# Best Cloud Security Monitoring and Analytics Software for Medium-Sized Businesses

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Products classified in the overall Cloud Security Monitoring and Analytics category are similar in many regards and help companies of all sizes solve their business problems. However, medium-sized business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Medium-Sized Business Cloud Security Monitoring and Analytics to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Medium-Sized Business Cloud Security Monitoring and Analytics category.

In addition to qualifying for inclusion in the Cloud Security Monitoring and Analytics Software category, to qualify for inclusion in the Medium-Sized Business Cloud Security Monitoring and Analytics Software category, a product must have at least 10 reviews left by a reviewer from a medium-sized business.





## Category Overview

**Total Products under this Category:** 83


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,200+ Authentic Reviews
- 83+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### ManageEngine ADAudit Plus

ADAudit Plus is a UBA-driven auditor that helps keep your AD, Azure AD, file systems (including Windows, NetApp, EMC, Synology, Hitachi, and Huawei), Windows servers, and workstations secure and compliant. ADAudit Plus transforms raw and noisy event log data into real-time reports and alerts, enabling you to get full visibility into activities happening across your Windows Server ecosystem in just a few clicks. More than 10,000 organizations across the world trust ADAudit Plus to: 1. Instantly notify them about changes in their Windows Server environments. 2. Continuously track Windows user logon activity. 3. Monitor the active and idle time spent by employees at their workstations. 4. Detect and troubleshoot AD account lockouts. 5. Provide a consolidated audit trail of privileged user activities across their domains. 6. Track changes and sign-ins in Azure AD. 7. Audit file accesses across Windows, NetApp, EMC, Synology, Hitachi, and Huawei file systems. 8. Monitor file integrity across local files residing on Windows systems. 9. Mitigate insider threats by leveraging UBA and response automation. 10. Generate audit-ready compliance reports for SOX, the GDPR, and other IT mandates.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2252&amp;secure%5Bdisplayable_resource_id%5D=2252&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2252&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=5691&amp;secure%5Bresource_id%5D=2252&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-security-monitoring-and-analytics&amp;secure%5Btoken%5D=007096b070a463b6c33b7b932dde81c13ef4d05f423a35a391323fa8e29879ef&amp;secure%5Burl%5D=https%3A%2F%2Fwww.manageengine.com%2Fproducts%2Factive-directory-audit%2F%3Futm_source%3DG2%26utm_medium%3Dtpac%26utm_campaign%3DADAP-cloudsecurity-monitoring&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
  Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) consolidates CSPM, KSPM, CWPP, Vulnerability management, IaC scanning, CIEM, DSPM into a single platform. Wiz drives visibility, risk prioritization, and business agility. Protecting Your Cloud Environments Requires a Unified, Cloud Native Platform. Wiz connects to every cloud environment, scans every layer, and covers every aspect of your cloud security - including elements that normally require installing agents. Its comprehensive approach has all of these cloud security solutions built in. Hundreds of organizations worldwide, including 50 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman &amp; Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 773

**User Satisfaction Scores:**

- **Security Integration:** 8.7/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.0/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Wiz](https://www.g2.com/sellers/wiz-76a0133b-42e5-454e-b5da-860e503471db)
- **Company Website:** https://www.wiz.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @wiz_io (22,550 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wizsecurity/ (3,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CISO, Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Security (107 reviews)
- Ease of Use (104 reviews)
- Visibility (87 reviews)
- Easy Setup (68 reviews)

**Cons:**

- Improvement Needed (35 reviews)
- Feature Limitations (34 reviews)
- Learning Curve (34 reviews)
- Improvements Needed (29 reviews)
- Complexity (27 reviews)

