17 years helping Canadian businesses
choose better software

Cloud Security Software

Cloud Security software helps organizations protect data and applications in the cloud by providing security threat monitoring, detection, and management capabilities.

Featured software

Canada Show local products
Stream Security provides real-time cloud threat detection, security posture management, and compliance monitoring. Learn more about Stream Security
Stream Security is a cloud security software that continuously detects threats and assesses risks across cloud environments. The platform provides real-time analysis of configuration changes to identify critical exposures before attackers exploit them. It uses machine learning driven by the MITRE ATT&CK framework to detect network, identity, and Kubernetes threats without agents. Organizations can leverage the software to secure cloud infrastructure, govern resources, and accelerate incident response. Learn more about Stream Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Threat detection and response backed by an in-house 24/7 SOC, no annual contract required. Learn more about ConnectWise SIEM
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market. Learn more about ConnectWise SIEM

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
ManageEngine Log360 Cloud, a unified cloud SIEM solution with integrated CASB capabilities, helps enterprises secure their network from Learn more about ManageEngine Log360 Cloud
ManageEngine Log360 Cloud, a unified cloud SIEM solution with integrated CASB capabilities, helps enterprises secure their network from cyberattacks. With its security analytics, threat intelligence, and incident management capabilities, Log360 Cloud helps security analysts spot, prioritize, and resolve threats in both on-premises and cloud environments. The solution is highly scalable and helps drive down infrastructure and storage costs. Learn more about ManageEngine Log360 Cloud

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. Learn more about Safetica
Safetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. With advanced data discovery, context-aware classification, proactive threat prevention and adaptive security, Safetica provides comprehensive visibility and control over your data. ✔️ Discover what to protect: Precisely locate personally identifiable information, intellectual property, financials, and more wherever it is used across the enterprise, cloud, and endpoint devices.  ✔️ Prevent threats: Understand and mitigate risky behavior with ​automatic detection of suspicious file access, email ​communication and web browsing. Get the ​alerts you need to proactively uncover risk and ​prevent data breaches.  ✔️ Keep your data safe: Intercept unauthorized exposure of sensitive personal ​data, trade secrets and intellectual property. ​  ✔️ Work smarter: Help teams work, with in-moment data handling cues ​as they access and share sensitive information. Learn more about Safetica

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
NXT1 LaunchIT is the developer’s platform to build and operate secure SaaS. Go from code to published SaaS in just 15 minutes. Learn more about NXT1 LaunchIT
NXT1 LaunchIT is the developer’s platform to build and operate secure SaaS, enabling instant availability by automating cloud infrastructure management – simply code and deploy. LaunchIT is Secure by Design, providing a direct path to FedRAMP-compliance readiness at a fraction of the traditional time and cost required – out of the box. Built on Zero Trust principles, with integrated CI/CD management, multi-account and multi-region support, comprehensive performance management and observability, full ecommerce support, and GitHub integration, LaunchIT accelerates time to revenue for technology startups, legacy application migrations, enterprise expansions, systems integrations, and independent software development. Learn more about NXT1 LaunchIT

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management. Learn more about CloudAware
Cloudaware is a SaaS multi-cloud management platform with such modules as: CMDB, Change Management, Cost Management, Vulnerability Scanning, Monitoring, Intrusion Detection, Patch Management, Compliance Engine, Log Management and Backups & Replication. Cloudaware is designed for enterprises who deploy workloads across multiple AWS, Azure, Google cloud providers and on-premises. Cloudaware integrates out of the box with NewRelic, JIRA, Chef, Puppet, Ansible and over 50 other products. Learn more about CloudAware

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
NordPass encrypts all of your Vault data locally (so they don’t know what’s inside) and backs it up to the cloud. Learn more about NordPass Business
NordPass NordPass ensures the highest security standard through its end-to-end encryption and zero-knowledge architecture. The zero-knowledge architecture extends to cloud backups as well. This means that NordPass encrypts all your Vault data locally and backs it up to the cloud. In turn, you and your team can easily sync stored sensitive data between multiple devices without compromising your security. Learn more about NordPass Business

