Browse Software
+ List Your Product
Loading...
Showing 1 - 19 of 19 Products
AWS Control Tower logo

AWS Control Tower

AWS Control Tower - govern a new secure, multi-account environment 3.1 Based on 8 Ratings

AWS Control Tower provides you with a single location to set up a well-architected multi-account environment to govern your AWS workloads with rules for security, operations, and compliance. Sign up for our preview today!

Read More
Azure Security Center logo

Azure Security Center

Azure Security Center | Microsoft Azure 4.1 Based on 15 Ratings

Get security posture management and threat protection for your hybrid cloud workloads with Azure Security Center.

Read More
IBM Secure Gateway logo

IBM Secure Gateway

Secure Gateway Service - Overview 5 Based on 1 Ratings

IBM Secure Gateway is a cloud service that enables you to establish a secure tunnel between the specific resources you want to connect.

Read More
IBM Security zSecure logo

IBM Security zSecure

IBM Security zSecure Admin - Overview 2.5 Based on 1 Ratings

Learn how IBM zSecure Admin can enhance security administration, user management and compliance for IBM RACF.

Read More
Symantec Cloud Workload Protection logo

Symantec Cloud Workload Protection

Cloud Workload Protection 4.1 Based on 11 Ratings

Symantec Cloud Workload Protection enables business agility and cost savings by automating security for public cloud workloads. Visit Symantec to learn more.

Read More
Google Cloud Platform Security Overview logo

Google Cloud Platform Security Overview

Privacy and security & Cloud compliance  |  Google Cloud 4 Based on 74 Ratings

Help keep your organization secure and compliant with Google Cloud. Learn about our privacy and security practices, cloud compliance offerings, and more.

Read More
Symantec Management Center and Reporting logo

Symantec Management Center and Reporting

Management Center and Reporting 5 Based on 2 Ratings

Symantec Management Center and Symantec Reporting each provides unified visibility, management, and reporting for a portfolio of Symantec network security products, simplifying operations and administration through their respective management interfaces.

Read More
Google Cloud Security Command Center logo

Google Cloud Security Command Center

Security Command Center  |  Google Cloud Write a Review

Security management, data risk & compliance monitoring platform to help with vulnerability management. Detect & respond to security vulnerabilities.

Read More
McAfee Cloud Workload Security logo

McAfee Cloud Workload Security

Server Security | McAfee Products 4.1 Based on 7 Ratings

McAfee server security solutions discover workloads, protect servers, and expand into the cloud, helping to protect next-generation data centers.

Read More
Trend Micro Cloud One logo

Trend Micro Cloud One

Hybrid Cloud - Get Security for the Cloud | Trend Micro Write a Review

Trend Micro Cloud One Details Website (http://www.trendmicro.com) Year Founded 1988 HQ Location Tokyo, Japan Total Revenue (USD mm) $1,515 Twitter @trend micro 111,821 Twitter followers LinkedIn Page [www.linkedin.com/company/4312) 6,682 employees on LinkedIn.

Read More
Verizon Secure Cloud Interconnect logo

Verizon Secure Cloud Interconnect

Secure Cloud Interconnect 3 Based on 2 Ratings

Simplify how your organization reaches the cloud with Secure Cloud Interconnect from Verizon. See how this solution can deliver reliable & secure cloud access.

Read More
Kaspersky Hybrid Cloud Security logo

Kaspersky Hybrid Cloud Security

Hybrid Cloud Security Solutions | Kaspersky 4.2 Based on 4 Ratings

Learn about multi-layered enterprise cloud security solutions that provide highest level of protection against cyber threats for hybrid cloud environments.

Read More
CloudGuard IaaS logo

CloudGuard IaaS

CloudGuard Private Cloud Security | Check Point Software 4.3 Based on 56 Ratings

Improve private cloud security to prevent the spread of threats while consolidating visibility and management across physical and virtual networks.

Read More
Armor Anywhere logo

Armor Anywhere

Armor Anywhere - Cloud Workload Protection Platform 4.8 Based on 9 Ratings

Armor Anywhere delivers a security-as-a-service (SECaaS) that fortifies and unifies your on-premise, cloud and hybrid IT security defenses. Read more.

Read More
Prisma Cloud Compute logo

Prisma Cloud Compute

Comprehensive Cloud Security | Prisma 3.5 Based on 1 Ratings

Prisma Cloud is the industry’s most comprehensive Cloud Native Security Platform (CNSP), providing comprehensive security across the largest cloud environments.

Read More
Orca Security logo

Orca Security

Measure Cloud Security in Minutes 4.6 Based on 17 Ratings

Orca Security is a cloud security and compliance for AWS, Azure, and GCP. The SideScanning used to identify vulnerabilities, malware, misconfigurations, lateral movement risk, IAM risk, misplaced sensitive data, and much more. Prioritizes risk based on the severity and can maintain continuous cloud compliance with a single platform. The flexible query language used to gain actionable insights and integrate workflows to achieve ROI.

Read More
Intezer Protect logo

Intezer Protect

Protect your cloud workloads against unauthorized code – Intezer 4.5 Based on 19 Ratings

Protect your cloud workloads against unauthorized code. Top-tier threat detection CWPP with no manual configuration or overhead for your team.

Read More
Fugue logo

Fugue

Cloud Infrastructure Security and Compliance 4.9 Based on 7 Ratings

Fugue is enterprise cloud security developed for engineers. Fugue prevents cloud misconfiguration and ensures continuous compliance with enterprise security policies. Customers such as AT&T, Global Giving, SAP NS2, TravelBank, Emsi and Sparkpost trust Fugue to protect their cloud environments.

Read More
Klusternetes logo

Klusternetes

Designed for Developers and Operators Write a Review

Klusternetes is a unique architecture that allows engineers to avoid infrastructure costs associated with multiple Kubernetes clusters. It offers instant self-service Kubernetes clusters, enabling engineers to spend less time spinning up clusters, and more time focusing on the essential tasks.Klusternetes virtual clusters also offer a solution for operator development in a shared k8s environment, by providing each developer with a sandboxed k8s environment. This makes it easier for teams to work simultaneously, without the hassle of managing shared resources.Klusternetes can also be used for demos and product deployment in sandboxed environments, as well as reducing waiting time for end users in provisioning. This reduces cost for IT, as there is no need to invest in overheads.

Read More

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed