Best IT Security Software for Microsoft Azure - Page 3

Find and compare the best IT Security software for Microsoft Azure in 2025

Use the comparison tool below to compare the top IT Security software for Microsoft Azure on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Total Uptime Cloud Load Balancer Reviews

    Total Uptime Cloud Load Balancer

    Total Uptime Technologies

    $49.00/month
    2 Ratings
    Why settle for a load balancer that locks your data into one cloud platform when there are other options? Multi-Cloud/Hybrid-Cloud/Data Center / On Prem - It works everywhere. Total Uptime allows you to control all inbound traffic. Route traffic around network outages and ISP issues. Protect them from malicious activity and attacks. Integrate devices at colo facilities, on-prem, and in the cloud. You can accelerate them and increase their performance. You have total control and visibility, so it doesn't matter where they may be.
  • 2
    KACE by Quest Reviews

    KACE by Quest

    Quest Software

    As low as $3/mo/device
    2 Ratings
    KACE is an endpoint management solution that offers a single point of control for managing IT systems across the entire organization. From initial deployment to ongoing maintenance, KACE is designed to fulfill all endpoint security and deployment needs—helping businesses quickly deploy, monitor, and manage their devices using a unified inventory database. KACE improves device security with on-demand hardware and software discovery, patch management, compliance reporting, and real-time monitoring of mobile endpoints. KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more. Unified Endpoint Management by KACE. Where Next Meets Now.
  • 3
    Devolutions Server Reviews

    Devolutions Server

    Devolutions

    Team Edition $499.99
    2 Ratings
    IT teams often face difficulties managing shared credentials and accounts securely, especially when multiple users need access to the same resources. Devolutions Server (DVLS) offers a self-hosted, shared account and credential management solution that helps organizations centralize, secure, and audit their credentials. By providing role-based access controls, encryption, and audit logs, DVLS ensures that only authorized users can access critical accounts, minimizing security risks and improving compliance. In addition to core credential management, DVLS includes optional privileged access components for organizations needing enhanced control over sensitive accounts. Seamlessly integrated with Remote Desktop Manager, it allows IT professionals to manage both credentials and remote sessions securely from a single platform. With DVLS, organizations can optimize their credential management processes while maintaining the highest level of security and accountability.
  • 4
    Checkmk Reviews
    Checkmk is an IT monitoring system that allows system administrators, IT managers and DevOps teams, to quickly identify and resolve issues across their entire IT infrastructure (servers and applications, networks, storage and databases, containers, etc. Checkmk is used daily by more than 2,000 commercial customers worldwide and many other open-source users. Key product features * Service state monitoring with nearly 2,000 checks 'outside the box' * Event-based and log-based monitoring * Metrics, dynamic Graphing, and Long-Term Storage * Comprehensive reporting incl. Accessibility and SLAs * Flexible notifications and automated alert handling * Monitoring business processes and complex systems * Software and hardware inventory * Graphical, rule-based configuration and automated service discovery These are the top use cases * Server Monitoring * Network Monitoring * Application Monitoring * Database Monitoring * Storage Monitoring * Cloud Monitoring * Container Monitoring
  • 5
    Proget Reviews

    Proget

    Proget Sp. z o.o

    $4.5 per device/month
    2 Ratings
    Proget simplifies mobility management for modern enterprises with cross-platform support for Android, iOS, iPadOS, macOS, and Windows. Features include automated device registration, geofencing, remote access, secure app management, and an intuitive interface. It supports VPN, MTP profiles, remote desktop, password policies, and integration with Microsoft Entra and Active Directory. Ideal for IT admins managing diverse mobile devices.
  • 6
    Microsoft Sentinel Reviews
    Standing watch, at your side. Intelligent security analytics for your entire organization. With SIEM reinvented for modern times, you can see and stop threats before they cause damage. Microsoft Sentinel gives you a birds-eye view of the entire enterprise. Use the cloud and large-scale intelligence gleaned from decades of Microsoft security expertise to your advantage. Artificial intelligence (AI) will make your threat detection and response faster and more efficient. Reduce the time and cost of security infrastructure setup and maintenance. You can elastically scale your security needs to meet them, while reducing IT costs. Collect data at cloud scale - across all users, devices and applications, on-premises or in multiple clouds. Using Microsoft's unparalleled threat intelligence and analytics, detect previously discovered threats and reduce false positives. Microsoft's decades of cybersecurity experience allows you to investigate threats and track suspicious activities on a large scale.
  • 7
    Microsoft Defender for Cloud Reviews

