/predictive file analysis, behavioral analysis, cloud sandboxing and threat isolation to prevent malware and advanced persistent threats. Designed for high demand networking environments. Simplifies security and policy management and ensures safe and productive web use regardless of device or location.
  • 30
    Wordfence

    Wordfence

    Defiant

    Wordfence includes an endpoint firewall and malware scanner that were built from the ground up to protect WordPress. Our Threat Defense Feed arms Wordfence with the newest firewall rules, malware signatures and malicious IP addresses it needs to keep your website safe. Rounded out by a suite of additional features, Wordfence is the most comprehensive security option available. Wordfence runs at the endpoint, your server, providing better protection than cloud alternatives. Cloud firewalls can be bypassed and have historically suffered from data leaks. Wordfence firewall leverages user identity information in over 85% of our firewall rules, something cloud firewalls don’t have access to. And our firewall doesn’t need to break end-to-end encryption like cloud solutions.
    Starting Price: $99 per year