---
description: Page 6 - Discover the best Cloud Security Software in New Zealand. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 6 - Best Cloud Security Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software) > [Page 6](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6)

# Cloud Security Software

Canonical: https://www.softwareadvice.co.nz/directory/4329/cloud-security/software

Page: 6 / 12\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=5)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=7)

-----

## Products

1. [GuardRails](https://www.softwareadvice.co.nz/software/356775/guardrails) — 5.0/5 (5 reviews) — GuardRails is a security platform that empowers developers to build secure applications by giving them continuous pro...
2. [Holm Security VMP](https://www.softwareadvice.co.nz/software/360656/holm-security-vmp) — 4.4/5 (5 reviews) — The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber se...
3. [PingSafe](https://www.softwareadvice.co.nz/software/377078/pingsafe) — 5.0/5 (5 reviews) — PingSafe is an industry-leading all-in-one cloud security platform with a comprehensive knowledge of the attackers’ m...
4. [G-Core](https://www.softwareadvice.co.nz/software/470169/Security) — 4.8/5 (5 reviews) — Gcore is a global infrastructure platform providing cloud, edge, security, and AI solutions to enhance application pe...
5. [Threat Detection Marketplace](https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace) — 5.0/5 (4 reviews) — Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security infor...
6. [Cortex XSOAR](https://www.softwareadvice.co.nz/software/223864/cortex-xsoar) — 4.8/5 (4 reviews) — Cortex XSOAR is a security orchestration, automation, and response (SOAR) solution that helps businesses correlate in...
7. [365 Total Protection](https://www.softwareadvice.co.nz/software/402258/365-total-protection) — 4.8/5 (4 reviews) — 365 Total Protection is an email security management platform for Microsoft Office 365. This platform provides a comp...
8. [Enigma Vault](https://www.softwareadvice.co.nz/software/339963/enigma-vault) — 4.8/5 (4 reviews) — Enigma Vault offers cloud-based data security solutions that protect what's most important. Practically every industr...
9. [meshcloud](https://www.softwareadvice.co.nz/software/340975/meshcloud) — 4.3/5 (4 reviews) — meshStack is built on years of experience in cloud transformation with major customers such as Volkswagen, Metro and ...
10. [Banyan Security](https://www.softwareadvice.co.nz/software/366893/banyan-security) — 4.3/5 (4 reviews) — Banyan Security’s next-generation zero trust network access platform offers seamless remote access to corporate resou...
11. [MixMode](https://www.softwareadvice.co.nz/software/266675/mixmode) — 4.8/5 (4 reviews) — MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety o...
12. [Push Security](https://www.softwareadvice.co.nz/software/368231/push-security) — 5.0/5 (4 reviews) — Push Security equips your blue team with the telemetry and actionability to stop attacks against workforce identities...
13. [Aware](https://www.softwareadvice.co.nz/software/331022/awarehq) — 3.5/5 (4 reviews) — The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for gov...
14. [CloudWize](https://www.softwareadvice.co.nz/software/356022/cloudwize) — 4.5/5 (4 reviews) — CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture desig...
15. [SecureAuth Workforce IAM](https://www.softwareadvice.co.nz/software/168652/secureauth-idp) — 4.5/5 (4 reviews) — SecureAuth is a cloud-based software that helps businesses manage and verify user identities through various authenti...
16. [Uniqkey](https://www.softwareadvice.co.nz/software/425970/uniqkey) — 5.0/5 (4 reviews) — Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies w...
17. [Quadrant XDR](https://www.softwareadvice.co.nz/software/417889/sagan) — 5.0/5 (4 reviews) — Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a s...
18. [NirvaShare](https://www.softwareadvice.co.nz/software/351955/nirvashare) — 5.0/5 (4 reviews) — NirvaShare is an enterprise file sharing solution. It caters to mid-size and large organizations across various indus...
19. [Alyne](https://www.softwareadvice.co.nz/software/363034/alyne) — 5.0/5 (4 reviews) — The Alyne platform for governance, risk and compliance (GRC) provides intuitive, AI-enabled capabilities to dynamic e...
20. [AppOmni](https://www.softwareadvice.co.nz/software/243930/appomni) — 5.0/5 (4 reviews) — AppOmni helps businesses to secure data across SaaS applications. It offers data access visibility, centralized manag...
21. [CloudConnexa](https://www.softwareadvice.co.nz/software/506382/Cloud-Connexa) — 4.0/5 (4 reviews) — CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexibl...
22. [Harmony Email & Collaboration](https://www.softwareadvice.co.nz/software/222685/harmony-email-and-office) — 4.7/5 (3 reviews) — Harmony Email \&amp; Collaboration (formerly Harmony Email \&amp; Office) is a cloud-based software designed to help bu...
23. [Lightspin](https://www.softwareadvice.co.nz/software/242111/lightspin) — 4.7/5 (3 reviews) — Lightspin offers an application programming interface (API) for integrations. It also provides behavioral analytics, ...
24. [Apiiro](https://www.softwareadvice.co.nz/software/340167/apiiro) — 4.3/5 (3 reviews) — Apiiro invented a code risk platform to remediate critical risks from cloud to code and secure all cloud-native appli...
25. [VMware NSX](https://www.softwareadvice.co.nz/software/254709/vmware-nsx) — 4.7/5 (3 reviews) — VMware NSX enables the secure, elastic and multitenant cloud with full-stack network and security virtualization. It ...

-----

Page: 6 / 12\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=5)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=7)

## Related Categories

- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Data Loss Prevention Software](https://www.softwareadvice.co.nz/directory/4270/data-loss-prevention/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Cloud Integration Software](https://www.softwareadvice.co.nz/directory/4676/cloud-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.nz/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@type":"WebSite","@id":"https://www.softwareadvice.co.nz/#website","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cloud Security Software","description":"Page 6 - Discover the best Cloud Security Software in New Zealand. Compare top Cloud Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6","about":{"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cloud Security Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software","@type":"ListItem"},{"name":"Page 6","position":3,"item":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 6 - Best Cloud Security Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"GuardRails","position":1,"description":"GuardRails is a security platform that empowers developers to build secure applications by giving them continuous protection. \n\nGuardRails provides a seamless experience for you and your team by securing all the critical components of an app. The visibility into security issues will let users know if there are any potential threats and take action immediately.\n\nThe solution automatically streamlines your application security process so you’ll increase productivity while staying secure and spend less time worrying about vulnerabilities and the business harm they cause.\n\nGuardRails is the perfect solution to make your development process more secure. It enhances your security in all aspects and gives you and your team security and efficiency.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f625515-6e4f-4af3-8560-e94181abe258.png","url":"https://www.softwareadvice.co.nz/software/356775/guardrails","@type":"ListItem"},{"name":"Holm Security VMP","position":2,"description":"The Holm Security helps customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view.\n\nNext-Gen Vulnerability Management Platform includes the following:-\n\nTechnical Assets:-\n1) System & Network Scanning\nTakes control of the security of systems and networks with System & Network Scanning. It covers all parts of the user's infrastructure – public and local systems, computers, cloud infrastructure, IoT, and OT/SCADA.\n\n2) Web Application Scanning\nIdentifies a wide range of vulnerabilities, including OWASP top 10 and exposed APIs, with Web Application Scanning helping users to reduce their attack surface.\n\nHuman Assets:-\n3) Phishing & Awareness Training\nBuilds human firewalls with the help of simulated email attacks, i.e., phishing, spear phishing, and ransomware. Increase employee resiliency with tailored and automated awareness training.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a83f49aa-46d4-42b8-88ee-e5cb317604a6.png","url":"https://www.softwareadvice.co.nz/software/360656/holm-security-vmp","@type":"ListItem"},{"name":"PingSafe","position":3,"description":"PingSafe is an industry-leading all-in-one cloud security platform with a comprehensive knowledge of the attackers’ modus operandi. \n\nPingSafe is a comprehensive CNAPP that scans your entire cloud infrastructure through an attacker's lens and helps you remediate the most exploitable vulnerabilities with unmatched speed and scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1abe1a03-1ede-4c35-b9da-74bf4cf8f1fd.png","url":"https://www.softwareadvice.co.nz/software/377078/pingsafe","@type":"ListItem"},{"name":"G-Core","position":4,"description":"Gcore is a global infrastructure platform providing cloud, edge, security, and AI solutions to enhance application performance and safeguard digital assets. It serves businesses in sectors such as gaming, media, technology, and enterprise that require efficient content delivery, scalable computing resources, and protection against cyber threats. The platform operates in over 210 countries and has a network capacity designed to support organizations of various sizes.\n\nIts infrastructure includes Edge Cloud with multiple global locations, managed Kubernetes with GPU worker nodes, bare metal servers, and AI infrastructure powered by NVIDIA GPUs. The content delivery network spans more than 210 points of presence and connects with thousands of peering partners, offering low response times globally. Security features include DDoS protection and web application and API protection integrated across services. Other capabilities include autoscaling GPU infrastructure, Function as a Service, managed logging, and support for private, hybrid, and on-premises cloud environments.\n\nThe platform is managed through a unified control panel that combines CDN, streaming, storage, cloud, DDoS protection, and DNS hosting. Infrastructure management is supported via API and Terraform for automated deployment and scaling. Gcore owns and operates its infrastructure, which includes connectivity to numerous internet exchange points and Layer 2 connectivity between bare metal and virtual instances.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5cf7ef2e-891e-4d1b-9ef0-e11df89b2f12.png","url":"https://www.softwareadvice.co.nz/software/470169/Security","@type":"ListItem"},{"name":"Threat Detection Marketplace","position":5,"description":"Threat Detection Marketplace (TDM) is a SaaS content analysis platform, which provides businesses with security information event management (SIEM) and endpoint detection and response (EDR) tools to identify cybersecurity threats. Professionals can conduct automated audits and generate technical reports related to data quality issues, detection rules coverage and more.\n\n\nIT technicians can access MITRE ATT&CK, a global repository of resources and techniques, to create use cases for cloud security monitoring, data integration with Amazon Elastic Container Service (ECS) and other processes. Threat Detection Marketplace provides a dashboard, which can be utilized by enterprises to gain an overview of impacted devices and audit results.\n\n\nThreat Detection Marketplace facilitates integration with several third-party cybersecurity applications including Elastic Stack, Qradar, Splunk and ArcSight. Pricing is available on request and support is extended via live chat and an inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f8bcf7c9-a8c4-44ce-b54b-ba2cfa5200fd.png","url":"https://www.softwareadvice.co.nz/software/106326/threat-detection-marketplace","@type":"ListItem"},{"name":"Cortex XSOAR","position":6,"description":"Cortex XSOAR is a security orchestration, automation, and response (SOAR) solution that helps businesses correlate incidents, aggregate multi-source feeds and conduct malware analysis, among other processes on a centralized platform. It allows staff members to use automated and purpose-built playbooks to parse, de-duplicate and manage indicators from multiple external sources.\n\nCortex XSOAR enables team members to manage incident response, ransomware remediation and threat intelligence across on-premise, hybrid and cloud-native environments. It lets employees conduct real-time investigations, solve emergent threats, manage authentication protocols, prioritize alerts and more from within a unified platform. Additionally, it allows business leaders to utilize customizable dashboards to monitor incidents based on multiple criteria, such as severity, indicator source and SLA.\n\nCortex XSOAR enables organizations to integrate the platform with several third-party solutions. It also provides iOS and Android mobile applications, allowing employees to track security incidents remotely. Pricing is available on request and support is extended via live chat, documentation, phone, email and other measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/727207f8-9579-46a6-afc4-1129a35e2723.png","url":"https://www.softwareadvice.co.nz/software/223864/cortex-xsoar","@type":"ListItem"},{"name":"365 Total Protection","position":7,"description":"365 Total Protection is an email security management platform for Microsoft Office 365.\n\nThis platform provides a comprehensive security solution with a wide range of features that ensure email and data security such as real-time mail flow analysis, spam and malware protection, and filter options to find data on specific emails.\n \nThe Enterprise plan covers legally compliant email archiving with advanced features and offers intelligent protection against advanced persistent threats by using AI-based analysis mechanisms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3afbcf5a-3289-4cd1-9c4b-5bdceb64ba50.png","url":"https://www.softwareadvice.co.nz/software/402258/365-total-protection","@type":"ListItem"},{"name":"Enigma Vault","position":8,"description":"Enigma Vault offers cloud-based data security solutions that protect what's most important.\n\nPractically every industry has been plagued with data security issues: data breaches through application vulnerabilities, cloud bucket storage leaks, lost database and file share backups, administrative credential exposure, weak passwords, permissions mishaps, intentional insider threats, and more. The risk to your data will only increase over time with the advent of new threats and the accumulation of data. It all sounds doom and gloom, but it doesn't have to be this way.