# Best Cloud Security Monitoring and Analytics Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud security monitoring and analytics solutions are tools used to improve visibility and security monitoring across networks and cloud-based applications. The software can be used to monitor cloud-based applications, virtualized environments, and/or other cloud infrastructure. Furthermore, cloud security and analytics tools are used to identify potential risks and root them out to avoid impacting business-critical functions and prevent compliance violations and fines.

Cloud monitoring and analytics are typically performed by IT and security staff on a continual basis. Monitoring features help companies build an inventory of cloud assets and discover new ones as they are created or connected. Analytics features typically assist with examining risks associated with cloud environments, helping companies prioritize issues in order of impact. Other common features include user monitoring, sensitive data discovery, and security policy enforcement.

There is some overlap between cloud security monitoring and analytics software and [user and entity behavioral analysis (UEBA) software](https://www.g2.com/categories/user-and-entity-behavior-analytics-ueba). Both tools are designed to discover abnormalities and monitor user behavior, but UEBA solutions may be used either within the cloud or on premises and provide fewer overall security analysis features.

To qualify for inclusion in the Cloud Security Monitoring and Analytics category, a product must:

- Monitor files and data for activity and compliance
- Report on user activity and cloud security risks
- Detect abnormal behavior and/or anomalies to alert security teams





## Best Cloud Security Monitoring and Analytics Software At A Glance

- **Leader:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Highest Performer:** [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
- **Easiest to Use:** [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
- **Top Trending:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Best Free Software:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)


---

**Sponsored**

### Upwind

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.



[Visit company website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2252&amp;secure%5Bdisplayable_resource_id%5D=1004760&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=neighbor_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1456&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2647&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1333227&amp;secure%5Bresource_id%5D=2252&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-security-monitoring-and-analytics&amp;secure%5Btoken%5D=9a1b6f1f411d9f7173f141d95b3d2063bfc227f0b622f9cccb6c01a48aaca99e&amp;secure%5Burl%5D=https%3A%2F%2Fwww.upwind.io&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
  Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) consolidates CSPM, KSPM, CWPP, Vulnerability management, IaC scanning, CIEM, DSPM into a single platform. Wiz drives visibility, risk prioritization, and business agility. Protecting Your Cloud Environments Requires a Unified, Cloud Native Platform. Wiz connects to every cloud environment, scans every layer, and covers every aspect of your cloud security - including elements that normally require installing agents. Its comprehensive approach has all of these cloud security solutions built in. Hundreds of organizations worldwide, including 50 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman &amp; Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 772

**User Satisfaction Scores:**

- **Security Integration:** 8.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.0/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Wiz](https://www.g2.com/sellers/wiz-76a0133b-42e5-454e-b5da-860e503471db)
- **Company Website:** https://www.wiz.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @wiz_io (22,413 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wizsecurity/ (3,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CISO, Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Security (107 reviews)
- Ease of Use (104 reviews)
- Visibility (87 reviews)
- Easy Setup (68 reviews)

**Cons:**

- Improvement Needed (35 reviews)
- Feature Limitations (34 reviews)
- Learning Curve (34 reviews)
- Improvements Needed (29 reviews)
- Complexity (27 reviews)

  ### 2. [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews)
  Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 277

**User Satisfaction Scores:**

- **Security Integration:** 8.1/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,090,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Saas Consultant, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Security (121 reviews)
- Comprehensive Security (92 reviews)
- Cloud Security (71 reviews)
- Vulnerability Detection (63 reviews)
- Threat Detection (57 reviews)

**Cons:**

- Complexity (27 reviews)
- Expensive (24 reviews)
- Delayed Detection (22 reviews)
- False Positives (19 reviews)
- Improvement Needed (19 reviews)

  ### 3. [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews)
  Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig uniquely delivers runtime-powered visibility and agentic AI to stop cloud attacks instantly, not after the damage is done. With Sysdig, you can: - Stop threats in 2 seconds and respond in minutes - Cut vulnerability noise by 95% with runtime prioritization - Detect real risk instantly across workloads, identities, and misconfigurations - Close permissions gaps in under 2 minutes Sysdig Secure consolidates CSPM, CWPP, CIEM, vulnerability management, and threat detection into a single open, real-time platform. Unlike other CNAPPs, Sysdig connects signals across runtime, identity, and posture to eliminate blind spots, reduce tool sprawl, and accelerate innovation without compromise. No guesswork. No black boxes. Just cloud security, the right way. Learn more at https://sysdig.com


