Best IT Security Software for VMware Cloud

Find and compare the best IT Security software for VMware Cloud in 2024

Use the comparison tool below to compare the top IT Security software for VMware Cloud on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    54,574 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    phoenixNAP Reviews

    phoenixNAP

    phoenixNAP

    $0.10/hour
    5 Ratings
    See Software
    Learn More
    As a global IaaS solutions provider, phoenixNAP helps organizations of different sizes meet their IT performance, security, and scalability needs. Delivered from strategic edge locations in the U.S., Europe, Asia-Pacific, and Latin America, phoenixNAP's solutions are globally available, enabling businesses reach their target locales. Its colocation, HaaS, private and hybrid cloud, backup, disaster recovery, and security services are available on an opex-friendly model, providing flexibility and cost-efficiency. Based on world-class technologies, they provide redundancy, security, and advanced connectivity. Companies of all verticals and sizes can leverage phoenixNAP infrastructure for their evolving IT requirements at any stage of growth.
  • 3
    Electric Reviews
    Electric is changing the way businesses manage IT. Electric provides real-time IT support for over 30,000 users and central IT management to more than 600 customers. This offers companies a 50% savings in IT costs and standardized security across devices, apps and networks.
  • 4
    ScaleGrid Reviews

    ScaleGrid

    ScaleGrid

    $8 per month
    3 Ratings
    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. ScaleGrid makes it easy to provision, monitor, backup, and scale open-source databases. It offers advanced security, high availability, query analysis, and troubleshooting support to improve your deployments' performance. The following databases are supported: - MySQL - PostgreSQL - Redis™. - MongoDB®, database - Greenplum™ (coming soon) ScaleGrid supports both public and privately-owned clouds such as AWS, Azure and Google Cloud Platform (GCP), DigitalOcean and Linode, Oracle Cloud Infrastructure, (OCI), VMware, and OpenStack. ScaleGrid is used by thousands of developers, startups, as well as enterprise customers such as Accenture, Meteor and Atlassian. It handles all your database operations at any scale, so you can concentrate on your application performance.
  • 5
    IBM Instana Reviews
    IBM®, Instana®, is the gold-standard of incident prevention. It offers automated full-stack transparency, 1-second granularity, and 3-second notification. In today's highly complex and dynamic cloud environments, an hour of downtime could cost you six figures or more. Traditional application performance monitoring tools (APMs) are not fast enough to keep pace or comprehensive enough to contextualize issues identified. They are also typically only available to super users, who must undergo months of training. IBM Instana Observability is a solution that goes beyond traditional APM by democratizing observability. Anyone in DevOps or SRE, Platform Engineering, ITOps, and Development can access the data they need with the context needed. Instana delivers high-fidelity data with a 1-second granularity, and end-toend traces, as well as the context of logical, physical, and mobile dependencies, across applications, web, and infrastructure.
  • 6
    VMware Avi Load Balancer Reviews
    Software-defined load balancers and container ingress services simplify application delivery for any application, in any datacenter and cloud. Simplify administration by implementing centralized policies that ensure operational consistency in hybrid clouds and on-premises datacenters, including VMware Cloud, AWS, Azure and Google Cloud. Self-service enables DevOps to free infrastructure teams from manual tasks. The toolkits for application delivery automation include Python SDKs, RESTful APIs and Terraform and Ansible integrations. With real-time monitoring of application performance, closed-loop analysis and deep machine-learning, you can gain unprecedented insights into network, end-users and security.
  • 7
    SIRP Reviews
    SIRP is a SOAR platform that is risk-based and non-code. It connects all security teams to achieve consistent strong outcomes through a single platform. SIRP empowers Security Operations Centers, Incident Response (IR), Threat Intelligence (VM) and Security Operations Centers (SOCs). It integrates security tools, powerful automation, and orchestration tools to enable these teams. SIRP is a NO-code SOAR platform that includes a security scoring engine. The engine calculates risk scores specific to your organization based on every alert, vulnerability, and incident. Security teams can map risks to individual assets and prioritize their response at scale with this granular approach. SIRP saves security teams thousands of hours every year by making all security functions and tools available at a push of a button. SIRP's intuitive drag and drop playbook building module makes it easy to design and enforce best practices security processes.
  • 8
    Faddom Reviews

    Faddom

    Faddom

    $1 per node per month
    3 Ratings
    Faddom's software for application dependency mapping uses network traffic protocols in order to automatically map all cloud and on-prem platforms. Get a 24/7, real-time holistic view of all hybrid servers, applications and dependencies. Lightweight. No agents. No credentials. No firewalls. Pricing starts at $1 per node per month. Free for 30 days. Trial is free with no credit card.
  • 9
    Lookout Reviews
    Our mission is to empower productivity in a privacy-focused environment where work and play can occur anywhere. It's vital that cybersecurity is with you everywhere you go. This includes protecting your data from the point of origin to the cloud. As most people now work and manage their lives online, mobility and cloud technology are essential. Lookout solutions are customizable for any industry or company size. They integrate endpoint and cloud security technologies. This platform can be used by individuals, large corporations, and government agencies. Cloud access does not have to be limited to certain services. Security should not interrupt productivity or interfere with the user's experience. We provide visibility and insight into all data, enabling you to secure your data.
  • 10
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 11
    DNSSense Reviews

    DNSSense

    DNSSense

    $1000
    DNSEye detects malicious network traffic and reports if this traffic can be blocked using your other security devices. DNS is used in all protocols, including HTTP, HTTPS and IoT. DNS traffic provides information on your entire network, irrespective of the network protocol. DLP products cannot detect data exfiltration attacks using DNS tunnelling. DNS log analysis is required for an effective solution. 80% of malware domains do not currently have an IP address. Only the DNS log can detect malware requests without an IP address. DNSservers generate a large number of difficult-to-understand logs. DNSEye allows for the collection, enrichment and AI-based classifying of DNS logs. Its advanced SIEM integration saves time and EPS because it transfers only the data needed by SOC teams to SIEM. DNSEye collects logs from a variety of DNS servers, including many different brands and models. This can be done without requiring any changes to your network structure.
  • 12
    VaultCore Reviews

    VaultCore

    Fornetix

    $1,118 per year
    VaultCore™ is a next-generation, highly scalable enterprise key management solution from Fornetix®. It integrates seamlessly with existing platforms, automates policy, and empowers administrators with a centralized, organized control that can be easily applied across all environments. Request a demo to experience VaultCore's products: - Quick, seamless integration with existing technology - Separation Of Duties (a best practice). - Powerful automation allows for centralized control of policy - Increased security of data in motion, at rest, and in use - Significant reduction in the costs associated with data breaches -- lost businesses, recovery time, reputational damage - Simplified compliance, regulatory enforcement - Scalable to more than 100 million keys (more that enough to meet any industry or government's requirements) - Reporting capabilities to meet compliance requirements - Ease in Use
  • 13
    VNS3 Reviews

    VNS3

    Cohesive Networks

    $150 per month
    The all-in one networking device promises connectivity, security, and flexibility at a fraction the price. You can launch a VNS3 image via a public cloud marketplace. We are available in AWS and Azure. Private image sharing. We are happy to share your private image. We can also provide a VDI/VDK format file that you can import into any environment, whether it is VMWare or a locked-down cloud environment. In minutes, the Cohesive Networks support staff will issue a license. You can upgrade your VNS3 controller license via the VNS3 console, or the API. VNS3 Overlay Network can be an optional feature that provides end to end encryption, increased performance (in most clouds environments), and IP address mobility between regions and cloud providers. An overlay network is layered on top of the native networking layers but can be used independently from any underlying hardware or software. The overlay is dependent upon the native networking layers.
  • 14
    Calico Cloud Reviews

    Calico Cloud

    Tigera

    $0.05 per node hour
    Secure and observability SaaS platform that charges per-use for containers, Kubernetes and the cloud. Live view of dependencies and how services communicate with each other in multi-cluster, hybrid, and multi-cloud environments. You can eliminate the setup and onboarding steps, and you can troubleshoot any Kubernetes security or observability issues in minutes. Calico Cloud is a next generation security and observability SaaS platform that supports containers, Kubernetes and cloud. It allows organizations of all sizes and budgets to protect their cloud workloads, containers, detect threats, maintain compliance, and troubleshoot issues in real time across multi-cluster, hybrid, and multi-cloud deployments. Calico Cloud is built upon Calico Open Source, which is the most widely used container networking and security solution. Instead of managing a platform that provides Kubernetes security or observability, teams can use it as a managed service to speed up analysis, relevant actions, and so on.
  • 15
    Metallic Reviews
    As a service, you get simple, smart, and secure data protection. Metallic is the best choice for hybrid cloud services, whether you need it on-premises or SaaS. You can trust Metallic to provide data protection that matches your hybrid cloud strategy. Only SaaS data protection service that covers all hybrid workloads. Your containers are protected at all times. Protect what is most important against corruption and deletion across all of Microsoft Office 365. This integrated protection solution is simple, flexible and comprehensive. It covers all your structured data needs. Endpoint protection has never been easier or more simple. With automated backups and flexible, granular restoration, it's now possible to protect your data. What would you think if you could reduce storage costs on-premises, maintain compliance, and do it all quickly? Customers of Commvault and Metallic get fully-managed cloud storage that can be used for a wide range of workloads through a single interface.
  • 16
    GoSecure Reviews
    Organizations looking to stay above the crowd, stop reacting and be in control. Companies looking to enter the continuous improvement process and optimize their investments. Through GoSecure Titan®'s Managed Security Services (which includes our Managed Extended Detection & Response (MXDR) Service) and our Professional Security Services, we are your ally to prevent breaches.
  • 17
    Modshield SB Reviews

