Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (2)
Starting Price
  • (2)
  • (6)
Deployment
  • (4)
  • (2)
  • (28)
  • (1)
  • (1)
Customer Types
  • (2)
  • (3)
  • (26)
  • (28)
  • (26)
Pricing Model
  • (12)
  • (4)
  • (2)
  • (2)
  • (7)
  • (24)
Integrated With
  • (3)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 1 - 20 of 28 Products

Top 5 Aaronis Cyberprotect Cloud Alternatives

78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Ada logo

Ada

Best to withstand virus attacks and security issues 4.1 Based on 1321 Ratings
Visit Website + Add to Compare

What is Ada and how does it work?

Acronis Backup and Recovery is a flexible application that provides multiple methods for storing and recovering data. This software is used to make data backups from files, folders and drives. By using this software, individual files, as well as the whole drive, can be backed up at any location. It is capable of performing all three kinds of backups, namely incremental, differential and full backup. It provides a storage space called Acronis Cloud storage where backed up files can be stored. In addition to this, multiple features such as encrypted storage, bare-metal recovery are also available. It is very well designed to overcome virus attacks and network security breaches.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 60%
  • Reviews 94%
  • Momentum 62%
  • Popularity 85%

Ada Pricing

  • Free Trial Available
  • Starts at $59.0.

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Acronis True Image logo
True cyber protection 4.2 Based on 25 Ratings
Visit Website + Add to Compare

What is Acronis True Image and how does it work?

Acronis True Image is an online-based Backup Software. Make a replica of a Windows or Mac system while it’s in use, without having to stop and reboot. The easiest way to migrate all of your data OS, files, applications, and settings to a larger or faster disk. Keep working, playing, or surfing with continuous backups that capture changes as often as every five minutes. Easily restore your system to the same or new hardware with bootable media and driver injection technology. Your data is quickly loaded on the machine of your choice.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 93%
  • Reviews 86%
  • Momentum 64%
  • Popularity 68%

Acronis True Image Pricing

  • Free Trial Available
  • Starts at $49.99.
Symantec Data Center Security logo
Complete server protection, monitoring, and workload micro-segmentation 4.5 Based on 12 Ratings
Visit Website + Add to Compare

What is Symantec Data Center Security and how does it work?

Symantec Data Center Security is an online-based Data Center Security Software. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. ICDx simplifies product integrations and accelerates customer time to value across the Symantec enterprise portfolio and the industry’s largest partner ecosystem. Prepare higher quality cyber data to forward to SIEM and other SOC tools enhancing analytics and alert speed responses to critical incidents with orchestrated actions targeting multiple Symantec products.

Read more

Symantec Data Center Security Pricing

  • Free Trial Not Available
  • Symantec Data Center Security Offers Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

NovaBACKUP Cloud logo
Protect business critical data with utmost security and safety Write a Review
Visit Website + Add to Compare

What is NovaBACKUP Cloud and how does it work?

NovaBACKUP Cloud is a centrally monitored cloud backup solution for small businesses, enabling them to save essential business data on the cloud and locally, in an accurate manner. Organizations can utilize the software to safeguard their data on-premises and in remote locations as well. They get to protect themselves against financial losses and downtime generated by natural disasters, ransomware and hardware failures. Additionally, NovaBACKUP Cloud, can restore critical data within minutes by generating a copy of the data to any Hyper-V environment, irrespective of the location. It is also compliant with data protection regulations like FERPA and HIPAA besides featuring a centralized web management console. More than 210 countries and territories are using NovaBACKUP Cloud. Its speedy disaster recovery options, 256-bit AES encryption and integrated support for virtual machines, SQL and Microsoft Exchange, make the overall data protection mechanism easier for the companies.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 91%
  • Reviews 61%
  • Momentum 61%
  • Popularity 73%

NovaBACKUP Cloud Pricing

  • Free Trial Available
  • Starts at $4.16.
Dell Data Protection logo
A Cloud Data Protection Tool 4.1 Based on 22 Ratings
Visit Website + Add to Compare

What is Dell Data Protection and how does it work?

Dell Data Protection software is a Protection tool for your Cloud Organizational Data. The software offers automated data protection for VMware hybrid cloud environments and Tanzu modern applications from cyber-attacks. It has built-in backup appliances with cost-effective data management and protection solutions to meet the requirements for business. IT infrastructures, Medium and Large companies make use of the software.

Read more

Dell Data Protection Pricing

  • Free Trial Not Available
  • Dell Data Protection Offers Custom plan.

Products Similar to Aaronis Cyberprotect Cloud

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Druva Cloud Platform logo
Protect your data from malware with Druva Cloud Write a Review
Visit Website + Add to Compare

What is Druva Cloud Platform and how does it work?

Druva Cloud Platform is a SaaS data protection service to manage enterprise data across cloud, data centre and endpoint workloads. The software is infinitely scalable and can be configured as required to meet the requisite business needs. Thus, new inclusions can be made in the solution without making any notable changes in the backup system. It also does not raise the need for installing new applications for any purpose. Moreover, the highly integrated cloud platform updates itself regularly to incorporate every essential feature available in the market of data protection. Druva Cloud Platform is aimed at improved customer experiences and thus, clients have the benefit of a simple yet highly intuitive interface that is deployed in a minimum of fifteen minutes. Intelligence is also one of the platform’s notable features as it stores data in a way that prevents duplication and encourages automatic long-time retention. With policy-based management to administer operations, clients can stay in control of their data. Federated search and advanced security measures, together ensure restricted access to every bit of the data in concern.

Read more

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features 96%
  • Reviews 60%
  • Momentum 64%
  • Popularity 91%

Druva Cloud Platform Pricing

  • Free Trial Available
  • Druva Cloud Platform Offers Custom plan.
CyberAlpha logo
The Complete Website Security Platform Write a Review
Visit Website + Add to Compare

What is CyberAlpha and how does it work?

Combining a cloud web application firewall, malware scanning and uptime, blacklist and configuration monitoring, CyberAlpha protects your website and customer data from cyber attack. Protect your website from DDoS attacks with managed Web Application Firewall. Instantly block potential intruders from gaining access to sensitive company and customer data. In the case of an attack, the software immediately alerts you and issues a report around what happened. The platform continuously monitors your website for unusual or suspect behavior and blocks malware from being installed on your website.

Read more

CyberAlpha Pricing

  • Free Trial Available
  • Starts at $5.0.
Datto SaaS Defense logo
Advanced Threat Protection for Microsoft 365 Write a Review
Visit Website + Add to Compare

What is Datto SaaS Defense and how does it work?

Datto SaaS Defense is the perfect solution for MSPs to protect their clients from the latest malware, business email compromise (BEC), and phishing attacks targeting Microsoft Exchange, OneDrive, SharePoint, and Teams. Armed with the latest AI-driven threat detection capabilities, Datto SaaS Defense can detect zero-day threats as soon as they appear, so clients don’t have to suffer the consequences of waiting days or even weeks to discover an attack. The security solution is designed to be data-independent, so it can easily be integrated into existing Microsoft 365 environments and keep data safe without disrupting the user experience. Its advanced proactive protection capabilities are tailored to detect and prevent ransomware, malware, phishing attempts and BEC attacks, while also providing reliable security for OneDrive, SharePoint, and Teams data.

Read more

Datto SaaS Defense Pricing

  • Free Trial Not Available
  • Datto SaaS Defense Offers Custom plan.
VMware AppDefense logo
Workload Protection Software 4.5 Based on 2 Ratings
Visit Website + Add to Compare

What is VMware AppDefense and how does it work?

VMware AppDefense is a new approach to workload protection that models intended application behavior and identifies anomalous activity. Enable application control and allow listing and patch risky software sooner by continuously scanning workloads to highlight vulnerabilities in the OS, hypervisor, or application software. Ensure OS integrity, and provide reputation scores for every process. Provide additional workload context to NSX to assist in the definition of micro-segments, and enable faster and more granular responses to risky workload behavior, by pushing into NSX policies for actions such as quarantining, activity logging, etc.

Read more

VMware AppDefense Pricing

  • Free Trial Not Available
  • VMware AppDefense Offers Custom plan.
Cisco ACI logo
Facilitates application agility and data center automation 4.5 Based on 20 Ratings
Visit Website + Add to Compare

What is Cisco ACI and how does it work?

Cisco ACI is an online-based Data Center Security Software. The Cisco ACI application-driven policy framework automates provisioning and managing of resources, thereby delivering a network that is deployed, monitored, and managed in a fashion that supports DevOps and rapid application change. Take a holistic, systems-based approach to data center security with Cisco Application Centric Infrastructure Security Solutions. These solutions provide a common policy-based operational model across ACI-ready networks. As a result, you can reduce cost and complexity without compromising data center functionality.