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 110

**User Satisfaction Scores:**

- **Security Integration:** 9.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.4/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.2/10)
- **Security Automation:** 9.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sysdig](https://www.g2.com/sellers/sysdig-715eaed9-9743-4f27-bd2b-d3730923ac3e)
- **Company Website:** https://www.sysdig.com
- **Year Founded:** 2013
- **HQ Location:** San Francisco, California
- **Twitter:** @Sysdig (10,260 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3592486/ (640 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 46% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Security (33 reviews)
- Vulnerability Detection (32 reviews)
- Threat Detection (31 reviews)
- Detection Efficiency (30 reviews)
- Features (23 reviews)

**Cons:**

- Feature Limitations (10 reviews)
- Complexity (9 reviews)
- Missing Features (8 reviews)
- Difficult Learning (7 reviews)
- Feature Complexity (7 reviews)

  ### 4. [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews)
  Crowdstrike Falcon Cloud Security is the only CNAPP to stop breaches in the cloud Built for today’s hybrid and multi-cloud environments, Falcon Cloud Security protects the entire cloud attack surface - from code to runtime - by combining continuous agentless visibility with real-time detection and response. At runtime, Falcon Cloud Security delivers best-in-class cloud workload protection and real-time cloud detection and response (CDR) to stop active threats across hybrid environments. Integrated with the CrowdStrike Falcon platform, it correlates signals across endpoint, identity, and cloud to detect sophisticated cross-domain attacks that point solutions miss—enabling teams to respond faster and stop breaches in progress. To reduce risk before attacks occur, Falcon Cloud Security also delivers agentless-driven posture management that proactively shrinks the cloud attack surface. Unlike typical solutions, Crowdstrike enriches cloud risk detections with adversary intelligence and graph-based context, enabling security teams to prioritize exploitable exposures and prevent breaches before they happen. Customers using Falcon Cloud Security consistently see measurable results: 89% faster cloud detection and response 100x reduction in false positives by prioritizing exploitable, business-critical risk 83% reduction in cloud security licenses due to elimination of redundant tools


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.2/10)
- **Security Automation:** 8.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,002 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Security (49 reviews)
- Cloud Security (37 reviews)
- Detection Efficiency (34 reviews)
- Vulnerability Detection (31 reviews)
- Ease of Use (29 reviews)

**Cons:**

- Expensive (17 reviews)
- Improvements Needed (14 reviews)
- Improvement Needed (13 reviews)
- Feature Complexity (8 reviews)
- Learning Curve (8 reviews)

  ### 5. [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
  Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead with elegant simplicity. Coro is fast to deploy, easy to use, and designed not to waste your time. Once you install Coro, you’ll hardly think about us. That’s the point. Coro automatically detects and fixes security problems, so IT teams don’t have to spend time investigating or troubleshooting. We’re also one of the fastest-growing tech companies in North America, just ask Deloitte. Designed primarily for lean IT teams, Coro’s platform is particularly beneficial for organizations that may lack extensive IT resources or dedicated cybersecurity teams. With the increasing complexity of cyber threats, these businesses often find it challenging to maintain adequate security measures. Coro addresses this gap by automating the detection and remediation of security threats, allowing businesses to focus on their core operations without the constant worry of potential breaches or security incidents. One of Coro&#39;s key benefits is its intuitive, user-friendly interface, which simplifies the management of cybersecurity protocols. This ease of use is particularly advantageous for organizations with limited IT expertise, as it minimizes the need for extensive training or technical knowledge. Additionally, Coro’s continuous monitoring and reporting features provide businesses with valuable insights into their security posture, enabling them to make informed decisions about their cybersecurity strategies. Another impressive features is how comprehensive, yet powerful, it&#39;s all-in-one platform is. Using advanced AI technology, it detects and remediates over 92% of threats automatically, ensuring potential vulnerabilities are identified and addressed in real-time, significantly reducing the risk of data breaches and other cyber incidents. Their impressive performance has been recognised by G2 with a 94% approval rating from users and SE Labs, who awarded them three AAA ratings for their EDR, Email and Cloud modules. Overall, Coro’s cybersecurity platform represents a significant advancement in the field of cybersecurity. By automating threat detection and remediation, offering customizable solutions, and providing a user-friendly experience, Coro empowers organizations to effectively defend against the evolving landscape of cyber threats. Its recognition as one of the fastest-growing cybersecurity companies in North America further underscores its commitment to delivering innovative and effective security solutions.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 231

