---
description: Page 11 - Compare the top Cloud Security Software & providers for Indian businesses. Filter by price, feature or user rating to make software selection fast and easy.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 11 - Cloud Security Software - Compare Prices & Top Sellers - Capterra India
---

Breadcrumb: [Home](/) > [Cloud Security Software](https://www.capterra.in/directory/31344/cloud-security/software) > [Page 11](https://www.capterra.in/directory/31344/cloud-security/software?page=11)

# Cloud Security Software

Canonical: https://www.capterra.in/directory/31344/cloud-security/software

Page: 11 / 15\
Prev: [Previous page](https://www.capterra.in/directory/31344/cloud-security/software?page=10)\
Next: [Next page](https://www.capterra.in/directory/31344/cloud-security/software?page=12)

> Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.

-----

## Products

1. [MDI Cloud](https://www.capterra.in/software/1045791/freedocs) — 5.0/5 (1 reviews) — A cloud-based platform that offers a secure and efficient solution for organising, managing, and collaborating on documents.
2. [CheckRed](https://www.capterra.in/software/1061699/checkred) — 5.0/5 (1 reviews) — CheckRed is a cloud security platform that helps businesses secure SaaS, IaaS, and PaaS environments on a centralized interface.
3. [Jit](https://www.capterra.in/software/1061762/jit) — 5.0/5 (1 reviews) — Jit's platform is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.
4. [Fidelis Halo](https://www.capterra.in/software/189191/fidelis-halo) — 4.0/5 (1 reviews) — Fidelis Halo is a cloud-native application protection platform software unifying security across hybrid cloud environments.
5. [Oasis Defender](https://www.capterra.in/software/1071854/Oasis-Defender) — 5.0/5 (1 reviews) — Oasis Defender: a Gen AI-powered CSPM that visualizes and automates multi-cloud security, eliminating complexity and high costs.
6. [Controllo](https://www.capterra.in/software/1073507/Controllo) — 5.0/5 (1 reviews) — The AI GRC software that helps entities manage cloud compliance, cyber security requirements for CSA STAR Level 1 \&amp; Level 2, privacy,AI
7. [PingFederate](https://www.capterra.in/software/1010196/pingfederate) — 5.0/5 (1 reviews) — Authentication solution to help businesses manage access to authorized apps and services using SSO.
8. [EmpowerID](https://www.capterra.in/software/136245/empowerid) (0 reviews) — The award-winning all-in-one Identity \&amp; Access Management suite incorporating IGA, AM \&amp; PAM available as on-premise, hybrid, or SaaS.
9. [Kenna](https://www.capterra.in/software/148974/kenna) (0 reviews) — Kenna.VM provides full-stack visibility, shows security and IT teams which vulnerabilities they should remediate, when and why.
10. [CloudSploit](https://www.capterra.in/software/155577/cloudsploit) (0 reviews) — Automated AWS Security and configuration monitoring to maintain a secure and compliant cloud infrastructure environment. Open source.
11. [PreEmptive](https://www.capterra.in/software/163290/PreEmptive) (0 reviews) — PreEmptive secures apps against IP theft, hacking, \&amp; tampering with multi-layered protection for .NET, Java, \&amp; JavaScript.
12. [Enterprise Threat Protector](https://www.capterra.in/software/168483/enterprise-threat-protector) (0 reviews) — Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.
13. [Interconnection Oriented Architecture](https://www.capterra.in/software/168864/ioa) (0 reviews) — Cloud management solution that helps businesses with data management, media migration and information security.
14. [Skybox Vulnerability Control](https://www.capterra.in/software/171381/vulnerability-control) (0 reviews) — Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. skyboxsecurity.com
15. [EncryptRIGHT](https://www.capterra.in/software/171730/encryptright) (0 reviews) — Enterprise software offering encryption, tokenization, data masking and robust key management to secure data \&amp; enforce data privacy.
16. [Trustwave Co-Managed SOC](https://www.capterra.in/software/172964/trustwave-siem-enterprise) (0 reviews) — Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting.
17. [NCP Secure Communication](https://www.capterra.in/software/174766/ncp) (0 reviews) — NCP offers a VPN for secure, scalable management of complex private networks in challenging environments.
18. [Cloud Access Security Broker (CASB)](https://www.capterra.in/software/175495/forcepoint-casb) (0 reviews) — Cloud-first, hybrid-ready solution delivering behavior-centric, risk-adaptive security across environments via a converged platform.
19. [SecureCloud](https://www.capterra.in/software/175962/your-secure-cloud) (0 reviews) — Cloud storage management solution that enables organizations to manage, sync, and share business files with co-workers.
20. [ThreatX](https://www.capterra.in/software/176926/threat-x) (0 reviews) — ThreatX protects modern web applications and APIs from complex cyber threats combining intelligent defense with 24/7 AppSec expertise.
21. [TokenEx](https://www.capterra.in/software/181731/cloud-based-tokenization) (0 reviews) — Cloud-based data security platform that offers tokenization and secure cloud data vaulting for all sensitive data types.
22. [MailGuard](https://www.capterra.in/software/183667/mailguard) (0 reviews) — Moving at SPEED, MailGuard protects against advanced email-borne cyber-attacks, stopping threats up to 48 hours ahead of the market.
23. [STORM](https://www.capterra.in/software/184227/storm-powered-by-otrs) (0 reviews) — STORM improves cloud security by helping analysts quickly manage the orchestration, automation and response of security incidents.
24. [DigitalDefense](https://www.capterra.in/software/186706/digitaldefense) (0 reviews) — Frontline.Cloud platform provides organizations with robust, yet easy to deploy, SaaS Vulnerability Management and Threat Detection.
25. [The Anomali Platform](https://www.capterra.in/software/187189/anomali) (0 reviews) — The Anomali Platform is a cloud-native extended detection and response (XDR) solution that stops breaches and attackers.