Read more

Cisco ACI Pricing

  • Free Trial Available
  • Cisco ACI Offers Custom plan.
ServerProtect for Linux logo
Stops malware from spreading through Linux Servers 3 Based on 1 Ratings
Visit Website + Add to Compare

What is ServerProtect for Linux and how does it work?

Trend Micro ServerProtect™ for Linux 3.0 offers comprehensive real-time protection for enterprise web servers and file servers, preventing them from spreading viruses, spyware, and other Web threats to internal or external endpoints. Real-time, on-demand and scheduled scanning use the latest multi-threaded scanning engine for the highest performance while kernel-level scanning minimizes performance degradation. Enables central management of attack information, policy deployment, pattern file and scan engine deployment, and reports on policy implementation.

Read more

ServerProtect for Linux Pricing

  • Free Trial Available
  • ServerProtect for Linux Offers Custom plan.
HashiCorp Vault logo
Store and Secure Your Valuable Data in A Vault 4.6 Based on 119 Ratings
Visit Website + Add to Compare

What is HashiCorp Vault and how does it work?

HashiCorp Vault securely controls, protects, and secures access to passwords, certificates, tokens, encryption keys for secrets and other user-sensitive data using a UI, CLI or HTTP API. It uses a dynamic infrastructure, which has multiple clouds and private data centers without a clear network perimeter. Vault is API driven, it enables automation and CI/CD use cases while allowing the policy to protect, codify, and govern access to secrets. Value-added features of this infrastructure are low trust networks in public clouds, unknown network perimeter across clouds, and security enforced by identity. It tightly controls access to encryption keys and secrets by authenticating against trusted sources of identity such as Active Directory, CloudFoundry, LDAP, Kubernetes, and cloud platforms. Users can leverage any trusted identity provider such as cloud IAM platforms, Active Directory, Kubernetes or authenticate Vault. HashiCorp Vault enables fine-grained authorization to secrets and encryption keys that users and applications are permitted access to keys and secrets.

Read more

HashiCorp Vault Pricing

  • Free Trial Not Available
  • Starts at $0.03. Offers Custom plan.
FireEye Data Center Security logo
Protecting the data center from cyber attacks Write a Review
Visit Website + Add to Compare

What is FireEye Data Center Security and how does it work?

FireEye cybersecurity products and solutions enable organizations to prevent, detect and respond to advanced malware and other cyber attacks targeting the data center that routinely bypass conventional signature-reliant defenses. Shield data centers from advanced persistent threats (APTs) and sophisticated malware found in content stores, web and application servers, and common file shares. Protect your key assets and prevent attacks with products and services that work together and share threat intelligence.

Read more

FireEye Data Center Security Pricing

  • Free Trial Not Available
  • FireEye Data Center Security Offers Custom plan.
ManageEngine OpManager Plus logo
IT Operations Management Write a Review
Visit Website + Add to Compare

What is ManageEngine OpManager Plus and how does it work?

OpManager Plus is a powerful, integrated solution that streamlines the process of IT operations management, eliminating the need for multiple monitoring tools. This holistic tool provides greater visibility across your IT infrastructure, helping you to remove operational bottlenecks, optimize performance and gain the maximum output from your IT infrastructure. With advanced IT operations monitoring and management capabilities, OpManager Plus offers four layers of visibility into an organization's IT operations - IT infrastructure security, IT infrastructure application performance, server and storage IT operations, and network performance. This multi-level visibility into IT operations helps IT admins identify and troubleshoot faults at various levels easily, thereby ensuring greater SLA compliance, proactive IT fault management, greater customer service and consistent IT infrastructure performance.

Read more
Hitachi Content Intelligence logo
Intelligent data discovery and transformation Write a Review
Visit Website + Add to Compare

What is Hitachi Content Intelligence and how does it work?

Hitachi Content Intelligence maximizes data value to deliver the information you need to make the smartest business decisions. Mitigate your industry’s data growth and sprawl and easily find the data you need. Enrich your data to deliver the most relevant information that your business needs to stay informed. Aggregate data from any sources, surface new insights and boost productivity with robust searches.

Read more

Hitachi Content Intelligence Pricing

  • Free Trial Not Available
  • Hitachi Content Intelligence Offers Custom plan.
VoltShare logo
Secure Data Sharing Write a Review
Visit Website + Add to Compare

What is VoltShare and how does it work?