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.1/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.2/10)
- **Security Automation:** 8.9/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Coronet](https://www.g2.com/sellers/coronet)
- **Company Website:** https://www.coro.net
- **Year Founded:** 2014
- **HQ Location:** Chicago, IL
- **Twitter:** @coro_cyber (1,839 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/coronet (295 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Non-Profit Organization Management, Financial Services
  - **Company Size:** 57% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Security (68 reviews)
- Customer Support (67 reviews)
- Protection (55 reviews)
- Easy Setup (49 reviews)

**Cons:**

- Performance Issues (32 reviews)
- Improvements Needed (20 reviews)
- False Positives (19 reviews)
- Inaccuracy (19 reviews)
- Limited Features (16 reviews)

  ### 6. [CrowdStrike Falcon Shield](https://www.g2.com/products/crowdstrike-falcon-shield/reviews)
  CrowdStrike Falcon Shield enables security teams to secure their entire SaaS stack with its prevention, detection, and response platform. Falcon Shield integrates with over 150 applications out of the box, continuously monitoring for misconfigurations, detecting threats, and triggering response sequences to secure applications. Secure users, prevent GenAI mishaps, detect shadow apps, and monitor devices from one SaaS Security Posture Management Platform. Falcon Shield is part of the CrowdStrike Falcon platform allowing for a complete end-to-end Cloud and Identity protection , while using Falcon WorkFlow for easy one-click remediation.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 32

**User Satisfaction Scores:**

- **Security Integration:** 9.2/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.2/10)
- **Security Automation:** 8.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,002 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)
- **Ownership:** NASDAQ: CRWD

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 53% Enterprise, 47% Mid-Market


#### Pros & Cons

**Pros:**

- Compliance Monitoring (1 reviews)
- Comprehensive Security (1 reviews)
- Ease of Implementation (1 reviews)
- Integrations (1 reviews)


  ### 7. [Amazon GuardDuty](https://www.g2.com/products/amazon-guardduty/reviews)
  Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 53

**User Satisfaction Scores:**

- **Security Integration:** 10.0/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 6.7/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.2/10)
- **Security Automation:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,220,862 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Who Uses This:** Software Developer
  - **Top Industries:** Computer Software, Accounting
  - **Company Size:** 38% Enterprise, 34% Small-Business


  ### 8. [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews)
  InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning technical teams, security teams can remediate vulnerabilities and build Security into the core of the organization. With InsightVM, security teams can: Gain Clarity Into Risk and Across Teams Better understand the risk in your modern environment so you can work in lockstep with technical teams. Extend Security’s Influence Align traditionally siloed teams and drive impact with the shared view and common language of InsightVM. See Shared Progress Take a proactive approach to security with tracking and metrics that create accountability and recognize progress.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Security Integration:** 9.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.2/10)
- **Security Automation:** 9.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (123,965 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,249 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Automation (4 reviews)
- Vulnerability Identification (4 reviews)
- Asset Management (3 reviews)
- Features (3 reviews)
- Prioritization (3 reviews)

**Cons:**

- Complexity (3 reviews)
- Performance Issues (2 reviews)
- Resource Limitations (2 reviews)
- Resource Management (2 reviews)
- Time-Consuming (2 reviews)

  ### 9. [Check Point CloudGuard CNAPP](https://www.g2.com/products/check-point-cloudguard-cnapp/reviews)
  CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter. With CloudGuard&#39;s unified &amp; modular platform , customers receive: Enhanced Cloud Security Posture Management Deep Workload Security Visibility at Scale with No Agents Enforcement of Least Privilege with Cloud Infrastructure Entitlement Management (CIEM) Runtime Protection for Cloud Workloads (CWPP) Context-Based Web Application and API Protection (WAF) Shift CNAPP Left to Secure Applications in the CI/CD Pipeline Context Graph Visualization &amp; Cloud Detection and Response For more information on CloudGuard CNAPP, visit https://www.checkpoint.com/cloudguard/cnapp/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.2/10)
- **Security Automation:** 8.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Security (45 reviews)
- Cloud Security (35 reviews)
- Ease of Use (30 reviews)
- Cloud Integration (29 reviews)
- Comprehensive Security (29 reviews)

**Cons:**

- Improvement Needed (13 reviews)
- Complexity (12 reviews)
- Difficult Setup (10 reviews)
- Integration Issues (10 reviews)
- Poor Customer Support (10 reviews)

  ### 10. [SentinelOne Singularity Cloud Security](https://www.g2.com/products/sentinelone-singularity-cloud-security/reviews)
  Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 112

**User Satisfaction Scores:**

- **Security Integration:** 9.8/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.7/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.2/10)
- **Security Automation:** 9.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Security (27 reviews)
- Ease of Use (20 reviews)
- Vulnerability Detection (19 reviews)
- Cloud Management (16 reviews)
- Cloud Security (15 reviews)

**Cons:**

- Complexity (5 reviews)
- Ineffective Alerts (5 reviews)
- Complex Setup (4 reviews)
- Difficult Configuration (4 reviews)
- Poor UI (4 reviews)

  ### 11. [Coralogix](https://www.g2.com/products/coralogix/reviews)
  Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace and security events, enhancing operational efficiency and reducing total cost of ownership by up to 70%. Coralogix stands out for its simple pricing model, based solely on data volume ingested and retained, and offers free, fast customer support with less than 30 second response time and 1 hour resolution time. Our platform covers the entire range of observability with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all streamlined for quick integration and immediate value. Components within the stream store the system state to provide stateful insights and real-time alerting without ever needing to index the data — so there are never any trade-offs to achieve observability. Once ingested, parsed, and enriched, data is written remotely to an archive bucket controlled by the client. The archive can be queried directly at any time, from the platform UI or via CLI, giving users infinite retention with full control over, and access to, their data. View and query your data from any dashboard using any syntax. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 342

**User Satisfaction Scores:**

- **Security Integration:** 8.8/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Coralogix](https://www.g2.com/sellers/coralogix)
- **Company Website:** https://www.coralogix.com
- **Year Founded:** 2014
- **HQ Location:** San Francisco, CA
- **Twitter:** @Coralogix (4,074 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3763125/ (583 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, DevOps Engineer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 53% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (82 reviews)
- Log Management (70 reviews)
- Customer Support (65 reviews)
- Real-time Monitoring (57 reviews)
- User Interface (57 reviews)

**Cons:**

- Learning Curve (25 reviews)
- Missing Features (25 reviews)
- Difficult Learning (24 reviews)
- Slow Performance (24 reviews)
- Learning Difficulty (22 reviews)

  ### 12. [Sumo Logic](https://www.g2.com/products/sumo-logic/reviews)
  Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec and Ops teams to simplify complexity, collaborate efficiently and accelerate data-driven decisions that drive business value. Customers around the world rely on the Sumo Logic SaaS Log Analytics Platform for trusted insights to ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. For more information, visit: SUMOLOGIC.COM


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 378

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.2/10)
- **Security Automation:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sumo Logic](https://www.g2.com/sellers/sumo-logic)
- **Company Website:** https://www.sumologic.com
- **Year Founded:** 2010
- **HQ Location:** Redwood City, CA
- **Twitter:** @SumoLogic (6,503 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1037816/ (808 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Senior Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 49% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (63 reviews)
- Log Management (45 reviews)
- Real-time Monitoring (36 reviews)
- Features (35 reviews)
- Insights (34 reviews)

**Cons:**

- Difficult Learning (20 reviews)
- Learning Curve (20 reviews)
- Learning Difficulty (20 reviews)
- Expensive (18 reviews)
- Slow Performance (18 reviews)

  ### 13. [Palo Alto Cortex XSIAM](https://www.g2.com/products/palo-alto-cortex-xsiam/reviews)
  Product Description: Palo Alto Networks&#39; Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 404

**User Satisfaction Scores:**

- **Security Integration:** 8.4/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.5/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.2/10)
- **Security Automation:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,510 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Who Uses This:** Cyber Security Analyst, SOC Analyst
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 50% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (50 reviews)
- Threat Detection (37 reviews)
- Integrations (28 reviews)
- Cybersecurity (27 reviews)
- Features (27 reviews)

**Cons:**

- Expensive (28 reviews)
- Difficult Learning (17 reviews)
- Complexity (14 reviews)
- Integration Issues (14 reviews)
- UX Improvement (12 reviews)

  ### 14. [Tenable Cloud Security](https://www.g2.com/products/tenable-tenable-cloud-security/reviews)
  Tenable Cloud Security is an actionable cloud security platform that exposes and closes priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities. Organizations use its intuitive UI to unify siloed tools to secure the full cloud stack, achieving end-to-end visibility, prioritization and remediation across infrastructure, workloads, identities, data and AI services. Users can access the extensive knowledgebase of Tenable Research, reducing the risk of breaches with advanced prioritization that understands resource, identity and risk relationships. Tenable uses this context to pinpoint toxic combinations of risk most likely to be exploited. Take action, even if you only have 5 minutes, with guided remediations and code snippets that significantly reduce MTTR. With one click, report on compliance with industry benchmarks and regulatory requirements, e.g. SOC 2, GDPR &amp; HIPAA. TCS is part of Tenable’s AI-powered exposure management platform, Tenable One.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.3/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.2/10)
- **Security Automation:** 9.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,575 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 57% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Compliance (6 reviews)
- Detailed Analysis (6 reviews)
- Ease of Use (5 reviews)
- Features (5 reviews)
- Integrations (5 reviews)

**Cons:**

- Complex Setup (4 reviews)
- Expensive (4 reviews)
- Feature Limitations (4 reviews)
- Difficult Setup (3 reviews)
- Implementation Difficulty (3 reviews)

  ### 15. [BMC AMI Security](https://www.g2.com/products/bmc-ami-security/reviews)
  BMC AMI Security is a comprehensive mainframe security and compliance solution for IBM Z environments. It helps organizations protect mission-critical systems by strengthening access control, monitoring security activity, and reducing the risk of unauthorized access or compliance violations. BMC AMI Security provides centralized visibility, automated controls, and real-time insights across z/OS and key security components, enabling security teams to detect threats earlier, enforce policy consistently, and respond more effectively to incidents. The solution supports regulatory compliance while minimizing operational overhead in complex mainframe environments. Key capabilities include: - Security monitoring and auditing for z/OS environments - Access control analysis and policy enforcement - Threat detection and anomaly identification - Compliance reporting and risk visibility - On-premises execution that keeps sensitive security data on the mainframe By modernizing mainframe security operations, BMC AMI Security helps enterprises reduce security risk, improve compliance posture, and maintain control over critical IBM Z systems.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Security Integration:** 8.8/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.2/10)
- **Security Automation:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [BMC Software](https://www.g2.com/sellers/bmc-software)
- **Year Founded:** 1980
- **HQ Location:** Houston, TX
- **Twitter:** @BMCSoftware (48,040 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1597/ (9,008 employees on LinkedIn®)
- **Phone:** 713 918 8800

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 29% Mid-Market


  ### 16. [Panther](https://www.g2.com/products/panther/reviews)
  Panther is the AI SOC Platform that scales security expertise by embedding AI agents across your security operations with native access to your data lake, detection logic, and organizational knowledge. Unlike bolt-on tools, Panther&#39;s closed-loop architecture turns every alert into compounding intelligence that makes the system smarter over time. Request a demo today at: https://panther.com/product/request-a-demo/


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 44

**User Satisfaction Scores:**

- **Security Integration:** 9.4/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.4/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Panther Labs](https://www.g2.com/sellers/panther-labs)
- **Company Website:** https://panther.com/
- **Year Founded:** 2018
- **HQ Location:** San Francisco, CA
- **Twitter:** @runpanther (4,430 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/runpanther/ (286 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 57% Mid-Market, 25% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (12 reviews)
- Detection Efficiency (9 reviews)
- Ease of Use (9 reviews)
- Features (9 reviews)
- Easy Integrations (7 reviews)

**Cons:**

- Alert Management (3 reviews)
- Complex Configuration (3 reviews)
- Dashboard Issues (3 reviews)
- Limited Access (3 reviews)
- Immaturity (2 reviews)

  ### 17. [Semperis Directory Services Protector](https://www.g2.com/products/semperis-directory-services-protector/reviews)
  Semperis Directory Services Protector puts Active Directory security and identity threat detection and response on autopilot with continuous AD threat monitoring, real-time alerts, and autonomous remediation capabilities. DSP helps you respond more effectively to Active Directory security incidents and everyday operational mistakes. It provides a complete picture of risk exposure in hybrid environments and provides backup and recovery of critical Entra ID resources


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Security Integration:** 6.1/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.7/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.2/10)
- **Security Automation:** 9.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Semperis](https://www.g2.com/sellers/semperis)
- **Company Website:** https://www.semperis.com
- **Year Founded:** 2015
- **HQ Location:** Hoboken, New Jersey
- **Twitter:** @SemperisTech (10,088 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/semperis/ (620 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Security (7 reviews)
- Features (6 reviews)
- Customer Support (5 reviews)
- Automation (4 reviews)

**Cons:**

- Communication Issues (2 reviews)
- Data Inconsistency (2 reviews)
- Lack of Information (2 reviews)
- Limited Reporting (2 reviews)
- Poor Customer Support (2 reviews)

  ### 18. [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews)
  FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire application lifecycle—from development to runtime—it combines posture management, workload protection, identity security, and threat detection into one integrated platform. By leveraging machine learning and behavioral analytics, FortiCNAPP helps security teams detect unknown threats, reduce noise, and accelerate response. Integrated with the Fortinet Security Fabric, it provides full-stack visibility across cloud, network, and endpoint environments—empowering teams to operate with confidence, reduce complexity, and scale securely.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 383

**User Satisfaction Scores:**

- **Security Integration:** 8.4/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.2/10)
- **Security Automation:** 8.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Company Website:** https://www.fortinet.com
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 62% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Security (8 reviews)
- Vulnerability Detection (7 reviews)
- Alert Management (6 reviews)
- Cloud Security (6 reviews)
- Ease of Use (6 reviews)

**Cons:**

- Difficult Setup (5 reviews)
- Poor Documentation (5 reviews)
- Complex Setup (4 reviews)
- Setup Difficulty (4 reviews)
- Complex Configuration (3 reviews)

  ### 19. [Cisco Secure Network Analytics](https://www.g2.com/products/cisco-secure-network-analytics/reviews)
  Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Security Integration:** 8.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.2/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.2/10)
- **Security Automation:** 9.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (720,884 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 52% Enterprise, 33% Small-Business