-----

Page: 11 / 15\
Prev: [Previous page](https://www.capterra.in/directory/31344/cloud-security/software?page=10)\
Next: [Next page](https://www.capterra.in/directory/31344/cloud-security/software?page=12)

## Related Categories

- [Computer Security Software](https://www.capterra.in/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.in/directory/30907/endpoint-protection/software)
- [Vulnerability Management Software](https://www.capterra.in/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.in/directory/30003/network-security/software)
- [Cloud Management Tools](https://www.capterra.in/directory/30852/cloud-management/software)

## Links

- [View on Capterra](https://www.capterra.in/directory/31344/cloud-security/software)
- [All Categories](https://www.capterra.in/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra India","address":{"@type":"PostalAddress","addressLocality":"Mumbai","addressRegion":"MH","postalCode":"400051","streetAddress":"Gartner India Research & Advisory Services Pvt. Ltd. Raheja Towers 2nd Floor C-30 G- Block Bandra East Mumbai 400051 India"},"description":"Capterra India helps businesses find the best software. With verified reviews, prices & features, our interactive tool makes software selection fast & easy.","email":"info.india@gartner.com","url":"https://www.capterra.in/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.in/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/@CapterraIndia"]},{"name":"Capterra India","url":"https://www.capterra.in/","@type":"WebSite","@id":"https://www.capterra.in/#website","publisher":{"@id":"https://www.capterra.in/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.in/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cloud Security Software","description":"Page 11 - Compare the top Cloud Security Software & providers for Indian businesses. Filter by price, feature or user rating to make software selection fast and easy.","url":"https://www.capterra.in/directory/31344/cloud-security/software?page=11","about":{"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#itemlist"},"breadcrumb":{"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#webpage","mainEntity":{"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#itemlist"},"isPartOf":{"@id":"https://www.capterra.in/#website"},"inLanguage":"en-IN","publisher":{"@id":"https://www.capterra.in/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cloud Security Software","position":2,"item":"https://www.capterra.in/directory/31344/cloud-security/software","@type":"ListItem"},{"name":"Page 11","position":3,"item":"https://www.capterra.in/directory/31344/cloud-security/software?page=11","@type":"ListItem"}],"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 11 - Cloud Security Software - Compare Prices &amp; Top Sellers - Capterra India","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"MDI Cloud","position":1,"description":"MDI Cloud is a user-friendly and secure platform for managing documents and data, designed to simplify organisation, collaboration, and workflows without unnecessary expense or complexity.\n\n- Instantly search your entire data library with ease.\n\n- Enhance efficiency by streamlining processes and reducing repetitive tasks, allowing your team to focus on what matters most.\n\n- Customise and automate document retention policies, whether at the document or dataset level.\n\n- Seamlessly integrate email, automating the filing and extraction of attachments and data.\n\n- Facilitate digital signatures or request them effortlessly.\n\n- Collaborate on documents in real time, eliminating the hassle of merging updates from multiple versions.\n\n- Redact sensitive information manually or let MDI Cloud’s AI Assistant handle it for you.\n\n- Use MDI Cloud’s AI Assistant to generate concise summaries of lengthy documents in seconds.\n\nThese are just a few MDI Cloud's features.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/98b78a2b-2cb2-4351-811b-5232b6f5030a.png","url":"https://www.capterra.in/software/1045791/freedocs","@type":"ListItem"},{"name":"CheckRed","position":2,"description":"CheckRed is a unified security & compliance solution providing full cloud posture coverage (SaaS, IaaS, PaaS) over all major cloud providers and critical SaaS business applications. With an emphasis on simplicity, complete visibility, and competitive pricing, CheckRed makes it easier for companies to protect their environments so they can focus on what matters most; growing their business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e2724f3b-1b3e-4690-9adc-bfda7f7cbd06.jpeg","url":"https://www.capterra.in/software/1061699/checkred","@type":"ListItem"},{"name":"Jit","position":3,"description":"Jit's platform is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes. Tailor a developer security toolchain to your use case and implement it across your repos in a few clicks.\n\nJit empowers developers to own the security of their code without ever leaving their workflow, prioritizing the alerts that matter. Using your current security toolset with Jit, your devs can deliver secure code faster than ever.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4f1d6749-7e32-4eef-86af-590c50ea2eaa.jpeg","url":"https://www.capterra.in/software/1061762/jit","@type":"ListItem"},{"name":"Fidelis Halo","position":4,"description":"Fidelis Halo (also known as Fidelis CloudPassage Halo) is a cloud-native application protection (CNAPP) platform that unifies security and compliance for all your servers, containers, and cloud assets. It is purpose-built to reduce risk and drive security and compliance for dynamic and innovative organizations. Fidelis Halo works across the infrastructure asset lifecycle to help protect, detect, remediate, and continually improve security for public, private, hybrid, and multi-cloud environments","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/be1e917a-c1e2-4f80-b1dd-3cac5673101f.png","url":"https://www.capterra.in/software/189191/fidelis-halo","@type":"ListItem"},{"name":"Oasis Defender","position":5,"description":"Oasis Defender is a Cloud Security Posture Management (CSPM) solution that enhances and visualizes security across multiple clouds. It simplifies configurations, reduces human errors and ensures robust security.\n\nOasis Defender provides comprehensive protection across multiple cloud environments.\n\nMulti-dimensional visualization:\n\n* Cloud Map visualizes the entire network infrastructure across multiple clouds\n* Policy Map visualizes cloud security policies\n* Security Map highlights and helps to remediate security issues\n\nAutomated security analysis:\n\n* Network security analysis: performs network security analysis based on industry best practices and provides actionable recommendations for remediation\n * Data storage security analysis: analyzes the security of data stores in cloud environments, checking access controls and permissions\n\nAgentless architecture:\n\n* Instant onboarding: simple and fast integration\n* Preserves existing cloud topology\n* Reduces potential weak points for attack","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4275edce-1a6f-446f-aab4-e5511c3fd203.jpeg","url":"https://www.capterra.in/software/1071854/Oasis-Defender","@type":"ListItem"},{"name":"Controllo","position":6,"description":"Controllo is an AI based integrated governance, risk, and compliance platform that unifies data, tools, and teams. The software provides visibility into compliance statuses across frameworks such as CCM 4, CAIQ and CAIQ lite by Cloud Security Alliance. Multiple other cyber frameworks have mapping controls along with their evidence. The platform generates provides an ROI of less than a year.\n\nCustomized frameworks can be incorporated as required. ROI for Controllo is less than a year. Learn more with a Demo.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2dce6ad6-0ad4-480e-8e7e-dda48b014166.jpeg","url":"https://www.capterra.in/software/1073507/Controllo","@type":"ListItem"},{"name":"PingFederate","position":7,"description":"Authentication solution to help businesses manage access to authorized apps and services using SSO.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4fbe4a74-0e98-4246-83b4-2061452b9a58.png","url":"https://www.capterra.in/software/1010196/pingfederate","@type":"ListItem"},{"name":"EmpowerID","position":8,"description":"All-in-one Identity Management and Cloud Security platform offer IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability and scalability, EmpowerID ships with a powerful API, the most extensive list of deep system connectors in the market (incl. market-leading integrations with Azure, SAP, and ServiceNow), and is driven by sophisticated RBAC/ABAC/PBAC and workflow engines with over 1,000 ready-to-use workflows for rapid deployment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6c076002-a8d6-48e4-af81-4e502b7db592.png","url":"https://www.capterra.in/software/136245/empowerid","@type":"ListItem"},{"name":"Kenna","position":9,"description":"Your organization faces a tidal wave of vulnerabilities, but you can’t fix them all. Kenna Security’s risk-based vulnerability management solutions use real-time threat intelligence, data science, and predictive algorithms to effectively manage and prioritize risk across your entire enterprise—full-stack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aba9a17a-5b82-4d4c-8e29-c44fb370722c.png","url":"https://www.capterra.in/software/148974/kenna","@type":"ListItem"},{"name":"CloudSploit","position":10,"description":"CloudSploit scans configurations of AWS accounts, looking for security concerns.