### 2. [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
  Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead with elegant simplicity. Coro is fast to deploy, easy to use, and designed not to waste your time. Once you install Coro, you’ll hardly think about us. That’s the point. Coro automatically detects and fixes security problems, so IT teams don’t have to spend time investigating or troubleshooting. We’re also one of the fastest-growing tech companies in North America, just ask Deloitte. Designed primarily for lean IT teams, Coro’s platform is particularly beneficial for organizations that may lack extensive IT resources or dedicated cybersecurity teams. With the increasing complexity of cyber threats, these businesses often find it challenging to maintain adequate security measures. Coro addresses this gap by automating the detection and remediation of security threats, allowing businesses to focus on their core operations without the constant worry of potential breaches or security incidents. One of Coro&#39;s key benefits is its intuitive, user-friendly interface, which simplifies the management of cybersecurity protocols. This ease of use is particularly advantageous for organizations with limited IT expertise, as it minimizes the need for extensive training or technical knowledge. Additionally, Coro’s continuous monitoring and reporting features provide businesses with valuable insights into their security posture, enabling them to make informed decisions about their cybersecurity strategies. Another impressive features is how comprehensive, yet powerful, it&#39;s all-in-one platform is. Using advanced AI technology, it detects and remediates over 92% of threats automatically, ensuring potential vulnerabilities are identified and addressed in real-time, significantly reducing the risk of data breaches and other cyber incidents. Their impressive performance has been recognised by G2 with a 94% approval rating from users and SE Labs, who awarded them three AAA ratings for their EDR, Email and Cloud modules. Overall, Coro’s cybersecurity platform represents a significant advancement in the field of cybersecurity. By automating threat detection and remediation, offering customizable solutions, and providing a user-friendly experience, Coro empowers organizations to effectively defend against the evolving landscape of cyber threats. Its recognition as one of the fastest-growing cybersecurity companies in North America further underscores its commitment to delivering innovative and effective security solutions.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 231

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 9.1/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.2/10)
- **Security Automation:** 8.9/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Coronet](https://www.g2.com/sellers/coronet)
- **Company Website:** https://www.coro.net
- **Year Founded:** 2014
- **HQ Location:** Chicago, IL
- **Twitter:** @coro_cyber (1,889 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/coronet (295 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Non-Profit Organization Management, Financial Services
  - **Company Size:** 57% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Security (68 reviews)
- Customer Support (67 reviews)
- Protection (55 reviews)
- Easy Setup (49 reviews)

**Cons:**

- Performance Issues (32 reviews)
- Improvements Needed (20 reviews)
- False Positives (19 reviews)
- Inaccuracy (19 reviews)
- Limited Features (16 reviews)

### 3. [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews)
  Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 279

**User Satisfaction Scores:**

- **Security Integration:** 8.1/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Saas Consultant, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Security (121 reviews)
- Comprehensive Security (92 reviews)
- Cloud Security (71 reviews)
- Vulnerability Detection (63 reviews)
- Threat Detection (57 reviews)

**Cons:**

- Complexity (27 reviews)
- Expensive (24 reviews)
- Delayed Detection (22 reviews)
- False Positives (19 reviews)
- Improvement Needed (19 reviews)

### 4. [Amazon GuardDuty](https://www.g2.com/products/amazon-guardduty/reviews)
  Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads.GuardDuty also detects potentially compromised instances or reconnaissance by attackers.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 53

**User Satisfaction Scores:**

- **Security Integration:** 10.0/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 6.7/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.2/10)
- **Security Automation:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,225,864 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Who Uses This:** Software Developer
  - **Top Industries:** Computer Software, Accounting
  - **Company Size:** 38% Enterprise, 34% Small-Business


### 5. [SentinelOne Singularity Cloud Security](https://www.g2.com/products/sentinelone-singularity-cloud-security/reviews)
  Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 113

**User Satisfaction Scores:**

- **Security Integration:** 9.8/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 9.7/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.2/10)
- **Security Automation:** 9.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,697 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Security (27 reviews)
- Ease of Use (20 reviews)
- Vulnerability Detection (19 reviews)
- Cloud Management (16 reviews)
- Cloud Security (15 reviews)

**Cons:**

- Complexity (5 reviews)
- Ineffective Alerts (5 reviews)
- Complex Setup (4 reviews)
- Difficult Configuration (4 reviews)
- Poor UI (4 reviews)

### 6. [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews)
  Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig uniquely delivers runtime-powered visibility and agentic AI to stop cloud attacks instantly, not after the damage is done. With Sysdig, you can: - Stop threats in 2 seconds and respond in minutes - Cut vulnerability noise by 95% with runtime prioritization - Detect real risk instantly across workloads, identities, and misconfigurations - Close permissions gaps in under 2 minutes Sysdig Secure consolidates CSPM, CWPP, CIEM, vulnerability management, and threat detection into a single open, real-time platform. Unlike other CNAPPs, Sysdig connects signals across runtime, identity, and posture to eliminate blind spots, reduce tool sprawl, and accelerate innovation without compromise. No guesswork. No black boxes. Just cloud security, the right way. Learn more at https://sysdig.com


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 111

**User Satisfaction Scores:**

- **Security Integration:** 9.7/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 9.4/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.2/10)
- **Security Automation:** 9.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sysdig](https://www.g2.com/sellers/sysdig-715eaed9-9743-4f27-bd2b-d3730923ac3e)
- **Company Website:** https://www.sysdig.com
- **Year Founded:** 2013
- **HQ Location:** San Francisco, California
- **Twitter:** @Sysdig (10,280 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3592486/ (640 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 46% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (33 reviews)
- Vulnerability Detection (32 reviews)
- Threat Detection (31 reviews)
- Detection Efficiency (30 reviews)
- Features (23 reviews)

**Cons:**

- Feature Limitations (10 reviews)
- Complexity (9 reviews)
- Missing Features (8 reviews)
- Difficult Learning (7 reviews)
- Feature Complexity (7 reviews)

### 7. [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews)
  Crowdstrike Falcon Cloud Security is the only CNAPP to stop breaches in the cloud Built for today’s hybrid and multi-cloud environments, Falcon Cloud Security protects the entire cloud attack surface - from code to runtime - by combining continuous agentless visibility with real-time detection and response. At runtime, Falcon Cloud Security delivers best-in-class cloud workload protection and real-time cloud detection and response (CDR) to stop active threats across hybrid environments. Integrated with the CrowdStrike Falcon platform, it correlates signals across endpoint, identity, and cloud to detect sophisticated cross-domain attacks that point solutions miss—enabling teams to respond faster and stop breaches in progress. To reduce risk before attacks occur, Falcon Cloud Security also delivers agentless-driven posture management that proactively shrinks the cloud attack surface. Unlike typical solutions, Crowdstrike enriches cloud risk detections with adversary intelligence and graph-based context, enabling security teams to prioritize exploitable exposures and prevent breaches before they happen. Customers using Falcon Cloud Security consistently see measurable results: 89% faster cloud detection and response 100x reduction in false positives by prioritizing exploitable, business-critical risk 83% reduction in cloud security licenses due to elimination of redundant tools


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.2/10)
- **Security Automation:** 8.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,324 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Security (49 reviews)
- Cloud Security (37 reviews)
- Detection Efficiency (34 reviews)
- Vulnerability Detection (31 reviews)
- Ease of Use (29 reviews)

**Cons:**

- Expensive (17 reviews)
- Improvements Needed (14 reviews)
- Improvement Needed (13 reviews)
- Feature Complexity (8 reviews)
- Learning Curve (8 reviews)

### 8. [IBM QRadar SIEM](https://www.g2.com/products/ibm-ibm-qradar-siem/reviews)
  IBM Security QRadar SIEM is more than a tool, it is a teammate for SOC analysts - with advanced AI, powerful threat intelligence, and access to the latest detection content. IBM Security QRadar SIEM leverages multiple layers of AI and automation to enhance alert enrichment, threat prioritization, and incident correlation - presenting related alerts cohesively in a unified dashboard, reducing noise and saving time. QRadar SIEM helps maximize security team’s productivity by providing a unified experience across all SOC tools, with advanced AI and automation capabilities. &#39; IBM QRadar SIEM offers two editions tailored to meet your organization’s needs – Cloud Native and Classic. Whether your organization needs cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, we have you covered. IBM Security QRadar SIEM is available on AWS Marketplace.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 280