\n\nEnigma Vault is a SaaS-based secure card, data, and file storage and processing solution built from the ground up to solve many of your data security problems. Instead of you handling and storing sensitive data, we give you a token that can then be used for later retrieval and processing. Let's go over the three different vaults that comprise the suite.\n\nCard Vault encrypts, tokenizes, and processes card data. If you use Card Vault, you'll never have to handle card data again. This greatly reduces your PCI scope. Yet at the same time, you have full control over the stored cards and will integrate seamlessly with your existing payment provider.\n\nData Vault encrypts and tokenizes your plaintext data. Plaintext data could be anything from various personally identifiable information (PII), healthcare data, education data, financial data, human resources data, criminal justice / background check data...you name it that's normally stored in a database, and it can be stored in Data Vault.\n\nFile Vault works very similar to Data Vault except that it handles files such as PDFs, Excel documents, Word documents, etc. It encrypts files of any type. Think of File Vault as your application's secure file storage that's not vulnerable to bucket misconfigurations or accidental user permission issues.\n\nWhat Makes Enigma Vault Unique? \n• The only complete tokenization and encryption solution for cards, data, and files.\n• Easily and securely share data with other Enigma Vault customers.\n• Search encrypted data within Data Vault.\n• Robust disaster recovery strategy backing up data in real-time to another geographical region.\n• You're minutes away from having access to our solution; modern, super easy integration, and developer-friendly.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3e7edbd0-f797-4129-b7ea-7b7bb9fdb6fb.png","url":"https://www.softwareadvice.co.nz/software/339963/enigma-vault","@type":"ListItem"},{"name":"meshcloud","position":9,"description":"meshStack is built on years of experience in cloud transformation with major customers such as Volkswagen, Metro and Commerzbank. meshStack enables companies to build a cloud foundation based on best practices, both organizationally and technically. This enables them to fully exploit the advantages of the cloud and become faster, more secure and more cost-effective. This is not possible with traditional corporate IT structures - especially in a multi-cloud context.\n\nWith meshStack platform they can centrally manage security, costs, identities, services and more for all clouds of a company. This provides a secure framework while allowing DevOps teams to access the cloud they need quickly and natively in self-service.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/347658e9-df5e-4360-98cc-b4b41ae99d99.png","url":"https://www.softwareadvice.co.nz/software/340975/meshcloud","@type":"ListItem"},{"name":"Banyan Security","position":10,"description":"Banyan Security’s next-generation zero trust network access platform offers seamless remote access to corporate resources hosted on-premise or in hybrid and multi-cloud environments. Banyan enhances security by reducing your attack surface, eliminating lateral movement and preventing unauthorized access. Utilizing innovative TrustScoring, powered by machine learning, Banyan ensures both users and devices are authenticated and authorized before granting granular least privileged access to sensitive corporate applications and servers. \n\nFree for teams of up to 20 users, Banyan’s market-leading ZTNA solution can be deployed in 15 minutes or less. Least privilege access and continuous authorization are based on a trinity of user and device trust, device posture and resource sensitivity, aligning request risk with resource sensitivity, and revoking access mid-session if warranted. Workers only have access to what they need, unlike legacy VPNs that grant overly-broad access to entire networks, making it ideal for providing secure access to contractors, partners and other third parties who tend to use non-managed devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f07071b8-91fc-4143-8d80-48ef4aa69788.jpeg","url":"https://www.softwareadvice.co.nz/software/366893/banyan-security","@type":"ListItem"},{"name":"MixMode","position":11,"description":"MixMode is a no-rules Cybersecurity platform, serving large enterprises with big data environments across a variety of industries. We deliver a patented, self-learning platform that acts as the Cybersecurity Intelligence Layer℠ to detect both known and unknown attacks, including novel attacks designed to bypass legacy cyber defenses. Trusted by global entities in banking, public utilities and government sectors, industry cyber leaders rely on MixMode to protect their most critical assets. The platform dramatically improves the efficiency of SOC teams previously burdened with writing and tuning rules and manually searching for attacks.\n\nMixMode’s Third Wave AI is uniquely effective at addressing blindspots in enterprise security\n- Detect Novel Attacks\n- Monitor voluminous data streams\n- Reduce disparate tools\n\nKnown and Novel Attack Detection:  80% of successful attacks are novel attacks (per Ponemon Institute) designed to bypass legacy rules-based systems, rendering tools that rely on rules, labeling, human operators, and training data useless in detecting such attacks before the damage is done. MixMode uses a breakthrough, real-time approach based in dynamical systems with no reliance on rules to detect and defend against known and novel cyber-attacks, enabling your security team to stop the attack before damage or destabilization. \n\nGain Visibility via Efficient Alert Triage:  With the increase in the volume of data across multiple environments, one of the most common concerns we hear from SOC teams is they have no way to triage alerts from the multiple cybersecurity tools and data sources they are currently managing.  MixMode solves this problem by applying our technology at the raw signal level.  This allows our customers to automate identification, notification, and context for high risk threats across all data types through their entire organization (cloud, flow, API, network, log, IoT, etc.).\n\nAutomation → Real-Time Detection:  MixMode’s AI platform is a self-learning system that builds an understanding of complex environments to create an evolving forecast of what’s expected in a given context like time of day, day of week and how entities and users communicate. As a result, we can detect anomalies that are breadcrumbs, or precursors to a breach in real-time.  This evolving forecast of what’s expected and real-time identification of deviations is essential to detecting and combating novel attacks that rules-based systems consistently miss.  And the majority of attack detection claims in the marketplace that mention ML or AI are reliant on rules-based detection versus MixMode’s patented, Third Wave AI technology.  \n\nNo Assembly Required:  By removing the inefficiencies that rules-based alerts and constant tuning can place on your security team, MixMode’s self-learning AI’s understanding of normal and expected behavior positions you to effectively detect novel and known attacks in real-time. You can quickly augment your overwhelmed SOC team by deploying MixMode alongside your existing security stack, or you may decide to consider tool consolidation with MixMode as the primary interface for your team.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/514d9156-e063-45f0-992e-bf522df3106b.png","url":"https://www.softwareadvice.co.nz/software/266675/mixmode","@type":"ListItem"},{"name":"Push Security","position":12,"description":"Push Security equips your blue team with the telemetry and actionability to stop attacks against workforce identities. \n\nPush is a browser agent that generates telemetry across your identity attack surface so you can detect attacks and find exploitable vulnerabilities. \n\nPush also allows you to enforce just-in-time security controls in the browser. \n\nUsing Push, you can:\n\n- Detect and stop phishing attacks\n- Detect attackers using identity attack toolkits \n- Detect session hijacking\n- Block malicious URLs\n- Pull rich identity telemetry into your SIEM/XDR platform\n- Create custom detection use cases\n- Enhance post-breach investigations\n- Enforce security policies in the browser\n- Stop SSO credentials being exposed\n- Discover unmanaged identities and apps\n- Block unapproved apps\n- Off-board employees from all work apps when they leave\n- Guide end users to create secure identities\n- Equip end-users to fix vulnerabilities\n- Track changes to your identity infrastructure in real time","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/84e9b971-85d6-4a30-84a3-92f3672aab6d.png","url":"https://www.softwareadvice.co.nz/software/368231/push-security","@type":"ListItem"},{"name":"Aware","position":13,"description":"The Aware platform enables organizations to proactively discover, classify, secure, and manage data It solves for governance, risk, compliance and insights from collaboration tools like Slack, Workplace, Teams, and Yammer. Aware secures and protects digital workplaces, enabling visibility into business-critical communications. It mitigates risk associated with sensitive information and enables enhanced compliance monitoring and adherence to Internal policies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/341243f2-dbac-4d43-9acd-c9b896dac531.png","url":"https://www.softwareadvice.co.nz/software/331022/awarehq","@type":"ListItem"},{"name":"CloudWize","position":14,"description":"CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture design to runtime. We are the only cloud security cloud center of excellence. CloudWize provides 360° protection to private customers and MSSPs, and MSPs worldwide.\n\nCloudWize helps CISOs, VP R&Ds, SREs, DevSecOps, and DevOps utilize a unique investigation tool to detect and fix cloud issues in minutes instead of days and weeks. There's no need to write code or learn a new language because of the drag-and-drop interface. CloudWize gives one pane of glass of cloud services. \n\nWe provide over 1000 rules for security, compliance, cost, operations, and performance that are continuously running. Teams can get alerts and insights (recommendations) within minutes of onboarding.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5385aae5-ca36-4d48-86e5-aa3e17e6a56b.jpeg","url":"https://www.softwareadvice.co.nz/software/356022/cloudwize","@type":"ListItem"},{"name":"SecureAuth Workforce IAM","position":15,"description":"SecureAuth is a cloud-based software that helps businesses manage and verify user identities through various authentication tools, such as MFA, password-less authentication and more. Professionals can use the dashboard to monitor and gain an overview of total successful or failed login attempts via actionable analytics.\n\nSecureAuth allows organizations to configure users’ access permissions and customize authentication workflows to streamline verification processes. Managers can secure confidential information through Lightweight Directory Access Protocol (LDAP) and single sign-on (SSO) capabilities. Additionally, users can analyze behavioral signals to identify user location, cell phone network and more.\n\nSecureAuth enables businesses to detect anomalous activities and automatically generate risk scores using machine learning capabilities. Pricing is available on monthly subscriptions and support is extended via live chat, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39af965a-881d-459f-95dc-a8191f73fdb8.png","url":"https://www.softwareadvice.co.nz/software/168652/secureauth-idp","@type":"ListItem"},{"name":"Uniqkey","position":16,"description":"Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.\n\nRecognized as the easiest tool to use, Uniqkey removes friction from employees’ daily workflows by automating time-consuming authentication and security tasks, thereby increasing productivity. Its intuitive and user-friendly interface makes Uniqkey the perfect choice for employees.\n\nUniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence.\n\nWith powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption.\n\nEngineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data.\n\nOur modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind.\n\nTrusted by 500+ European businesses and ranked as a Top 50 Global Security Solution by G2, our platform is becoming Europe's preferred business password and access management solution.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fc919295-4126-4dc5-8e49-4cb66150e7f9.png","url":"https://www.softwareadvice.co.nz/software/425970/uniqkey","@type":"ListItem"},{"name":"Quadrant XDR","position":17,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWith intelligent action and rapid response, XDR's proprietary technology is operated by seasoned security analysts around the clock and combines the best security technology and talent in a single XDR solution. Combining a roster of expert analysts and a powerful stack of security solutions into one complete ecosystem the platform allows for users to monitor and protect our networks, eliminating time wasted through escalation, and providing a full suite of security solutions, no matter the vertical or size and much.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.softwareadvice.co.nz/software/417889/sagan","@type":"ListItem"},{"name":"NirvaShare","position":18,"description":"NirvaShare is an enterprise file sharing solution. It caters to mid-size and large organizations across various industries. \n\nNirvaShare offers key capabilities like single sign-on, multi-factor authentication, integration with identity providers, and the ability to share large files up to tens of gigabytes. It provides compliance and auditing of user actions through detailed reporting and monitoring. Organizations can also apply their own branding by adding a company logo and custom domain.\n\nFor deployment, NirvaShare can be installed on-premises or hosted in the cloud. It is supported 24/7 by a global team of experts that provides guidance on best practices for setup, configuration, and usage.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e874066a-1d21-4d16-88bd-979294812f40.webp","url":"https://www.softwareadvice.co.nz/software/351955/nirvashare","@type":"ListItem"},{"name":"Alyne","position":19,"description":"The Alyne platform for governance, risk and compliance (GRC) provides intuitive, AI-enabled capabilities to dynamic enterprises across the globe. Mitratech’s GRC platform enables organizations of all sizes to transform their GRC processes, by enabling actionable insights through structured controls and risk information – all mapped to relevant laws, regulations, industry standards. Risk mitigation and the ability to be compliant with rapidly evolving regulations used to take weeks, months or often years. With Alyne's AI-powered platform, companies can execute audits, new regulatory compliance, data privacy and cyber security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5b64de7f-d551-491f-93ec-8b9db1daca53.png","url":"https://www.softwareadvice.co.nz/software/363034/alyne","@type":"ListItem"},{"name":"AppOmni","position":20,"description":"AppOmni helps businesses to secure data across SaaS applications. It offers data access visibility, centralized management, and security controls that integrate seamlessly into any SaaS environment to help secure sensitive data. \n\nThe AppOmni platform protects standard SaaS applications as well as custom applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/19f444da-22cc-48ff-98d8-99281c11bba2.png","url":"https://www.softwareadvice.co.nz/software/243930/appomni","@type":"ListItem"},{"name":"CloudConnexa","position":21,"description":"CloudConnexa eliminates the common complexity associated with scaling and managing network hardware, offering flexible and isolated private cloud networks under a singular owner account for streamlined management. Notably, CloudConnexa supports various use cases such as secure site-to-site networking, IoT communications, and safe remote workforce access. With this model, the service empowers businesses to maintain secure internet access points, leverage domain-based routing, and apply cybersecurity measures, all while avoiding the pitfalls of traditional VPN server installation and management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b7401dd2-15d4-415c-b3bc-95e583892263.jpeg","url":"https://www.softwareadvice.co.nz/software/506382/Cloud-Connexa","@type":"ListItem"},{"name":"Harmony Email & Collaboration","position":22,"description":"Harmony Email & Collaboration (formerly Harmony Email & Office) is a cloud-based software designed to help businesses using Microsoft 365 and G Suite prevent potential malware attacks through emails. Professionals can configure access permissions, define custom policies and prevent credential theft via agentless multi-factor authentication. \n\nHarmony Email & Collaboration provides a dashboard, which allows organizations to monitor identified threats via actionable analytics and generate administrative reports.  Managers can automatically block unauthorized logins and ensure compliance with the data leak prevention (DLP) policy. Additionally, it lets users identify and limit the exchange of sensitive information via emails and other productivity applications. \n\nHarmony Email & Collaboration scans all inbound and outbound emails to determine suspicious attachments, links and metadata. Pricing is available on request and support is extended via documentation, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f66e0bc2-ad23-43ac-b88e-d83d351c84ea.png","url":"https://www.softwareadvice.co.nz/software/222685/harmony-email-and-office","@type":"ListItem"},{"name":"Lightspin","position":23,"description":"Lightspin offers an application programming interface (API) for integrations. It also provides behavioral analytics, data visualization, incident management, vulnerability scanning protection, antivirus, security auditing, and visual analytics. Lightspin software is a cloud security posture management (CSPM) system that enables organizations to visualize their current security position and eliminate potential risks. The system portrays cloud assets and relationships from the perspective of the attacker. \n\nThe attack path-based cloud security platform displays critical security problems from the attacker's point of view in order of importance. It also utilizes Infrastructure as Code (IaC) to deliver simple mitigation remedies. Lightspin can integrate with existing security systems and DevOps workflows, helping streamline data visualization and assessment. It enables users to detect hidden attack vectors or unknown risks and visualize cloud computing stacks from the infrastructure to a single micro-service level.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae22aae1-ed1f-47f4-9ad4-4f88c12c1d5a.png","url":"https://www.softwareadvice.co.nz/software/242111/lightspin","@type":"ListItem"},{"name":"Apiiro","position":24,"description":"Apiiro invented a code risk platform to remediate critical risks from cloud to code and secure all cloud-native application components in a single platform. Once connected to a source control manager, Apiiro will identify all application components such as APIs, IaC components, security controls and sensitive data and the attack surface. It will then perform continuous risk assessments and detect critical risks using context-based risk graph. With automatic prioritization and remediation, Apiiro enables organizations to shift left to Devs/DevOps with context at commit and CI/CD.\n\nWith Apiiro CISOs can break down barriers between security and developers in order to reduce critical risks faster. It allows CIOs to release secure code faster with risk-based context and automation. AppSec leaders can get the visibility and context they need to prioritize noisy alerts and make smarter, risk-based decisions effectively and contextually. The platform enables developers to get the context required to remediate critical risks and stay focused on delivering customer value.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d1b5a5a-c21c-4234-b7e5-7fa790f52638.png","url":"https://www.softwareadvice.co.nz/software/340167/apiiro","@type":"ListItem"},{"name":"VMware NSX","position":25,"description":"VMware NSX enables the secure, elastic and multitenant cloud with full-stack network and security virtualization. It helps connect and protect application workloads across data centers, multi-cloud and container infrastructure by delivering operational simplicity with service agility.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a3eafde6-ecee-45bb-af9e-083604f40971.png","url":"https://www.softwareadvice.co.nz/software/254709/vmware-nsx","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.nz/directory/4329/cloud-security/software?page=6#itemlist","numberOfItems":25}
</script>