\nOpen source, with a fully free option.\nOn SANS's Secure DevOps Toolchain.\n\nAmazon Partner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9f85a42c-405f-404b-add6-83489cf41b9d.png","url":"https://www.capterra.in/software/155577/cloudsploit","@type":"ListItem"},{"name":"PreEmptive","position":11,"description":"PreEmptive balances cost, convenience, & functionality to secure your applications, making them more resistant to data & IP theft, hacking, & tampering. \n\nOur quick-to-implement, premium solutions provide multilayered in-app protection:\nDotfuscator for .NET & Xamarin\nDashO for Java & Android\nJSDefender for JavaScript\n\nOur multi-layered approach to binary code protection employs obfuscation, encryption, root detection, shielding, & tamper-proofing to defend against exploitation by both humans and machines. \n\nPreEmptive solutions offer passive & active defense capabilities, safeguarding trade secrets & intellectual property (IP), reducing piracy & counterfeiting, & preventing tampering of code & sensitive data inspection.\n\nEasily integrating into .NET, MAUI, Java, & Android applications, PreEmptive helps you manage application risks and ensure regulatory compliance. \n\nChoose PreEmptive for comprehensive, intelligent app security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5eb05d31-2666-4e19-806a-a0c47af049be.png","url":"https://www.capterra.in/software/163290/PreEmptive","@type":"ListItem"},{"name":"Enterprise Threat Protector","position":12,"description":"Threat protection software that detects access by spiteful domains and stops them from exfiltrating data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6bce38ab-ce61-4449-a8ac-5afa7b99741e.png","url":"https://www.capterra.in/software/168483/enterprise-threat-protector","@type":"ListItem"},{"name":"Interconnection Oriented Architecture","position":13,"description":"Cloud management solution that helps businesses with data management, media migration and information security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6ec74fc9-5cf5-4415-9418-a93820e38c70.png","url":"https://www.capterra.in/software/168864/ioa","@type":"ListItem"},{"name":"Skybox Vulnerability Control","position":14,"description":"Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility\nof your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b837c498-ae7d-42de-b908-c2bc8446b8cb.png","url":"https://www.capterra.in/software/171381/vulnerability-control","@type":"ListItem"},{"name":"EncryptRIGHT","position":15,"description":"EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/26d8b7be-cadd-4200-9928-14dd00d24d14.png","url":"https://www.capterra.in/software/171730/encryptright","@type":"ListItem"},{"name":"Trustwave Co-Managed SOC","position":16,"description":"Simplify security risk and compliance management with powerful correlation engine, big data analytics, and enhanced reporting.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/faa35a28-340b-445b-a5c3-7cb3a4020d17.png","url":"https://www.capterra.in/software/172964/trustwave-siem-enterprise","@type":"ListItem"},{"name":"NCP Secure Communication","position":17,"description":"NCP engineering, with the most flexible VPN software in the industry, is a perfect element to a successful SASE and Zero Trust strategy implementation. NCP’s solution is more than just a VPN; it provides customers with rapid scalability, security, and compatibility to manage their complex private networks in an ever-changing environment. NCP gives companies the ability to be more resilient and responsive in creating, managing, and maintaining their users' network access, resulting in cost-savings, decreased network administration, increased employee productivity, and the ability to adapt policy changes on the fly. \n\nWith global headquarters in Nuremberg, Germany and North American headquarters in Clearwater, Florida, NCP serves 35,000-plus customers worldwide throughout the healthcare, financial, education, and government markets, as well as many Fortune 500 companies. NCP has established a network of national and regional technology, channel, and OEM partners to serve its customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/04e39f89-4768-4941-9b68-5acab93718c8.png","url":"https://www.capterra.in/software/174766/ncp","@type":"ListItem"},{"name":"Cloud Access Security Broker (CASB)","position":18,"description":"Forcepoint Edge Protection helps modernize enterprise networks for cloud adoption. Gain visibility and control over SaaS apps and web use while protecting your users wherever they are. Converged solutions like SD-WAN and NGFW combined with behavior-centric, risk-adaptive capabilities provide outside-in security for on-premise and in the cloud. Reduce the cost and complexity of connecting remote locations with cloud-delivered, zero-footprint security services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/61187622-748d-4412-9ae5-9da26d399e94.png","url":"https://www.capterra.in/software/175495/forcepoint-casb","@type":"ListItem"},{"name":"SecureCloud","position":19,"description":"Secure storage solution for managing, syncing, and sharing business files.