**User Satisfaction Scores:**

- **Security Integration:** 8.4/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.5/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.2/10)
- **Security Automation:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,390 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)
- **Ownership:** SWX:IBM

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 53% Enterprise, 29% Mid-Market


### 9. [Check Point CloudGuard CNAPP](https://www.g2.com/products/check-point-cloudguard-cnapp/reviews)
  CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter. With CloudGuard&#39;s unified &amp; modular platform , customers receive: Enhanced Cloud Security Posture Management Deep Workload Security Visibility at Scale with No Agents Enforcement of Least Privilege with Cloud Infrastructure Entitlement Management (CIEM) Runtime Protection for Cloud Workloads (CWPP) Context-Based Web Application and API Protection (WAF) Shift CNAPP Left to Secure Applications in the CI/CD Pipeline Context Graph Visualization &amp; Cloud Detection and Response For more information on CloudGuard CNAPP, visit https://www.checkpoint.com/cloudguard/cnapp/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.6/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.2/10)
- **Security Automation:** 8.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Security (45 reviews)
- Cloud Security (35 reviews)
- Ease of Use (30 reviews)
- Cloud Integration (29 reviews)
- Comprehensive Security (29 reviews)

**Cons:**

- Improvement Needed (13 reviews)
- Complexity (12 reviews)
- Difficult Setup (10 reviews)
- Integration Issues (10 reviews)
- Poor Customer Support (10 reviews)

### 10. [Tenable Cloud Security](https://www.g2.com/products/tenable-tenable-cloud-security/reviews)
  Tenable Cloud Security is an actionable cloud security platform that exposes and closes priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities. Organizations use its intuitive UI to unify siloed tools to secure the full cloud stack, achieving end-to-end visibility, prioritization and remediation across infrastructure, workloads, identities, data and AI services. Users can access the extensive knowledgebase of Tenable Research, reducing the risk of breaches with advanced prioritization that understands resource, identity and risk relationships. Tenable uses this context to pinpoint toxic combinations of risk most likely to be exploited. Take action, even if you only have 5 minutes, with guided remediations and code snippets that significantly reduce MTTR. With one click, report on compliance with industry benchmarks and regulatory requirements, e.g. SOC 2, GDPR &amp; HIPAA. TCS is part of Tenable’s AI-powered exposure management platform, Tenable One.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.3/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.2/10)
- **Security Automation:** 9.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,651 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 57% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Compliance (6 reviews)
- Detailed Analysis (6 reviews)
- Ease of Use (5 reviews)
- Features (5 reviews)
- Integrations (5 reviews)

**Cons:**

- Complex Setup (4 reviews)
- Expensive (4 reviews)
- Feature Limitations (4 reviews)
- Difficult Setup (3 reviews)
- Implementation Difficulty (3 reviews)

### 11. [Coralogix](https://www.g2.com/products/coralogix/reviews)
  Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace and security events, enhancing operational efficiency and reducing total cost of ownership by up to 70%. Coralogix stands out for its simple pricing model, based solely on data volume ingested and retained, and offers free, fast customer support with less than 30 second response time and 1 hour resolution time. Our platform covers the entire range of observability with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all streamlined for quick integration and immediate value. Components within the stream store the system state to provide stateful insights and real-time alerting without ever needing to index the data — so there are never any trade-offs to achieve observability. Once ingested, parsed, and enriched, data is written remotely to an archive bucket controlled by the client. The archive can be queried directly at any time, from the platform UI or via CLI, giving users infinite retention with full control over, and access to, their data. View and query your data from any dashboard using any syntax. Coralogix has successfully completed relevant security and privacy compliances by BDO including GDPR, SOC 2, PCI, HIPAA, and ISO 27001/27701.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 339

**User Satisfaction Scores:**

- **Security Integration:** 8.8/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Coralogix](https://www.g2.com/sellers/coralogix)
- **Company Website:** https://www.coralogix.com
- **Year Founded:** 2014
- **HQ Location:** San Francisco, CA
- **Twitter:** @Coralogix (4,088 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3763125/ (583 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, DevOps Engineer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 53% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (82 reviews)
- Log Management (70 reviews)
- Customer Support (65 reviews)
- Real-time Monitoring (57 reviews)
- User Interface (57 reviews)

**Cons:**

- Learning Curve (25 reviews)
- Missing Features (25 reviews)
- Difficult Learning (24 reviews)
- Slow Performance (24 reviews)
- Learning Difficulty (22 reviews)

### 12. [Panther](https://www.g2.com/products/panther/reviews)
  Panther is the AI SOC Platform that scales security expertise by embedding AI agents across your security operations with native access to your data lake, detection logic, and organizational knowledge. Unlike bolt-on tools, Panther&#39;s closed-loop architecture turns every alert into compounding intelligence that makes the system smarter over time. Request a demo today at: https://panther.com/product/request-a-demo/


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 46

**User Satisfaction Scores:**

- **Security Integration:** 9.4/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.4/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.2/10)
- **Security Automation:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Panther Labs](https://www.g2.com/sellers/panther-labs)
- **Company Website:** https://panther.com/
- **Year Founded:** 2018
- **HQ Location:** San Francisco, CA
- **Twitter:** @runpanther (4,442 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/runpanther/ (286 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (12 reviews)
- Detection Efficiency (9 reviews)
- Ease of Use (9 reviews)
- Features (9 reviews)
- Easy Integrations (7 reviews)

**Cons:**

- Alert Management (3 reviews)
- Complex Configuration (3 reviews)
- Dashboard Issues (3 reviews)
- Limited Access (3 reviews)
- Immaturity (2 reviews)

### 13. [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews)
  FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire application lifecycle—from development to runtime—it combines posture management, workload protection, identity security, and threat detection into one integrated platform. By leveraging machine learning and behavioral analytics, FortiCNAPP helps security teams detect unknown threats, reduce noise, and accelerate response. Integrated with the Fortinet Security Fabric, it provides full-stack visibility across cloud, network, and endpoint environments—empowering teams to operate with confidence, reduce complexity, and scale securely.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 383

**User Satisfaction Scores:**

- **Security Integration:** 8.4/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.9/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.2/10)
- **Security Automation:** 8.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Company Website:** https://www.fortinet.com
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 62% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Security (8 reviews)
- Vulnerability Detection (7 reviews)
- Alert Management (6 reviews)
- Cloud Security (6 reviews)
- Ease of Use (6 reviews)

**Cons:**

- Difficult Setup (5 reviews)
- Poor Documentation (5 reviews)
- Complex Setup (4 reviews)
- Setup Difficulty (4 reviews)
- Complex Configuration (3 reviews)

### 14. [Sumo Logic](https://www.g2.com/products/sumo-logic/reviews)
  Sumo Logic, Inc. unifies and analyzes enterprise data, translating it into actionable insights through one AI-powered cloud-native log analytics platform. This single source of truth enables Dev, Sec and Ops teams to simplify complexity, collaborate efficiently and accelerate data-driven decisions that drive business value. Customers around the world rely on the Sumo Logic SaaS Log Analytics Platform for trusted insights to ensure application reliability, secure and protect against modern security threats, and gain insights into their cloud infrastructures. For more information, visit: SUMOLOGIC.COM


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 381

**User Satisfaction Scores:**

- **Security Integration:** 8.6/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.2/10)
- **Security Automation:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sumo Logic](https://www.g2.com/sellers/sumo-logic)
- **Company Website:** https://www.sumologic.com
- **Year Founded:** 2010
- **HQ Location:** Redwood City, CA
- **Twitter:** @SumoLogic (6,525 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1037816/ (808 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Senior Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 49% Mid-Market, 37% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (63 reviews)
- Log Management (46 reviews)
- Features (37 reviews)
- Real-time Monitoring (37 reviews)
- Insights (35 reviews)