    Microsoft Defender for Cloud

    Microsoft

    $0.02 per server per hour
    2 Ratings
    Microsoft Defender for Cloud serves as a comprehensive solution for managing cloud security posture (CSPM) and safeguarding cloud workloads (CWP), identifying vulnerabilities within your cloud setups while enhancing the overall security framework of your environment. It provides ongoing evaluations of the security status of your cloud assets operating within Azure, AWS, and Google Cloud. By utilizing pre-defined policies and prioritized suggestions that adhere to important industry and regulatory benchmarks, organizations can also create tailored requirements that align with their specific objectives. Moreover, actionable insights allow for the automation of recommendations, ensuring that resources are properly configured to uphold security and compliance standards. This robust tool empowers users to defend against the ever-changing landscape of threats in both multicloud and hybrid settings, making it an essential component of any cloud security strategy. Ultimately, Microsoft Defender for Cloud is designed to adapt and evolve alongside the complexities of modern cloud environments.
  • 8
    Rublon Reviews

    Rublon

    Rublon

    $1/month/user
    2 Ratings
    Rublon allows your workforce to securely connect to your organization's servers, networks, and applications. Multi-factor authentication makes it easy to protect your data and comply with data protection regulations such as GDPR. Rublon can be deployed across your organization, enabling multi-factor authentication (MFA) for all cloud apps, VPNs servers, workstations, on-premise and internal apps.
  • 9
    SaltStack Reviews
    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure--on-prem, in the cloud, or at the edge. It is built on an event-driven automation engine that detects and responds intelligently to any system. This makes it a powerful solution for managing complex environments. SaltStack's new SecOps offering can detect security flaws and mis-configured systems. This powerful automation can detect and fix any issue quickly, allowing you and your team to keep your infrastructure secure, compliant, and up to date. Comply and Protect are both part of the SecOps suite. Comply scans for compliance with CIS, DISA, STIG, NIST and PCI standards. Also, scan your operating system for vulnerabilities and update it with patches and patches.
  • 10
    miniOrange Reviews

    miniOrange

    miniOrange

    $1 per user per month
    1 Rating
    miniOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange.
  • 11
    Push Security Reviews

    Push Security

    Push Security

    $5 per employee per month
    1 Rating
    Map your cloud identity attack surface and secure it against identity-based attacks. Push is an identity security platform for cloud-first businesses. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and uncover vulnerabilities that can be exploited by identity-based attacks. - Get real-time visibility of all your employees' cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. Prevent your employees creating new identity vulnerabilities. - Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk. Push supports Google Chrome, Microsoft Edge, Firefox, Safari, Brave and Opera.
  • 12
    SolarWinds Server & Application Monitor Reviews
    SolarWinds®, Server & Application Monitor, (SAM), is designed to monitor and manage your applications and supporting infrastructure, no matter if they are running on-premises or in the cloud. Slow applications and downtime shouldn't impact your business services and end users. Find the root cause of any application problems across all layers of the IT stack. Automatedly discover the environment of your application and begin monitoring it, usually in less than an hour. No consultation or professional services required.
  • 13
    Cameyo Reviews

    Cameyo

    Cameyo

    $12.00/month/user
    1 Rating
    Cameyo is a secure Virtual Application Delivery platform (VAD) for any Digital Workspace. Cameyo makes it easy, seamless, secure, and simple to deliver Windows and internal web apps to any device via the browser, without the need to use VPNs or virtual desktops. Cameyo allows organizations to give their employees secure access to business-critical apps from anywhere. This makes hybrid and remote work possible. Cameyo's Digital Workspace solution is used by hundreds of organizations and enterprises to deliver Windows and internal web apps to hundreds of thousands of users around the world.
  • 14
    TraitWare Reviews

    TraitWare

    TraitWare

    $3 per month
    1 Rating
    TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
  • 15
    Silent Push Reviews
    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Organizations are better protected by understanding emerging developing threats before launch, proactively solving problems within infrastructure, and gaining timely and tailored threat intelligence with IoFA, that allows organizations to stay one step ahead of advanced attackers.
  • 16
    Mend.io Reviews

    Mend.io

    Mend.io

    $1,000 per developer, per year
    1 Rating
    Mend.io delivers the first AI native application security platform built for software created by both humans and machines. It empowers organizations to secure AI generated code and embedded AI components like models, agents, MCPs, and RAG pipelines. The unified platform brings together comprehensive capabilities including AI security, SAST, SCA, container scanning, and Mend Renovate providing development and security teams complete visibility into risks across their codebase. With AI powered remediation and prioritization workflows, teams are enabled to quickly resolve issues and reduce risk. With a simple, predictable price model, eliminating per-module costs and minimal reliance on expensive professional services Mend.io is a scalable, proactive, developer-friendly platform for modern AppSec—all in a single platform.
  • 17
    IBM Instana Reviews
    IBM Instana sets the benchmark for incident prevention, offering comprehensive full-stack visibility with one-second precision and a notification time of just three seconds. In the current landscape of rapidly evolving and intricate cloud infrastructures, the financial repercussions of an hour of downtime can soar into the six-figure range or more. Conventional application performance monitoring (APM) tools often fall short, lacking the speed and depth required to effectively address and contextualize technical issues, and they usually necessitate extensive training for super users before they can be utilized effectively. In contrast, IBM Instana Observability transcends the limitations of standard APM tools by making observability accessible to a wider audience, enabling individuals from DevOps, SRE, platform engineering, ITOps, and development teams to obtain the necessary data and context without barriers. The Instana Dynamic APM functions through a specialized agent architecture, utilizing sensors—automated, lightweight programs specifically designed to monitor particular entities and ensure optimal performance. As a result, organizations can respond to incidents proactively and maintain a higher level of service continuity.
  • 18
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 19
    Portnox Security Reviews
    Portnox is a Network Access Control (NAC) software vendor. NAC sits within the larger field of cybersecurity, and more specifically network security. It is a technology that enables organizations to enact its own unique policy for how and when endpoints (desktops, laptops, smartphones, etc.) can connect to their corporate networks. NAC is designed to allow IT security teams to gain visibility of each device trying to access its network, and specifically the type of device and access layer being used (i.e. wifi, wired ports, or VPN).
  • 20
    F5 BIG-IP Advanced WAF Reviews
    The Advanced Web Application Firewall (WAF) safeguards your applications using behavioral analytics, proactive defense against bots, and encryption for sensitive data at the application layer. To understand how the Advanced WAF can enhance your security and reduce costs, utilize the ROI Estimator provided by F5 and Forrester. The F5 BIG-IP Advanced WAF is equipped with a robust array of security options designed to shield your web applications from various threats. While many WAFs deliver only a fundamental level of protection at the upper layers of the OSI model, the F5 Advanced WAF goes beyond that by incorporating advanced security capabilities such as the Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe, among others. It is essential to defend your applications, APIs, and data from common threats, including zero-day exploits, application-layer DoS attacks, coordinated threat campaigns, application takeovers, and malicious bots, ensuring a comprehensive security strategy. By investing in such advanced protections, you can significantly bolster your security measures and better protect your digital assets against evolving threats.
  • 21
    Veeam Kasten for Kubernetes Reviews
    Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most complete set of distributions and platforms at enterprise scale. We give operations and application teams the confidence to withstand the unexpected and deliver faster, all without complex scripting, unsupported tools, and legacy solutions.
  • 22
    F5 BIG-IQ Centralized Management Reviews
    Successful management, orchestration, visibility, and compliance hinge on maintaining uniform application services and security protocols across both on-premises and cloud environments. You can efficiently manage all your BIG-IP devices and services through a centralized management platform. With a striking 87 percent of organizations utilizing applications across diverse clouds and architectures, the challenge of effectively managing these applications, along with the associated services and devices, is substantial. Additionally, a striking finding from the 2020 State of Application Services Report revealed that none of the surveyed customers could accurately identify the number of applications operating within their deployment settings. As application portfolios expand and the need for supplementary appliances and services increases, this management challenge intensifies. You can analyze, troubleshoot, auto-scale, and control every application, service, and F5 device—whether virtual or physical—across any environment, all through a centralized interface tailored to specific roles. Consequently, having an integrated approach not only simplifies management but also enhances the overall efficiency of application operations.
  • 23
    Jit Reviews
    Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 24
    Backslash Security Reviews
    Safeguard your code and open-source components by pinpointing accessible data flows and potential vulnerabilities for efficient risk management. By uncovering legitimate attack vectors leading to reachable code, we empower you to address only the code and open-source software that is actively utilized and accessible. This approach helps prevent unnecessary strain on development teams from dealing with irrelevant vulnerabilities. Enhance the effectiveness of your risk mitigation strategies by concentrating on the most significant threats, ensuring a streamlined and productive security framework. Minimize the distractions caused by CSPM, CNAPP, and other runtime tools by eliminating unreachable packages prior to application execution. Conduct a thorough examination of your software components and dependencies to identify any existing vulnerabilities or outdated libraries that may present risks. Backslash evaluates both direct and transitive packages, guaranteeing complete reachability coverage, and it surpasses traditional tools that focus merely on direct packages, which represent only 11% of the total. This comprehensive analysis enables teams to prioritize security efforts and maintain a robust, resilient codebase.
  • 25
    F5 Distributed Cloud WAF Reviews
    Enhance the security of web applications against various attacks and vulnerabilities by employing robust security measures and a consistent policy framework through our SaaS-based Web Application Firewall (WAF), which is designed for rapid deployment and effortless scalability in any environment. Streamline application security by integrating protective features directly into the development workflow, supported by essential security capabilities, centralized management, and comprehensive monitoring. The F5 Distributed Cloud WAF simplifies the challenges of maintaining secure applications across multiple cloud platforms, on-premises infrastructures, and edge environments. By providing the programmability essential for DevOps alongside the oversight required by SecOps, it facilitates quicker and safer application delivery and release processes. Additionally, users can enhance their understanding of security events, including WAF signature activations, denial-of-service incidents, ongoing automated threats, and all interactions with clients, while also gaining insight into application performance, complete with user-friendly drill-down options. This holistic approach ensures that security is not just an afterthought but an integral part of the development lifecycle.