Cloud Access Security Broker (CASB) reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Cloud Access Security Broker (CASB) Software

Cloud access security broker (CASB) software is used to provide a layer of protection and policy enforcement for employees accessing cloud-based software. CASB serves as a gateway through which companies can enforce their security requirements beyond on-premise and secure connections between employees and cloud service providers. Companies use CASB software to reduce risks related to cloud applications and network connections while simultaneously monitoring actions and behaviors.

CASB solutions are also used to identify abnormal behaviors from internal actors and then alert administrators of potential shadow IT and noncompliant behaviors. These tools typically monitor and record the actions taken by an individual using the CASB, who can leverage the data collected for behavioral analysis and reporting.

To qualify for inclusion in the Cloud Access Security Broker (CASB) category, a product must:

Secure connections between end users and cloud service providers
Enforce security policies beyond local networks and infrastructure
Protect data and connected devices from cloud-based threats and malware

Top 9 Cloud Access Security Broker (CASB) Software

  • Oracle CASB Cloud
  • Trend Micro Cloud App Security
  • Symantec Web Security.cloud
  • Netskope
  • ManagedMethods
  • CloudSOC Cloud Access Security Broker (CASB)
  • Microsoft Cloud App Security
  • CipherCloud
  • MVISION Cloud

Compare Cloud Access Security Broker (CASB) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Sort By:
Results: 28
View Grid®
Adv. Filters
(12)4.6 out of 5

Oracle CASB Cloud is an API-based cloud access security broker for applications and workloads.

Trend Micro Cloud App Security delivers advanced threat and data protection for Office 365 and cloud file-sharing services.

Symantec Web Security Service (WSS) provides the same proactive web protection capabilities delivered by the market’s leading on-premises Secure Web Gateway, Symantec ProxySG, but delivered as a resilient and performant cloud security service. Sitting between employees, wherever they are located, and the Internet, the service protects the enterprise from cyber threats, controls and protects corporate use of cloud applications and the web, prevents data leaks, and ensures compliance with all comp

(22)4.2 out of 5

Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.

(16)4.8 out of 5

ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers organizations with full visibility and control of data stored in cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, SharePoint, Box, Dropbox, Slack, and more. ManagedMethods makes cloud security easy — no proxy, no agent and no special training needed. It helps IT &

Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. CloudSOC CASB provides visibility, data security and threat protection for today’s generation of cloud users across a wide range of sanctioned and unsanctioned apps.

Microsoft Cloud App Security is an enterprise-grade security for cloud apps.

(11)4.5 out of 5

CipherCloud, a leader in cloud security, provides powerful end-to-end protection for data resident in the cloud. Our award-winning Cloud Access Security Broker (CASB) delivers comprehensive visibility, data security, threat protection, and compliance for cloud-based assets. Uniquely, CipherCloud provides the deepest levels of data protection and real-time data access control to provide an immediate solution for challenging cloud security and compliance problems. The world’s largest global ente

(19)4.4 out of 5

McAfee MVISION Cloud is a cloud access security broker (CASB) that protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It’s cloud-native data security.

(2)2.5 out of 5

Cloud Access Security Broker.

(3)4.0 out of 5

CloudCodes SSO1 is a platform that provides enterprises a simple and unified way to secure web access to all cloud applications.

(2)4.3 out of 5

Prisma SaaS looks directly into SaaS applications, providing full visibility into the activities of users and data while granular controls maintain policy to eliminate data exposure and threat risks.

Symantec CloudSOC CASB Gateway is a software that provide a solution for website security from Extended Validation (EV) SSL/TLS Certificates and malware scanning, to DDoS mitigation and performance optimization.

CloudSOC CASB for IaaS, PaaS, and SaaS

CloudSOC CASB for IaaS, PaaS, and SaaS

Proofpoint Cloud App Security Broker (PCASB) helps you secure applications such as Microsoft Office 365, Googles G Suite, Box, and more.

(11)4.9 out of 5

Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.

0 ratings

40Cloud focuses on developing software solutions that enable secure cloud migration, usage and interworking.

0 ratings

0 ratings

Protegrity Cloud Security Gateway is a cloud security solution that protects data before it gets to the cloud.

Cloud Access Security Broker. Complete Security for All Cloud Applications. Period.

0 ratings

At Forcepoint, we understand the transformation our customers currently face. A cloud-based security reality is a journey. And we’re thoroughly committed to helping our customers make it. Forcepoint Cloud Security Gateway (CSG) is a converged cloud security service that provides proactive visibility, control, and threat protection to safeguard your users and data, wherever they are. Integrated functionality reduces time to value and ensures that maximum capabilities are always available. El

0 ratings

Secure access service edge (SASE) for branch offices, retail locations and mobile users

0 ratings

SecureIdentity CASB provides additional layers of security between your users as they embrace cloud based applications and services. Allowing organisations to understand the associated risks and what controls are required to allow a safe adoption of cloud.

0 ratings

SonicWall Cloud App Security offers next-gen security for your users and data within cloud applications, including email, messaging, file sharing and file storage. For organizations adopting SaaS applications, SonicWall Cloud App Security delivers best-in-class security and a seamless user experience.