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c6b71037-7fd9-4bb0-9a0f-819bd4c2061f.png","url":"https://www.capterra.in/software/175962/your-secure-cloud","@type":"ListItem"},{"name":"ThreatX","position":20,"description":"ThreatX protects web applications and APIs from cyber threats across cloud and on-prem environments. By combining behavior profiling and collective threat intelligence with deep analytics, ThreatX delivers precise protection and complete threat visibility. ThreatXs AppSec-as-a-Service combines threat hunting with 24/7 access to security experts along with operational management, virtually eliminating costs associated with legacy WAFs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/54e67720-a97d-4a23-b63c-d49b2a7a09c3.png","url":"https://www.capterra.in/software/176926/threat-x","@type":"ListItem"},{"name":"TokenEx","position":21,"description":"TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. We work with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type  including PCI, PII, PHI and even unstructured data formats  and integrate with nearly any processor or endpoint.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da8375a5-e590-4d54-b090-0258730bdd76.png","url":"https://www.capterra.in/software/181731/cloud-based-tokenization","@type":"ListItem"},{"name":"MailGuard","position":22,"description":"As a global leader in email security, MailGuard is highly effective in protecting against fast-breaking email attacks. Our 'defence-in-depth' cybersecurity mesh approach protects businesses from prevalent email threats, such as phishing, ransomware, and business email compromise. \n\nWith no software to install, immediate security updates and 24/7 expert support, businesses will always have the most current protection and support against emerging threats.\n\nSign up for our free 14-day trial now.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a7b67cf6-caf6-4f28-a3c9-710ae36538e6.png","url":"https://www.capterra.in/software/183667/mailguard","@type":"ListItem"},{"name":"STORM","position":23,"description":"STORM improves cloud security by helping analysts quickly manage the orchestration, automation and response of security incidents. Plus, STORM SOAR software includes secure structured communication components allowing you to coordinate between IT, security, SOC, risk and management teams too.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d0c2ca4-db73-4e71-9711-51037d679b01.png","url":"https://www.capterra.in/software/184227/storm-powered-by-otrs","@type":"ListItem"},{"name":"DigitalDefense","position":24,"description":"Fortra’s Digital Defense provides Frontline vulnerability management and threat assessment.  Frontline’s risk-based vulnerability management solution encompasses easy-to-use SaaS VM, fast deployment, data management, asset correlation, and actionable reporting to help prioritize high-risk weaknesses. The Frontline.Cloud platform supports Frontline Vulnerability Manager (VM), Frontline Pen Testing, Frontline Web Application Scanning (WAS), Frontline Active Threat Sweep (ATS).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3b2f8dca-fb14-47ca-ae56-4d5b555c5955.jpeg","url":"https://www.capterra.in/software/186706/digitaldefense","@type":"ListItem"},{"name":"The Anomali Platform","position":25,"description":"The Anomali Platform is a cloud-native extended detection and response (XDR) solution that drives detection, prioritization, and analysis, to stop breaches and attackers in real-time. \n\nThe Anomali Platform is fueled by big data management, machine learning, and the world’s largest intelligence repository. It automatically correlates ALL security telemetry against active threat intelligence, enabling organizations to understand what’s happening inside and outside their network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/909bda2c-371b-4406-9b3a-2da070688f77.png","url":"https://www.capterra.in/software/187189/anomali","@type":"ListItem"}],"@id":"https://www.capterra.in/directory/31344/cloud-security/software?page=11#itemlist","numberOfItems":25}
</script>
