Best IT Security Software for Google Cloud Storage

Find and compare the best IT Security software for Google Cloud Storage in 2026

Use the comparison tool below to compare the top IT Security software for Google Cloud Storage on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    New Relic Reviews
    Top Pick
    See Software
    Learn More
    Enhance IT Security with New Relic: Protect your organization with cutting-edge threat detection and robust safeguards. Boost your IT security framework using New Relic's powerful observability platform, which offers software engineers extensive visibility and control over your security environment. Our solution features real-time monitoring and sophisticated threat detection, enabling you to proactively spot and mitigate vulnerabilities before they affect your operations. Effortlessly integrate security insights into your overall IT management to maintain compliance, reduce risks, and secure essential assets. Improve your incident response strategies, streamline security processes, and align your security initiatives with your organizational goals. With New Relic, strengthen your enterprise's defenses against emerging threats and cultivate a proactive security and resilience mindset.
  • 2
    GoAnywhere MFT Reviews
    Top Pick
    See Software
    Learn More
    GoAnywhere MFT offers secure file transfer for businesses. GoAnywhere MFT software can be deployed on-premise, in cloud or hybrid environments. It allows organizations to securely exchange data between employees, customers, trading partners, and systems. GoAnywhere MFT won the Cybersecurity Excellence Award in Secure File Transfer.
  • 3
    Diplomat Managed File Transfer Reviews

    Diplomat Managed File Transfer

    Coviant Software

    $1,149/year
    47 Ratings
    See Software
    Learn More
    Diplomat MFT from Coviant Software is a secure and scalable managed file transfer platform that replaces manual scripts and outdated FTP with reliable, automated file delivery. It supports secure protocols like SFTP, FTPS, HTTPS, and AS2, and integrates easily with cloud services including AWS S3, Azure Blob Storage, Google Cloud, Oracle Cloud, SharePoint, Dropbox, and more. Trusted for over 20 years without a single breach, Diplomat MFT helps organizations meet compliance standards like HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. Advanced security features include automated PGP encryption, MFA, IP whitelisting, and threat intelligence scanning. Still using insecure or outdated tools for critical file transfers? Diplomat MFT is the smarter alternative. Built to simplify operations, close compliance gaps, and protect your most sensitive data. Start your free trial today.
  • 4
    Files.com Reviews
    Top Pick

    Files.com

    Files.com

    $199/month/10 users
    330 Ratings
    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers. As a fully Cloud-Native SaaS, there are no servers for you to buy or maintain, there is no installation required, and high availability and redundancy are built in and free. Our InfoSec Program is audited annually by Kirkpatrick Price, a leading information security CPA firm. Our audit covers the scope of the entire Files.com business (not just datacenter operations) and names Files.com specifically. Beware of smaller competitors who try to pass off someone else’s audit as their own. Technical capabilities include encryption at-rest and in-transit, four types of two-factor authentication, nine enterprise identity (SSO) integrations, configurable password and session policies, and a perfect “A+” score from Qualys SSL Labs.
  • 5
    Cribl Stream Reviews

    Cribl Stream

    Cribl

    Free (1TB / Day)
    Cribl Stream allows you create an observability pipeline that helps you parse and restructure data in flight before you pay to analyze it. You can get the right data in the format you need, at the right place and in the format you want. Translate and format data into any tooling scheme you need to route data to the right tool for the job or all of the job tools. Different departments can choose different analytics environments without the need to deploy new forwarders or agents. Log and metric data can go unused up to 50%. This includes duplicate data, null fields, and fields with zero analytical value. Cribl Stream allows you to trim waste data streams and only analyze what you need. Cribl Stream is the best way for multiple data formats to be integrated into trusted tools that you use for IT and Security. Cribl Stream universal receiver can be used to collect data from any machine source - and to schedule batch collection from REST APIs (Kinesis Firehose), Raw HTTP and Microsoft Office 365 APIs.
  • 6
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    $5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 7
    Dasera Reviews

    Dasera

    Dasera

    3 data stores at $20,000
    Dasera is a Data Security Posture Management (DSPM) solution that provides comprehensive security and governance for structured and unstructured data across cloud and on-premises environments. It uniquely monitors data-in-use, offering continuous visibility and automated remediation to prevent data breaches at every data lifecycle stage. Dasera facilitates continuous risk detection and mitigation, ensuring seamless integration and regulation compliance. With a deep understanding of data infrastructure, attributes, users, and usage, Dasera empowers organizations to pursue a secure, data-driven growth strategy, minimizing risks and maximizing value in the digital era.
  • 8
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 9
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 10
    NirvaShare Reviews

    NirvaShare

    Nirvato Software

    $4 per user per month
    Occasionally, organizations face difficulties in securely sharing and collaborating on files with external entities such as clients and partners who do not belong to their identity management systems. NirvaShare addresses these concerns by managing access, security, and compliance for sharing files stored in the cloud with outside users. In addition to being compatible with cloud deployments, NirvaShare can also be implemented within your on-premise infrastructure, linking seamlessly to existing S3-compatible or other supported storage systems, thus facilitating file sharing for both internal and external stakeholders. When sharing files or folders, users can easily define specific access permissions, such as who has the ability to download, upload, or delete content. It is also straightforward to link groups and users from your Active Directory or any other identity provider. Notably, NirvaShare is engineered to efficiently handle large file transfers, accommodating sizes that can reach several tens of gigabytes, all while maintaining remarkably low resource usage. This makes it an ideal solution for organizations looking to streamline their file-sharing processes securely and effectively.
  • 11
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 12
    Google VPC Service Controls Reviews
    VPC Service Controls provide a managed networking capability for your resources within Google Cloud. New users are offered $300 in complimentary credits to use on Google Cloud within their first 90 days of service. Additionally, all users can access certain products like BigQuery and Compute Engine at no cost, within specified monthly limits. By isolating multi-tenant services, you can significantly reduce the risks associated with data exfiltration. It is crucial to ensure that sensitive information is accessible solely from authorized networks. You can further restrict access to resources based on permitted IP addresses, specific identities, and trusted client devices. VPC Service Controls also allow you to define which Google Cloud services can be accessed from a given VPC network. By enforcing a security perimeter through these controls, you can effectively isolate resources involved in multi-tenant Google Cloud services, thereby minimizing the likelihood of data breaches or unauthorized data access. Furthermore, you can set up private communication between cloud resources, facilitating hybrid deployments that connect cloud and on-premises environments seamlessly. Leverage fully managed solutions such as Cloud Storage, Bigtable, and BigQuery to enhance your cloud experience and streamline operations. These tools can significantly improve efficiency and productivity in managing your cloud resources.
  • 13
    Google Cloud Security Command Center Reviews
    The security and risk management solution for Google Cloud enables you to gain insights into the number of projects you manage, oversee the resources in use, and control the addition or removal of service accounts. This platform helps you detect security misconfigurations and compliance issues within your Google Cloud infrastructure, providing actionable recommendations to address these concerns. It also allows you to identify potential threats targeting your resources through log analysis and utilizes Google's specialized threat intelligence, employing kernel-level instrumentation to pinpoint possible container compromises. In addition, you can monitor your assets in near real-time across various services such as App Engine, BigQuery, Cloud SQL, Cloud Storage, Compute Engine, Cloud Identity and Access Management, and Google Kubernetes Engine. By reviewing historical discovery scans, you can track new, altered, or deleted assets, ensuring a comprehensive understanding of the security posture of your Google Cloud environment. Furthermore, the platform helps detect prevalent web application vulnerabilities, including cross-site scripting and the use of outdated libraries, thereby enhancing your overall security strategy. This proactive approach not only safeguards your assets but also streamlines compliance efforts in an ever-evolving digital landscape.
  • 14
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 15
    LOGIQ Reviews
    LOGIQ.AI's LogFlow offers a unified management system for your observability data pipelines. As data streams are received, they are efficiently categorized and optimized to serve the needs of your business teams and knowledge workers. XOps teams can streamline their data flow management, enhancing data EPS control while also improving the quality and relevance of the data. LogFlow’s InstaStore, built on any object storage solution, provides limitless data retention and allows for on-demand data playback to any observability platform you prefer. This enables the analysis of operational metrics across various applications and infrastructure, yielding actionable insights that empower you to scale confidently while ensuring consistent high availability. By collecting, transforming, and analyzing behavioral data and usage trends from business systems, you can enhance business decisions and improve user experiences. Furthermore, in an ever-evolving threat landscape, it's essential to stay ahead; with LogFlow, you can identify and analyze threat patterns coming from diverse sources, automating both threat prevention and remediation processes effectively. This proactive approach not only strengthens security but also fosters a resilient operational environment.
  • 16
    Veza Reviews
    As data undergoes reconstruction for cloud environments, the concept of identity has evolved, now encompassing not just individuals but also service accounts and principals. In this context, authorization emerges as the most genuine representation of identity. The complexities of a multi-cloud landscape necessitate an innovative and adaptable strategy to safeguard enterprise data effectively. Veza stands out by providing a holistic perspective on authorization throughout the entire identity-to-data spectrum. It operates as a cloud-native, agentless solution, ensuring that your data remains safe and accessible without introducing any additional risks. With Veza, managing authorization within your comprehensive cloud ecosystem becomes a streamlined process, empowering users to share data securely. Additionally, Veza is designed to support essential systems from the outset, including unstructured and structured data systems, data lakes, cloud IAM, and applications, while also allowing the integration of custom applications through its Open Authorization API. This flexibility not only enhances security but also fosters a collaborative environment where data can be shared efficiently across different platforms.
  • 17
    Nasuni Reviews
    The pioneering integration of 'in-line' edge detection alongside swift ransomware recovery capabilities instills confidence in IT professionals to effectively counter cyber threats. Nasuni is revolutionizing the file storage sector through its cloud-centric model, which supplants conventional on-premises primary and secondary storage solutions. By utilizing object storage technology, Nasuni offers a file storage platform that is not only simpler and more cost-effective but also more efficient as a SaaS offering that adapts seamlessly to the rapid growth of unstructured data. This innovative solution allows for cloud file storage across countless locations from a unified console, ensuring on-demand capacity when and where it is required, all while incorporating inherent backup and disaster recovery features. Designed to support cloud, hybrid cloud, and traditional on-premises setups, Nasuni consolidates various data silos and toolsets into a singular global file system that provides a comprehensive overview of your file data while being straightforward to deploy and manage. Ultimately, this approach empowers organizations to streamline their file storage processes, enhancing overall operational efficiency.
  • 18
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 19
    The Respond Analyst Reviews
    Enhance investigative processes and boost analyst efficiency with an advanced XDR Cybersecurity Solution. The Respond Analyst™, powered by an XDR Engine, streamlines the identification of security threats by transforming resource-heavy monitoring and initial assessments into detailed and uniform investigations. In contrast to other XDR solutions, the Respond Analyst employs probabilistic mathematics and integrated reasoning to connect various pieces of evidence, effectively evaluating the likelihood of malicious and actionable events. By doing so, it significantly alleviates the workload on security operations teams, allowing them to spend more time on proactive threat hunting rather than chasing down false positives. Furthermore, the Respond Analyst enables users to select top-tier controls to enhance their sensor infrastructure. It also seamlessly integrates with leading security vendor solutions across key areas like EDR, IPS, web filtering, EPP, vulnerability scanning, authentication, and various other categories, ensuring a comprehensive defense strategy. With such capabilities, organizations can expect not only improved response times but also a more robust security posture overall.
  • 20
    Theom Reviews
    Theom is an advanced cloud data security solution designed to uncover and safeguard all types of data found in cloud storage, APIs, and message queues. Much like a vigilant bodyguard dedicated to protecting valuable assets, Theom ensures that security measures are consistently applied to data, regardless of its storage or access method. By utilizing agentless scanning and natural language processing classifiers, Theom effectively identifies personally identifiable information (PII), protected health information (PHI), financial data, and trade secrets, while accommodating customized taxonomies. Additionally, it reveals dark data—information that remains unused—and shadow data, which has a different security posture compared to its primary version. Theom excels in locating sensitive information, such as developer keys, within APIs and message queues. To assist organizations in prioritizing threats, Theom also assesses the financial impact of data. Furthermore, it maps the intricate relationships between datasets, access identities, and their associated security features, thereby revealing potential vulnerabilities. By illustrating how valuable data is accessed by different identities, such as users and roles, Theom provides a comprehensive view of security attributes, including user location and unusual access patterns. This holistic approach empowers organizations to make informed decisions about their data security strategies.
  • 21
    Google Digital Risk Protection Reviews
    Understanding what a digital risk protection solution entails can significantly enhance your readiness by revealing who is targeting you, their objectives, and their methods for potential compromise. Google Digital Risk Protection offers a comprehensive digital risk protection solution through both self-managed SaaS products and an all-encompassing service model. Each alternative equips security experts with the ability to see beyond their organization, recognize high-risk attack vectors, and detect malicious activities stemming from both the deep and dark web, as well as attack campaigns occurring on the surface web. Furthermore, the Google Digital Risk Protection solution supplies detailed insights into threat actors, including their tactics, techniques, and procedures, thereby enriching your cyber threat profile. By effectively mapping your attack surface and keeping tabs on activities in the deep and dark web, you can also gain valuable visibility into risk factors that could jeopardize the extended enterprise and supply chain. This proactive approach not only safeguards your organization but also enhances overall resilience against future threats.
  • 22
    Tenzir Reviews
    Tenzir is a specialized data pipeline engine tailored for security teams, streamlining the processes of collecting, transforming, enriching, and routing security data throughout its entire lifecycle. It allows users to efficiently aggregate information from multiple sources, convert unstructured data into structured formats, and adjust it as necessary. By optimizing data volume and lowering costs, Tenzir also supports alignment with standardized schemas such as OCSF, ASIM, and ECS. Additionally, it guarantees compliance through features like data anonymization and enhances data by incorporating context from threats, assets, and vulnerabilities. With capabilities for real-time detection, it stores data in an efficient Parquet format within object storage systems. Users are empowered to quickly search for and retrieve essential data, as well as to reactivate dormant data into operational status. The design of Tenzir emphasizes flexibility, enabling deployment as code and seamless integration into pre-existing workflows, ultimately seeking to cut SIEM expenses while providing comprehensive control over data management. This approach not only enhances the effectiveness of security operations but also fosters a more streamlined workflow for teams dealing with complex security data.
  • 23
    Mondoo Reviews
    Mondoo serves as a comprehensive platform for security and compliance, aiming to significantly mitigate critical vulnerabilities within businesses by merging complete asset visibility, risk assessment, and proactive remediation. It catalogs a thorough inventory of all types of assets, including cloud services, on-premises systems, SaaS applications, endpoints, network devices, and developer pipelines, while consistently evaluating their configurations, vulnerabilities, and interrelations. By incorporating business relevance, such as the importance of an asset, potential exploitation risks, and deviations from established policies, it effectively scores and identifies the most pressing threats. Users are provided with options for guided remediation through pre-tested code snippets and playbooks, or they can opt for autonomous remediation facilitated by orchestration pipelines, which include features for tracking, ticket generation, and verification. Additionally, Mondoo allows for the integration of third-party findings, works seamlessly with DevSecOps toolchains including CI/CD, Infrastructure as Code (IaC), and container registries, and boasts over 300 compliance frameworks and benchmark templates to ensure a thorough approach to security. Its robust functionality not only enhances organizational resilience but also streamlines compliance processes, offering a holistic solution for modern security challenges.
  • 24
    Chronicle SOAR Reviews
    Utilize playbooks to achieve rapid value realization and facilitate seamless scaling as your organization expands. Tackle typical everyday issues such as phishing and ransomware by implementing ready-to-use use cases, which include playbooks, simulated alerts, and instructional tutorials. Develop playbooks that integrate the various tools essential to your operations through an intuitive drag-and-drop interface. Furthermore, streamline repetitive processes to enhance response times, allowing team members to focus on more strategic tasks. Ensure effective lifecycle management of your playbooks by maintaining, optimizing, troubleshooting, and refining them through features like run analytics, reusable components, version tracking, and rollback options. Incorporate threat intelligence throughout each phase while visualizing crucial contextual information for each threat, detailing who took action, when it occurred, and how all the involved entities relate to an event, product, or source. Innovative technology automatically consolidates contextually linked alerts into a unified threat-centric case, empowering a single analyst to conduct thorough investigations and effectively respond to threats. Additionally, this approach fosters continuous improvement of security protocols, ensuring they remain robust in the face of evolving challenges.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB