Best Cyber Risk Management Software for Salesforce

Find and compare the best Cyber Risk Management software for Salesforce in 2025

Use the comparison tool below to compare the top Cyber Risk Management software for Salesforce on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    SpinOne Reviews
    Top Pick
    For enterprises that need to protect SaaS data in mission critical apps, SpinOne is an all-in-one SaaS security platform that helps IT security teams consolidate point solutions, save time by automating data protection, reduce downtime, and mitigate the risk of shadow IT, data leak and loss and ransomware. The all-in-one SaaS security platform from Spin is the only one that provides a layered defense to protect SaaS data, including SaaS security posture management (SSPM), SaaS data leak and loss prevention (DLP), and SaaS ransomware detection and response. Enterprises use these solutions to mitigate risk, save time, reduce downtime, and improve compliance.
  • 2
    Cloudaware Reviews

    Cloudaware

    Cloudaware

    $0.008/CI/month
    Cloudaware is a SaaS-based cloud management platform designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware offers such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. In addition, the platform integrates with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and 50+ other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.
  • 3
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 4
    Cypago Reviews
    Automated workflows with no-code reduce manual effort, lower costs and increase trust with customers. Using automated and simplified cross-functional processes, you can improve your security governance, risks, and compliance (GRC). You will learn everything you need to achieve and maintain compliance across all IT environments and security frameworks. Get a detailed, ongoing view of your compliance and risk. Automated processes can save thousands of hours in manual work. Put security policies and procedure into action to maintain accountability. Finally, a complete audit experience that includes audit scope generation, customization, 3600 evidence gathering across data silos and in-context gap analyses, as well as auditor-trusted reporting. Audits can be much easier and more efficient than what they are now. Enjoy instant insights into your employee and user base's access privileges and rights.
  • 5
    Gurucul Reviews
    Advanced threat detection, remediation, and response can be automated using data science-driven security controls. Gurucul's Unified Security and Risk Analytics platform addresses the question: Is anomalous behaviour risky? This is our competitive advantage, and why we are different from everyone else in this market. We won't waste your time alerting you to anomalous activity that isn’t risky. To determine if behavior is dangerous, we use context. Context is crucial. It is not helpful to tell you what is happening. Gurucul difference is telling you when something is wrong. This is information you can use to make decisions. We put your data to use. We are the only security company that can access all of your data outside of the box. We can ingest data of any source: SIEMs, CRMs and electronic medical records, identity management systems, endpoints, etc.
  • 6
    Cyber360 Reviews
    With a best-in class cloud platform, streamline cybersecurity assessments and transform your practice so you can serve more clients. You can identify, analyze, and mitigate cybersecurity risk with full transparency. Flexible, out-of-the box workflows and controls allow for flexibility while increasing efficiency. Create a repeatable cybersecurity assessment process that is tailored to your organization's needs. You can see the risk profile of your organization across business units, third parties, and regions. All assessments, documents, policies, and issues should be gathered and stored in a central repository. Analytics, alerts, and collaboration can be used to prevent exceptions. You can use pre-built or pre-seeded industry assessment template templates or upload your standard practice questionnaire. There are many options for assessments. These include self assessments, onsite assessments and others.
  • 7
    DataGuard Reviews
    Our AI-powered platform will help you get certified quickly. Understand, identify and manage security and compliance risks. We help customers overcome these challenges by integrating a security posture with their overall objectives using a unique, iterative, and risk-based method. We help businesses achieve robust digital security management and compliance with 40% less effort, and a more efficient budget. Our AI-powered platform automates repetitive work, simplifies compliance to complex regulations and frameworks and helps mitigate risks before they disrupt business. Our in-house experts can provide additional support if needed, advising on all security and compliance challenges for organizations now and in the future.
  • 8
    Seemplicity Reviews
    Automated workflows have revolutionized workplace productivity. But what about security? Security teams are often forced to play the role of air traffic controller when it comes to driving down risk. They must deduplicate, sort and prioritize every security finding that is received, then route and follow up with developers across the organization to ensure that problems get resolved. This results in a huge administrative burden on already resource-constrained teams, stubbornly long times-to-remediation, friction among security and development, and inability to scale. Seemplicity simplifies the work of security teams by automating, optimizing and scaling all risk reduction workflows from one place. Aggregated findings that use the same solution for the same resource. Exceptions such as tickets rejected or tickets with a fixed status and an open finding are automatically redirected at the security team for review.
  • 9
    Zywave Cyber OverVue Reviews
    Evaluate the cyber risk quickly for an organization. Utilize proprietary cyber loss data for effective, data driven decision-making. Combining historical loss data, create a holistic view on an organization's cyber-risk. Forecast possible scenarios and their impact on your client or prospective client. Help companies understand their cyber-risk, which areas are vulnerable to attacks, and what impact it could have on their organization. Determine the likelihood of an organization experiencing a cyber-event and the potential financial impact. Find out if an organization has the right cyber protection in place, and identify any gaps in coverage. The comparison of a company's loss history with that of its peers can help identify areas where it is at risk. Guideline on the amount of insurance you should purchase based on traditional benchmarking and limit adequacy analyses.
  • 10
    Averlon Reviews
    Only a small subset of the millions of vulnerabilities found in the cloud can be exploited for real-world attacks. To secure the cloud, it is crucial to identify this subset. Even the most dedicated teams will reach their limits. The presence of a security vulnerability on an asset that is externally exposed or in the KEV Database does not make it critical. You can seamlessly integrate your cloud environment and get a clear view of your security landscape within minutes. Our analysis of attack chains will help you to know exactly where to focus your attention. Averlon performs a detailed graph analysis of your cloud, including assets, network connections and access policies. Focus on assets and problems that pose the greatest risk. Averlon continuously monitors and identifies real-world threats. Averlon accelerates the mean-time-to-remediate by reducing alerts into root causes and suggesting precise fixes.
  • Previous
  • You're on page 1
  • Next