  ### 20. [Sophos Cloud Optix](https://www.g2.com/products/sophos-cloud-optix/reviews)
  Sophos Cloud Optix is an AI-powered security and compliance platform designed to provide comprehensive visibility and control over public cloud environments. It offers real-time inventory management of cloud assets, including servers, storage, and network components, enabling organizations to monitor security, manage resources, and ensure compliance with industry standards through a unified interface. Key Features and Functionality: - Multi-Cloud Visibility: Supports monitoring across AWS, Azure, Google Cloud, and Kubernetes, offering detailed inventories and visualizations to detect security risks, over-privileged access, and spending anomalies. - Security Monitoring: Conducts scheduled, daily, and on-demand scans to identify vulnerabilities and compliance issues, providing contextual alerts with remediation steps. - Compliance Management: Automates assessments and generates audit-ready reports for standards such as CIS, ISO 27001, GDPR, HIPAA, and PCI DSS, streamlining compliance processes. - DevSecOps Integration: Integrates security checks into the development pipeline, scanning container images and Infrastructure-as-Code templates to prevent vulnerabilities before deployment. - Cost Optimization: Monitors cloud service expenditures, provides recommendations to reduce costs, and identifies indicators of compromise to prevent financial losses. Primary Value and Problem Solved: Sophos Cloud Optix addresses the challenges of managing complex, multi-cloud environments by offering a centralized platform for security monitoring, compliance management, and cost optimization. It reduces the complexity and cost associated with governance, risk, and compliance by providing continuous assessments and collaboration tools that integrate seamlessly into existing processes. By automating security and compliance tasks, it enables organizations to proactively detect and remediate vulnerabilities, ensuring robust protection of cloud assets and adherence to regulatory requirements.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 20

**User Satisfaction Scores:**

- **Security Integration:** 8.3/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.2/10)
- **Security Automation:** 8.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sophos](https://www.g2.com/sellers/sophos)
- **Year Founded:** 1985
- **HQ Location:** Oxfordshire
- **Twitter:** @Sophos (36,719 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5053/ (5,561 employees on LinkedIn®)
- **Ownership:** LSE:SOPH

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Mid-Market, 32% Enterprise


  ### 21. [Qualys Cloud Security Assessment](https://www.g2.com/products/qualys-cloud-security-assessment/reviews)
  Qualys Cloud Security Assessment (CSA) is a comprehensive solution designed to provide organizations with continuous visibility and control over their cloud security posture. By automating the discovery and assessment of cloud assets, CSA helps identify misconfigurations, vulnerabilities, and compliance issues across multi-cloud environments, enabling proactive risk management and remediation. Key Features and Functionality: - Continuous Asset Discovery: CSA automatically discovers and inventories cloud resources, including virtual machines, databases, and storage buckets, across various cloud service providers. - Security Posture Assessment: It evaluates cloud configurations against industry standards and best practices, such as the CIS Benchmarks, to detect misconfigurations and non-standard deployments. - Compliance Monitoring: CSA continuously assesses cloud resources for compliance with regulatory mandates like PCI-DSS, HIPAA, NIST, and ISO 27001, providing detailed reports for audit readiness. - Risk Prioritization: By correlating vulnerabilities, misconfigurations, and threat intelligence, CSA prioritizes risks based on their potential impact, allowing security teams to focus on the most critical issues. - Automated Remediation: The solution offers out-of-the-box, one-click remediation for identified vulnerabilities and misconfigurations, and supports custom workflows through Qualys Flow (QFlow) for tailored remediation processes. Primary Value and Problem Solved: Qualys Cloud Security Assessment addresses the challenge of managing and securing dynamic cloud environments by providing a unified platform for continuous monitoring, assessment, and remediation. It empowers organizations to maintain a strong security posture, ensure compliance with regulatory standards, and reduce the risk of data breaches and other security incidents in their cloud infrastructure.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 18

**User Satisfaction Scores:**

- **Security Integration:** 7.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.2/10)
- **Security Automation:** 7.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Qualys](https://www.g2.com/sellers/qualys)
- **Year Founded:** 1999
- **HQ Location:** Foster City, CA
- **Twitter:** @qualys (34,165 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/8561/ (3,564 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 53% Enterprise, 26% Mid-Market


#### Pros & Cons

**Pros:**

- Asset Tracking (1 reviews)
- Customer Support (1 reviews)
- Deployment Ease (1 reviews)
- Ease of Use (1 reviews)
- Features (1 reviews)

**Cons:**

- Expensive (1 reviews)
- Limited Reporting (1 reviews)
- Poor Interface Design (1 reviews)