0 ratings

StratoKey is a Cloud Access Security Broker (CASB) that specializes in securing cloud and SaaS applications with Encryption, Monitoring, Analytics and Defence (EMAD™).

0 ratings

Verizons Secure Cloud Gateway delivers a secure, cloud-based, distributed web gateway that helps you defend your business. Acting as both a first and last line of defense, this service protects users, apps, and data on any device, while maintaining performance and eliminating the need to backhaul traffic.

Select Grid® View
G2 Grid® for Cloud Access Security Broker (CASB)
Filter Grid®
Filter Grid®
Select Grid® View
Check out the G2 Grid® for the top Cloud Access Security Broker (CASB) Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
Leaders
High Performers
Contenders
Niche
CipherCloud
Netskope
Symantec Web Security.cloud
CloudSOC Cloud Access Security Broker (CASB)
Microsoft Cloud App Security
Oracle CASB Cloud
ManagedMethods
Trend Micro Cloud App Security
MVISION Cloud
Market Presence
Satisfaction

Learn More About Cloud Access Security Broker (CASB) Software

What is Cloud Access Security Broker (CASB) Software?

Cloud access security broker (CASB) technology secures data stored within or processed by cloud-based applications, typically software as a service (SaaS) solutions. Cloud security access brokers focus on protecting cloud applications. Users of CASB can launch and access their cloud applications in a secured environment.These tools utilize multiple security technologies that help prevent unapproved parties from accessing applications while also preventing data loss and data breaches. They provide a single, secure location for users to access applications. Many platforms support single sign-on for easier access once operating in the CASB environment.

Some CASB tools provide users with a sandboxed environment. The sandbox is a resource-isolated working environment that ensures files and data are transferred directly to the cloud application provider. Other CASB tools utilize firewall and malware detection features, along with security policy enforcement mechanisms to protect information connected to SaaS applications.

These tools can be utilized across devices and operated locally, regardless of the user’s physical location. Individual users can be isolated and cut off from the network. These tools can function across a variety of SaaS applications and software vendors. They can be integrated directly or chosen from a marketplace. Many tools have centralized access through a single sign-on portal. Users can log in to a secure portal and have access to all of the cloud applications they use.

Key Benefits of CASB Software

  • Improves cloud application and data security
  • Simplifies management to improve compliance-related operations
  • Improves identity management and user governance
  • Increases visibility of users, activities, and anomalies

Why Use Cloud Access Security Broker (CASB) Software?

These tools make it easier for businesses to provide secure access to cloud-based applications for their employees. Almost all the benefits of using a CASB system pertain to information security. The majority of benefits can be classified into three categories: threat protection, data security, and governance.

Threat protection — Threats come in multiple forms and CASB products are prepared to defend against them from any direction. Common threat protection features are designed to prevent phishing, malware, account takeover, and malicious content. Phishing can be prevented by securing cloud-based email applications. Malicious attachments and urls can be flagged or sent to spam. Malware can come from emails, downloads or any other kind of malicious content; if malware is present, CASB software can alert users and prevent them from engaging with it. Account takeover can be discovered by monitoring functionality designed to detect abnormal behavior, policy violations, and unexpected configuration changes.

Data security and loss prevention — All data requires security, but some information requires more protection than others. CASB tools help users discover sensitive data within cloud-based applications. Most CASB tools allow for user permission policy enforcement, this helps prevent unauthorized parties from viewing or downloading sensitive information. Many sensitive datasets require increased encryption; these files must be classified as such and CASB solutions will enforce stronger encryption and anomaly monitoring on those specific files.

Governance and compliance — Compliance goes hand in hand with data security and loss prevention. However, increased visibility is a key benefit of CASB solutions. This makes it easier to discover non-compliant datasets and audit systems for policy requirements. They improve a company’s ability to delegate user permissions, enforce security policies and alert security teams of both cloud-based and insider threats.

What are the Common Features of Cloud Access Security Broker (CASB) Software?

Single sign-on (SSO) — SSO features provide a single access point for users to access multiple cloud products without multiple logins. This reduces the time users spend finding applications and logging onto them, improving productivity and user experience.

User analytics — User analytics and monitoring allow companies to view and document individual behaviors and report suspicious activities. They can also alert security teams to compromised accounts by flagging anomalous behaviors.

Cloud gap analytics — Cloud gap analysis features examine data associated with denied entries and policy violations. This helps provide security teams with information that can be used to improve authentication and security protocols.

Anomaly detection — Anomaly detection identifies abnormal behavior by monitoring activity related to user behavior and comparing it to benchmarked patterns.

Cloud registry — Cloud registries provide a list or marketplace of SaaS applications compatible with a CASB solution. Users can access this list to explore integrations or new applications.

Mobile device management (MDM) — MDM functionality offers users the ability to set standards for types of mobile devices and networks capable of accessing data. This allows security teams to customize access requirements and permissions of off-premise and mobile device users.

Access control — Access control features typically refers to support of lightweight directory access protocol (LDAP). This simplifies an administrator’s ability to edit or update application availability and information access.

Data encryption — Data encryption features might refer to data-centric policy enforcement for sensitive information or encompassing encryption for any information stored or accessed through the CASB system.