VoltShare helps you securely share your critical data while ensuring compliance. Send and store confidential information with end-to-end encryption that eliminates the age-old problem of shared secrets and public-key mgmt. Maximize the privacy of your information. Then confidently share information with an individual or group of people. Share your confidential information like you do today Slack, email, Dropbox, SharePoint, etc. Simplify compliance through automated logs and auditability for all shared data including successful and failed decryption attempts.

Read more

VoltShare Pricing

  • Free Trial Not Available
  • VoltShare Offers Free-forever and Custom plan.
GitGuardian logo
A Monitoring Platform Built To Uncover Sensitive Company Information And Address Data Leak Issues Write a Review
Visit Website + Add to Compare

What is GitGuardian and how does it work?

GitGuardian is a private solution built to monitor and detect credential data leaks. It monitors official repositories listed under the GitHub organization and also the developer’s personal or public repositories. The platform covers 200+ API providers, private keys, database connection strings, certificates, usernames, and passwords. It comes with sophisticated pattern matching techniques that help to detect credentials that cannot be strictly defined with distinctive patterns. Developers are alerted alongside security teams and the meantime to detect is just a few seconds. It’s integrated with SIEM, ticketing systems, chats, and ITSM. It collaborates with developers and collects developer feedback directly in the dashboard to better investigate and prioritize issues. Users can monitor their internal repositories either public or private. The internal repositories monitoring feature includes integrations with GitHub and GitLab natively. Users can use the platform’s API to integrate into git hooks or in the CI as well. It comes with the ability to define custom detectors to identify specific internal tokens or hostnames.

Read more

GitGuardian Pricing

  • Free Trial Available
  • GitGuardian Offers Custom plan.
CipherCloud logo
Turn your business relevant data into undecipherable cyphers to protect them 4.7 Based on 3 Ratings
Visit Website + Add to Compare

What is CipherCloud and how does it work?

CipherCloud is endpoint-to-cloud security software that simply helps in protecting digital data with the best stringent layers. CipherCloud provides a secure access service edge (SASE), transforming legacy parameter security into an array of cloud-delivered security capabilities that can be accessed whenever necessary. It works efficiently thanks to the SD-WAN core network component that is also referred to as the software-defined wide area network. Further, CipherCloud and its cloud security components support multiple integrations that eliminate the mundanity of working from a specifically designated location. The lookout security service edge of the same addresses identity and credentials protection, detects and mitigates threats, connects and secures the modern workforce with protected layering and ultimately safeguards web and cloud usage. It further eliminates the foggy possibilities of risks by providing a clear view of what is happening on both managed and neglected endpoints within the cloud and everywhere in between. The SSE analyses behavioural changes to identify file threats and unsolicited cyberattacks. The risk endpoints are also monitored continuously and the user access is modified within regular intervals to enhance data protection.

Read more

CipherCloud Pricing

  • Free Trial Available
  • CipherCloud Offers Custom plan.
AppViewX ADC+ logo
Simplify Multi-Cloud Application Delivery 4.7 Based on 3 Ratings
Visit Website + Add to Compare

What is AppViewX ADC+ and how does it work?

AppViewX ADC+ provides GUI-based, API-driven, out-of-the-box solutions that simplify and speed up ADC lifecycle automation. Enable users to create custom automation workflows using a simple, drag and drop interface and task library. Allow app teams to provision and automate ADC services, enable/disable objects for blue-green deployments, etc. with a single click from RBAC-powered dashboards and persona-based service catalogs. Automate ADC lifecycle end-to-end with AppViewX’s native workflow automation, or bring your own automation.

Read more

AppViewX ADC+ Pricing

  • Free Trial Available
  • AppViewX ADC+ Offers Custom plan.
AppOmni logo
Time to Secure Your SaaS Data Write a Review
Visit Website + Add to Compare

What is AppOmni and how does it work?

Organizations today rely heavily on SaaS applications and the data they contain. The security of this data is paramount, and AppOmni provides the necessary processes and tools to ensure it remains secure and compliant. We offer security expertise and insights, as well as continuous monitoring, for a broad range of SaaS applications. Our Developer Platform also allows us to extend our in-depth coverage to any SaaS app, whether it's from a vendor or custom-built in-house. With AppOmni, organizations can rest assured that their SaaS environment is secure and compliant at all times.

Read more

AppOmni Pricing

  • Free Trial Not Available
  • AppOmni Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed