Star Rating
Languages Supported
Pricing Options

Cloud File Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Cloud File Security Software

    Cloud file security software is used to secure information stored within cloud-based (SaaS) applications. These tools integrate with cloud-based tools used to store and share files. Many companies will use cloud file security solutions to identify files containing sensitive or privileged information. Once these files are properly labeled, companies can control access to the files, document their sharing history, and prevent unauthorized parties from access.

    These tools can facilitate data security by enforcing policies related to cloud access control and storage. Companies leverage the tools to implement security protocols, monitor access, and protect both information stored within cloud applications and information transferred through cloud applications. Administrators can manage governance, set permissions, and monitor the usage of those accessing the applications. Many cloud security products provide encryption and data loss prevention features to further secure documents and data stored within cloud applications.

    To qualify for inclusion in the Cloud File Security category, a product must:

    Integrate with SaaS applications and identity directories
    Allow administrators to set permissions and control file access
    Document interactions with files stored within cloud-based applications or changes to their privileges

    Top 7 Cloud File Security Software

    • Duo Security
    • Avanan Cloud Email Security
    • DiskStation
    • Tresorit
    • ESET Security for Microsoft Sharepoint
    • Barracuda Essentials
    • ManagedMethods

    Compare Cloud File Security Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 39
    View Grid®
    Adv. Filters
    (193)4.4 out of 5
    Entry Level Price:Free

    Duo Security's frictionless Trusted Access platform protects users, data and applications from malicious hackers and data breaches. Our mission is to protect your mission. Duo Security makes security painless, so you can focus on what's important. Our scalable, cloud-based Trusted Access platform addresses security threats before they become a problem. We do this by verifying the identity of your users and the health of their devices before they connect to the apps you want them to access.

    (161)4.8 out of 5
    Optimized for quick response

    Avanan catches the advanced attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365™, G-Suite™, and Slack™. The platform deploys in one click via API to prevent Business Email Compromise and block phishing, malware, data leakage, account takeover, and shadow IT across the enterprise. Avanan replaces the need for multiple tools to secure the entire cloud collaboration suite.

    (40)4.6 out of 5

    DiskStation Manager (DSM) is an intuitive web-based operating system for every Synology NAS, designed to help you manage your digital assets across home and office.

    (20)4.4 out of 5
    Entry Level Price:€12 Per User

    Tresorit is the end-to-end encrypted file sync and sharing solution which safeguards confidential information by design. Unlike other public cloud vendors, Tresorit has no access to users’ files, which ensures maximum confidentiality. - Uncompromised security: Your files are protected from the moment you upload them to the cloud, until they reach the intended recipient. It is technically impossible for anyone else to gain unauthorized access to your files. - Seamless and secure teamwork: Whether

    Multi-layered security from malware spread via SharePoint

    (20)4.2 out of 5

    Email is the leading threat vector for ransomware, phishing, data theft, and other advanced threats. The Barracuda Essentials cloud-based service makes email safe for business with advanced threat protection, tamper-proof archiving, and data protection.

    (16)4.8 out of 5

    ManagedMethods is a leading cloud application security platform for K-12 school districts, mid-market companies, and local governments. The platform provides award-winning cloud security that empowers organizations with full visibility and control of data stored in cloud applications, including Google G Suite, Microsoft Office 365, OneDrive, SharePoint, Box, Dropbox, Slack, and more. ManagedMethods makes cloud security easy — no proxy, no agent and no special training needed. It helps IT &

    Securely adopt cloud apps and meet your regulatory compliance requirements with an industry-leading Cloud Access Security Broker (CASB) that integrates with the rest of your enterprise security. CloudSOC CASB provides visibility, data security and threat protection for today’s generation of cloud users across a wide range of sanctioned and unsanctioned apps.

    Microsoft Cloud App Security is an enterprise-grade security for cloud apps.

    (3)3.7 out of 5

    Datto NAS is a smart, scalable network attached storage platform, centrally managed and protected by the secure Datto Cloud. Easily share files and folders on the local network and replicate NAS snapshots to the Datto Cloud without any additional infrastructure investment. Store more locally, secure it, and back it up to the Cloud forever with our Infinite Cloud Protection option

    (3)5.0 out of 5
    Entry Level Price:$3 month / per license

    Spinbackup for Business: Cloud Cybersecurity & Cloud-to-Cloud Backup for Google Apps. Spinbackup safeguards Google Apps data against leak and loss disasters by identifying business risks and security threats. Visit our page at Google Apps Marketplace -

    (4)4.9 out of 5

    Akku is an Identity and Access Management (IAM) solution that is packed with features including single sign-on, password policy enforcement, IP- and device-based restrictions, multi-factor authentication and YouTube filtering. It provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also offers a dedicated deployment support service, without the need for a third-party system integrator,

    (415)4.6 out of 5
    Optimized for quick response

    ENDPOINT PROTECTION AGAINST RANSOMWARE AND ZERO-DAY THREATS For more than 30 years, ESET® has been developing industry-leading IT security software and services to protect businesses, critical infrastructure and consumers worldwide from increasingly sophisticated digital threats. From endpoint and mobile security to endpoint detection and response, as well as encryption and multifactor authentication, ESET’s high-performing, easy-to-use solutions unobtrusively protect and monitor 24/7, updating

    (2)4.5 out of 5

    Maximize information quality and organization across SharePoint & Office 365. Content Governance for SharePoint makes SharePoint and Office 365 easier to use and provides a more connected, more consistent, and better supported digital workplace.

    (2)4.3 out of 5

    Scanii is a simple REST API you can use to identify malware, phishing, NSFW images/language and other dangerous content.

    ShareOptic is a cloud-based cyber security tool that enables user to overcome compliance and data security challenges, it protect users of Google Apps & Microsoft O365 customers by ensuring unauthorised 3rd parties never gain access to data.

    (4)4.4 out of 5

    StealthDEFEND is the real-time threat analytics component of STEALTHbits’ Data Access Governance Suite. Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data. TOP FEATURES: - Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users. - Seamless Sens

    (2)4.8 out of 5

    Complete B2B cloud security, compliance and phishing prevention across all popular B2B chat, email, collaboration and file sharing software. This SaaS offering solves the growing and costly enterprise problem of both collaboration and email security. The 2-year-old company based in San Jose, California uniquely addresses application and email security threat vectors by integrating machine learning and AI with a Zero-Trust Inbox and Zero-Trust Collaboration security product. Clearedin delivers

    (1)4.5 out of 5

    Cloud-Fish software is optimized for Box, Microsoft OneDrive, Google Drive, and Dropbox for a seamless transfer of data between your systems and the Cloud, as well as, for clients with multiple cloud storage providers.

    Trend Micro PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators are often unaware of. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both files and web components of SharePoint.

    With Proofpoint Cloud Account Defense (PCAD), you can protect your people and your organization from Microsoft Office 365 account compromise.

    (1)3.0 out of 5

    Vera is a next-generation data security company enabling businesses of all sizes to secure, track and share any kind of data, no matter where it's stored or located. With robust policy enforcement, strong encryption and strict access controls, Vera's data-centric security solution enables employees to collaborate freely while ensuring the highest levels of security, visibility and control. For more information, visit:

    0 ratings

    Secure Storage Container in the Cloud BluKrypt™ is a proprietary privacy enhancement technology that powers all Parablu data protection solutions. With BluKrypt™ container deployed, data can travel back and forth from the cloud fully encrypted, and with clear segregation of duties enforced. BluKrypt™ also protects data at rest within the secure storage container it creates within the cloud storage target. As opposed to a cloud access security broker (CASB), which relies on DLP-like policies to

    0 ratings

    CloudRunner makes it easy to have enterprise level security, the convenience of single sign-on, user identity management, and account provisioning for all your cloud-based apps all in one place.

    (1)0.0 out of 5

    CYREN WebSecurity is a cloud-based security software that protects devices and data, regardless of type or location

    0 ratings

    Credential screening for online accounts can help prevent account takeover. Credential screening is the process of seamlessly screening usernames and passwords to identify if they have been compromised. These systems compare users’ credentials to large databases of leaked credentials in order to find a match and alert the user to their exposed credentials. This adds a strong layer of security to users’ accounts and also highlights the risk in password reuse. The check is performed at login, pas

    0 ratings

    Box provides an intuitive cloud file sharing and collaboration platform with comprehensive file management and governance capabilities. But once sensitive data is obtained by an authorized recipient outside the secure Box container, file protection and accountability are diminished, as are data privacy breach safe harbors.

    0 ratings

    FireEye File Protect (FX Series) products help prevent, detect and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices.

    0 ratings

    Kazoup ranks your search results so you can find the right information instantly. The data youre working on are always at the top, helping you spend less time searching and more time getting things done. Kazoup works seamlessly with the permissions of your connected accounts, so your search index automatically reflects what you can access.

    Select Grid® View
    Select Company Size
    G2 Grid® for Cloud File Security
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Cloud File Security Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    High Performers
    Duo Security
    Avanan Cloud Email Security
    ESET Security for Microsoft Sharepoint
    Barracuda Essentials
    Market Presence