**Cons:**

- Difficult Learning (21 reviews)
- Learning Curve (21 reviews)
- Learning Difficulty (21 reviews)
- Expensive (19 reviews)
- Slow Performance (18 reviews)

### 15. [F5 Distributed Cloud App Infrastructure Protection (AIP)](https://www.g2.com/products/f5-distributed-cloud-app-infrastructure-protection-aip/reviews)
  Distributed Cloud AIP, formerly known as Threat Stack, is the leader in cloud security and compliance for application infrastructures, helping companies securely leverage the business benefits of the cloud with proactive risk identification and high-efficacy threat detection across cloud workloads. Distributed Cloud AIP’s application infrastructure protection helps organizations improve operational efficiency by delivering full stack security observability across the cloud management console, host, container, orchestration, managed containers, and serverless layers. Distributed Cloud AIP helps organizations efficiently detect known risks at scale and quickly uncover anomalies throughout the environment. Distributed Cloud AIP helps organizations stay secure through comprehensive security monitoring with a combination of industry-leading telemetry collection, a robust ruleset for known threats, and ThreatML for vulnerability and anomaly detection. Security Services Customers also have the option of leveraging our human expertise with Distributed Cloud AIP Insights and Managed Security Services, our in-house Security Operations Center (SOC) that provides 24/7/365 monitoring of your cloud environment. Through both options, Distributed Cloud AIP aims to deliver visibility and response capabilities across the full stack, allowing organizations to leverage the benefits of modern computing environments, securely. Coupled with other F5 Distributed Cloud Services, customers get application and infrastructure protection. Because applications and APIs are only as secure as the infrastructure they run on. To learn more, visit https://www.f5.com/cloud/products/app-infrastructure-protection


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 44

**User Satisfaction Scores:**

- **Security Integration:** 7.7/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.5/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.2/10)
- **Security Automation:** 7.9/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [F5](https://www.g2.com/sellers/f5-f6451ada-8c47-43f5-b017-58663a045bc5)
- **HQ Location:** Seattle, Washington
- **Twitter:** @F5Networks (1,384 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/4841/ (6,133 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 70% Mid-Market, 20% Small-Business


### 16. [Blumira Automated Detection &amp; Response](https://www.g2.com/products/blumira-automated-detection-response/reviews)
  Blumira is the security operations platform built for growing teams and partners supporting them, integrating comprehensive visibility, tools, and expert guidance to give you peace of mind knowing you&#39;ll never have to go it alone. The platform includes: - Managed detections for automated threat hunting to identify attacks early - SOC Auto-Focus, using AI to accelerate security investigations &amp; analysis - Automated response to contain and block threats immediately - One year of data retention and option to extend to satisfy compliance - Advanced reporting and dashboards for forensics and easy investigation - Lightweight agent for endpoint visibility and response - 24/7 Security Operations (SecOps) for incident support


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 122

**User Satisfaction Scores:**

- **Security Integration:** 8.9/10 (Category avg: 8.5/10)
- **Activity Monitoring:** 8.8/10 (Category avg: 8.5/10)
- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.2/10)
- **Security Automation:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Blumira](https://www.g2.com/sellers/blumira)
- **Company Website:** https://www.blumira.com
- **Year Founded:** 2018
- **HQ Location:** Ann Arbor, Michigan
- **Twitter:** @blumira (1 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/blumira/ (67 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (33 reviews)
- Customer Support (20 reviews)
- Setup Ease (20 reviews)
- Alerting (16 reviews)
- Alert Management (16 reviews)

**Cons:**

- Limited Customization (11 reviews)
- Alert System (7 reviews)
- Expensive (6 reviews)
- Faulty Detection (6 reviews)
- Inefficient Alert System (6 reviews)



## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms)
- [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance)
- [Cloud Security Posture Management (CSPM) Software](https://www.g2.com/categories/cloud-security-posture-management-cspm)