  ### 22. [Blumira Automated Detection &amp; Response](https://www.g2.com/products/blumira-automated-detection-response/reviews)
  Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you&#39;ll never have to go it alone. The platform includes: - Managed detections for automated threat hunting to identify attacks early - SOC Auto-Focus, using AI to accelerate security investigations &amp; analysis - Automated response to contain and block threats immediately - One year of data retention and option to extend to satisfy compliance - Advanced reporting and dashboards for forensics and easy investigation - Lightweight agent for endpoint visibility and response - 24/7 Security Operations (SecOps) for incident support


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 122

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.2/10)
- **Security Automation:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Blumira](https://www.g2.com/sellers/blumira)
- **Company Website:** https://www.blumira.com
- **Year Founded:** 2018
- **HQ Location:** Ann Arbor, Michigan
- **Twitter:** @blumira (1 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/blumira/ (67 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (33 reviews)
- Customer Support (20 reviews)
- Setup Ease (20 reviews)
- Alerting (16 reviews)
- Alert Management (16 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Alert System (7 reviews)
- Expensive (6 reviews)
- Faulty Detection (6 reviews)
- Inefficient Alert System (6 reviews)

  ### 23. [Splunk Synthetic Monitoring](https://www.g2.com/products/splunk-synthetic-monitoring/reviews)
  Splunk Synthetic Monitoring helps you measure and improve uptime and performance for your critical apps and services. Splunk Synthetic Monitoring offers best-in class web performance optimization to delight your users and improve customer experience, while helping improve your SLAs and easily test your entire user funnel and key web and API functionality.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Security Integration:** 8.7/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 9.1/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.2/10)
- **Security Automation:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (720,884 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 48% Enterprise, 40% Small-Business


  ### 24. [Aqua Security](https://www.g2.com/products/aqua-security/reviews)
  Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and runtime protection for security teams, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry’s most comprehensive Cloud Native Application Protection Platform (CNAPP). Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 57

**User Satisfaction Scores:**

- **Security Integration:** 8.1/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 6.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.2/10)
- **Security Automation:** 7.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Aqua Security Software Ltd](https://www.g2.com/sellers/aqua-security-software-ltd)
- **Year Founded:** 2015
- **HQ Location:** Burlington, US
- **Twitter:** @AquaSecTeam (7,678 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/aquasecteam/ (499 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Financial Services
  - **Company Size:** 56% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (19 reviews)
- Ease of Use (18 reviews)
- Features (12 reviews)
- Detection (10 reviews)
- Vulnerability Identification (9 reviews)

**Cons:**

- Missing Features (9 reviews)
- Lack of Features (6 reviews)
- Limited Features (6 reviews)
- Difficult Navigation (4 reviews)
- Improvement Needed (4 reviews)

  ### 25. [Sonrai Security](https://www.g2.com/products/sonrai-security/reviews)
  Sonrai Security is a leading cloud privileged access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and privilege security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. Trusted by Cloud Operations, Development, and Security Teams at leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. Sonrai’s Cloud Permissions Firewall, the leading cloud PAM solution, gets cloud access under control, slashes the privileged attack surface, and automates least privilege all without impeding DevOps. The Cloud Permissions Firewall uses privileged permission intelligence and usage monitoring to determine who needs what permissions in your cloud. Then, with one-click, it eliminates all unused sensitive privileges across your entire multi-cloud estate. Just-in-time access and exceptions are granted to roles on the fly as new needs come up so development goes uninterrupted. SecOps teams spend 97% less time achieving least privilege and slash the attack surface by 92%.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Security Integration:** 8.5/10 (Category avg: 8.6/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.2/10)
- **Security Automation:** 8.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sonrai Security](https://www.g2.com/sellers/sonrai-security)
- **Year Founded:** 2017
- **HQ Location:** New York, US
- **LinkedIn® Page:** https://www.linkedin.com/company/sonrai-security (64 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 40% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Cloud Security (12 reviews)
- Security (12 reviews)
- Cloud Management (10 reviews)
- Ease of Use (9 reviews)
- Cloud Technology (8 reviews)

**Cons:**

- Complexity (3 reviews)
- Expensive (3 reviews)
- Feature Limitations (3 reviews)
- Improvement Needed (3 reviews)
- Limited Customization (3 reviews)



## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms)
- [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance)
- [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm)