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Check all your code, container & cloud security issues in one dashboard. Learn more about Aikido Security
Aikido Security is a developer-first software security app. We scan your source code & cloud to show you which vulnerabilities are important to solve. We speed up triaging by massively reducing false positives and making CVEs human-readable. Aikido makes it simple to keep your product secure and gives you back time to do what you do best: write code. Aikido combines scanning capabilities like SAST, DAST, CSPM, SCA, IaC, Container Scanning, and secrets detection, all in one tool. Learn more about Aikido Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
HackerOne is the industry standard for hacker-powered security. Learn more about HackerOne
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Always hot, S3 compatible object storage built to host content, build & run applications, manage media, back up, archive & protect data Learn more about Backblaze B2 Cloud Storage
Backblaze B2 is S3 compatible cloud object storage built purposefully to unlock budgets, unburden administrators, and unleash innovators. Delivering performance at 1/5 the cost including free egress up to 3x monthly storage. Together with technology partners, Backblaze B2 helps customers break free from restrictive, overpriced legacy providers that hold them back, and blaze forward with the full power of the open cloud in their hands. Learn more about Backblaze B2 Cloud Storage

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cloud-based security solution that helps businesses of all sizes secure emails against spam, viruses, ransomware, scams and phishing. Learn more about ALTOSPAM
SaaS software security filter : antispam, antivirus, antiphishing, antiransomwares. Altospam is a company specializing in the protection and security of electronic mail. Our service marketed in Saas mode helps protect businesses, associations and local communities unwanted messages: spam, viruses, phishing, ransomware, advertising. Learn more about ALTOSPAM

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cato provides a complete SASE (Secure Access Service Edge) solution with built-in network security, delivered as a cloud service. Learn more about Cato Networks Suite
Cato pioneered the convergence of networking and security into the cloud. Aligned with Gartner's Secure Access Service Edge (SASE) framework, Cato's vision is to deliver a next-generation secure networking architecture that eliminates the complexity, costs, and risks associated with legacy IT approaches based on disjointed point solutions. With Cato, organizations securely and optimally connect any user to any application anywhere on the globe. Learn more about Cato Networks Suite

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Fidelis Halo is a cloud-native application protection platform software unifying security across hybrid cloud environments. Learn more about Fidelis Halo
Fidelis Halo (also known as Fidelis CloudPassage Halo) is a cloud-native application protection (CNAPP) platform that unifies security and compliance for all your servers, containers, and cloud assets. It is purpose-built to reduce risk and drive security and compliance for dynamic and innovative organizations. Fidelis Halo works across the infrastructure asset lifecycle to help protect, detect, remediate, and continually improve security for public, private, hybrid, and multi-cloud environments Learn more about Fidelis Halo

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Designed to adapt — secure network access solutions tailored to evolving business needs. Learn more about NordLayer
Cloud security is essential for protecting company data and applications from exposure to potential risks. Unauthorized access might lead to data breaches and leaks, resulting in reputational and financial damage. NordLayer enables security measures to company cloud environments, ensuring remote login and access controls. It allows them to operate securely even on a public network encrypting and hiding all business-related data traffic. Learn more about NordLayer

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Guardz ensures that cloud applications are always up-to-date, protected against the latest cyber threats, and insured. Learn more about Guardz
With an innovative solution and multi-layered approach, Guardz ensures that cloud applications are always up-to-date, protected against the latest cyber threats, and insured to mitigate financial risk in the case of a breach. Rest assured that employee and clients’ cloud apps are secured with high-end cyber technology accessible to all businesses. Learn more about Guardz

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Push is a browser-based agent that stops identity attacks. Learn more about Push Security
Push gives your blue team the broadest, most contextual source of telemetry for monitoring all your workforce identities, whether they're in your IdP or not. Using this telemetry, you can detect and respond to identity attacks that can't be observed using other telemetry sources. Not got an in-house blue team? You can still use Push to defend your identities. Enable Push’s out-of-the-box security controls so you can automatically block malicious activities in the browser as well as stop end-users introducing new identity vulnerabilities. Push gives you proactive identity security posture management (ISPM) capabilities AND reactive identity threat detection and response (ITDR) capabilities in a single tool. Learn more about Push Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Keep your cloud infrastructure safe and running while having clear control and a single pane of glass for cybersecurity. Learn more about UnderDefense MAXI
Security-as-a-Service platform tailored for cloud monitoring, empowering you to safeguard performance and security in intricate cloud setups. Jumpstart your journey with UnderDefense's 1500+ ready-to-use correlation rules, interactive dashboards, and seamless integration with 80+ technologies. Sign up today to effortlessly run a self-service AWS CIS Controls assessment. Learn more about UnderDefense MAXI

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
LastPass is the leader in password and identity management, ensuring that credentials are protected, private and always within reach.
LastPass is a cloud-based password manager available on any system or device, ensuring your credentials are protected, kept private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing your most precious data and account logins. Businesses utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs, IAMs, and SIEM tools. With over 100 customizable policies, flexible privileges, detailed reporting, and multifactor and passwordless authentication, LastPass makes it easy for organizations with numerous logins and increasing security risk to standardize password management company wide. Learn more about LastPass

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Canada Local product
1Password helps businesses improve security, visibility and control over how their passwords and company data are protected.
Securing your business starts with 1Password. Trusted by over 100,000 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture. Learn more about 1Password

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
Google Cloud Platform is cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes in all industries. Google Cloud Platform offers a scalable data warehouse powered by cloud storage and machine learning, as well as relational databases for transactions, complex queries, and more. New customers get $300 in free credits during the first 90 days after exhausting free usage which is available across 20+ different products. Learn more about Google Cloud

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cybersecurity to prevent data breaches for organizations with 250+ employees, covering a suite of devices, networks, and applications.
ESET Endpoint Security software is a cloud-based and on-premises application for internet security and malware protection. It has a global user base that comprises businesses of every size. Cloud sandbox technology enables users to protect their mobile devices, laptops, and desktops against ransomware, zero-day attacks, and data breaches. It features file, bot, and mail protection, along with remote device management, virtualization security, firewall set-up, and web control. Learn more about ESET Endpoint Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
On-prem & cloud-based unified endpoint management and security tool that helps manage organization endpoints from single console.
Endpoint Central is a unified endpoint management solution that helps in managing servers, laptops, desktops, smartphones, & tablets from a central location. Using either an on-premise or a cloud-based UEM allows you to automate regular endpoint management routines like installing patches, deploying software, imaging & deploying OS, manage mobiles & BYOD devices, remote troubleshooting, modern management & much more! It also has a mobile app that allows you to manage endpoints anywhere, anytime! Learn more about ManageEngine Endpoint Central

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
An award-winning next-gen antivirus with online privacy tools and patch management automation software for small businesses.
Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Avast Small Business Solutions deliver next-gen endpoint protection for business Windows PCs, Mac, and Windows servers that you can manage anywhere via a web browser (cloud-based management console). Learn more about Avast Ultimate Business Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
SpamTitan is a cloud based Anti Spam email filter. Easy to use and very effective blocking Email-Spam, malware and phishing attacks.
SpamTitan is a cloud based Anti Spam email filter. It is an easy to use, effective, multi-award winning Anti-Spam, malware blocking and phishing prevention solution . Blocks Phishing, spam, viruses, malware, malicious links, spyware and other email security threats. We provide sophisticated email security for your business without making it complicated. Try a FREE 14 day Trial of SpamTitan Email Security today, full support included during trial. Learn more about SpamTitan

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring
Cloud-based software that allows companies to protect physical and virtual environments against viruses and mass malware.
Symantec Endpoint Security is designed to address these challenges with a layered approach to security at the endpoint. It goes beyond traditional antivirus to include firewall, Intrusion Prevention System (IPS) and advanced protection technologies powered by the worlds largest civilian threat intelligence network. Learn more about Symantec Endpoint Security

Features

  • Access Controls/Permissions
  • Behavioral Analytics
  • Threat Intelligence
  • Compliance Management
  • Alerts/Notifications
  • Reporting/Analytics
  • Incident Management Software
  • Real-Time Monitoring