    Modshield SB

    StrongBox IT

    $0.58 per hour
    Modshield SB Web Application Firewall, (WAF), Powered by Modsecurity & OWASP CRS is tailored to meet all your application security requirements. Modshield SB comes packed with security features that provide 360-degree protection for your hosting infrastructure and applications. Modshield SB is powered by the OWASP Core Ruleset and provides optimal protection against OWASP Top 10 threats vectors, automation protection, and protection against credential-stuffing attacks. Why Modshield SB Web Application firewall Modshield SB allows you to make commitments to your business users. It helps you to ensure Confidentiality, Integrity, and Availability of business apps. It's easier than ever to implement an enterprise-grade first line of defense for your applications. Modshield SB is powered by the OWASP Core Ruleset and protects all of your applications from the OWASP Top 10 threats. There is no need to maintain a separate Load Balancer. Modshield SB has a built-in load balancedr.
  • 18
    Cyral Reviews

    Cyral

    Cyral

    $50 per month
    All data endpoints have granular visibility and can be enforced with policy enforcement. Designed to support your infrastructure-as-code workflows and orchestration. Your workloads are dynamically scaled with sub-millisecond latency. All your tools work seamlessly with your application. You can enhance cloud security by implementing granular data access policies. Increase zero trust in the data cloud. Protect your company from data breaches. You can increase trust and provide assurance to your customers. Cyral is designed to meet the unique requirements of the data cloud in terms of performance, deployment, and availability. Cyral allows you to see the whole picture. Cyral's data sidecar, a lightweight and stateless interception system that allows real-time observability of all data cloud activity and granular access control, is Cyral. High-performance and scalable interception. You can prevent malicious access and threats to your data that would otherwise go unnoticed.
  • 19
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 20
    BeyondCorp Enterprise Reviews

    BeyondCorp Enterprise

    Google

    $6 per user per month
    Secure access with integrated threat protection and zero trust. Secure access to critical apps, services. Integrated threat and data protection will protect your information. Agentless technology simplifies the user experience for administrators and end-users. A modern zero trust platform can improve your security. It is built on the backbone Google's global network and infrastructure to provide seamless and secure experiences with integrated DDoS protection and low-latency connections. Layered security that protects users, access, data and applications from malware, data loss and fraud. For extra protection, integrates signals and posture information from top security vendors. You can easily create policies based on user identification, device health, or other contextual factors to control access to applications, VMs, Google APIs, and other services.
  • 21
    Trend Micro Apex Central Reviews

    Trend Micro Apex Central

    Trend Micro

    $37.75 per user
    Centralized security management can bridge the IT and SOC silos, which often have different layers of protection and deployment models. This centralized, connected approach improves visibility, protection, reduces complexity and eliminates redundant or repetitive tasks in security administration. All of these benefits make your organization safer and make your life easier. Visual timelines can be used to identify patterns in threat activity across users' devices and within groups. This eliminates security gaps. Reduce security management costs and time by reducing IT workload. No more console hopping. Create policies, manage threat and information protection, and conduct detailed investigations from one central console. This allows you to secure multiple layers of security. Continuous monitoring and central visibility give you a complete view of your security situation. Integration with your SOC is easy.
  • 22
    VyOS Reviews

    VyOS

    VyOS

    $1000
    Open source software and a universal router are key to democratizing the way we access networks. VyOS' vision is to revolutionize how we access networks, so that everyone can build the solutions they have always wanted, without limitations, restrictions, or prohibitive prices. We believe that internet access is just as important to human development as food, water, air, and healthcare. VyOS was founded by engineers for engineers. It is an open-source software company that makes it possible to access networks without restrictions or prohibitive fees. Through our open-source software and virtual platforms, we do this as VyOS. Stateful firewalls, zone based firewall, all types source and destination NAT (one-to-one, one-to many, many to many). For auditing, creating customized images and contributing, everyone has access to the entire codebase and build toolchain.
  • 23
    InsightCloudSec Reviews

    InsightCloudSec

    Rapid7

    $66,000 per year
    We'll help you transform your business. InsightCloudSec allows you to drive innovation through continuous security compliance. Continuous security and compliance are possible with InsightCloudSec. This unified visibility, monitoring, and automated remediation allows you to prevent misconfigurations and ensure continuous security. Automated cloud security and vulnerability management across dynamic clouds environments helps to secure configurations and workloads. At scale, manage identity and access across ephemeral resource. InsightCloudSec, a cloud-native security platform that integrates seamlessly with your cloud security tools, is your complete cloud security toolbox in one solution. Consumer privacy (or lack thereof) is a major concern. The focus on privacy is manifesting itself in many forms, including regulations such as the California Consumer Privacy Act or the General Data Protection Regulation.
  • 24
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 25
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next