# Best Cloud Data Security Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud data security software secures information stored in or transferred through cloud services and cloud-based applications, enforcing access control policies, monitoring network connections for threats, providing encryption and data loss prevention, and enabling administrators to manage governance and permissions across cloud environments.

### Core Capabilities of Cloud Data Security Software

To qualify for inclusion in the Cloud Data Security category, a product must:

- Provide confidentiality functionality to encrypt or mask data
- Monitor network connections for cloud-based threats
- Enable administrative access control over data stored in the cloud

### Common Use Cases for Cloud Data Security Software

Security and IT teams use cloud data security software to protect sensitive data as organizations increasingly rely on cloud infrastructure. Common use cases include:

- Encrypting sensitive data stored in cloud applications to prevent unauthorized access
- Monitoring and auditing cloud data access to detect anomalous behavior or policy violations
- Enforcing data governance policies including permissions, compliance controls, and data loss prevention rules

### How Cloud Data Security Software Differs from Other Tools

Cloud data security tools offer many of the same capabilities as traditional [data security software](https://www.g2.com/categories/data-security), but provide functionality specifically designed for information stored in or passing through cloud data services. While traditional data security tools are built for on-premises environments, cloud data security platforms are purpose-built to address the unique access patterns, shared responsibility models, and threat vectors of cloud infrastructure.

### Insights from G2 on Cloud Data Security Software

Based on category trends on G2, encryption capabilities and cloud access monitoring stand out as the most valued features. These platforms deliver improved visibility into cloud data exposure and faster policy enforcement as primary outcomes of adoption.





## Category Overview

**Total Products under this Category:** 116


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 8,900+ Authentic Reviews
- 116+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud Data Security Software At A Glance

- **Leader:** [Acronis Cyber Protect Cloud](https://www.g2.com/products/acronis-cyber-protect-cloud/reviews)
- **Highest Performer:** [CrashPlan Platform](https://www.g2.com/products/crashplan-platform/reviews)
- **Easiest to Use:** [Druva Data Security Cloud](https://www.g2.com/products/druva-data-security-cloud/reviews)
- **Top Trending:** [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
- **Best Free Software:** [Sprinto](https://www.g2.com/products/sprinto-inc/reviews)


---

**Sponsored**

### Cyera

Cyera is the world’s leading AI-native data security platform. Its platform gives organizations a complete view of where their data lives, how it’s used, and how to keep it safe, so they can reduce risk and unlock the full value of their data, wherever it is. Backed by more than $1.3 billion in funding from top-tier investors including Accel, Coatue, Cyberstarts, Georgian, Lightspeed, and Sequoia, Cyera’s unified data security platform helps businesses discover, secure, and leverage their most valuable asset - data - and eliminate blind spots, cut alert noise, and protect sensitive information across the cloud, SaaS, databases, AI ecosystems, and on-premise environments. Recent innovations like Cyera’s Omni DLP extend this platform with adaptive, AI-native data loss protection, bringing real-time intelligence and contextual understanding to how data moves and is used across the enterprise.



[Visit company website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1859&amp;secure%5Bdisplayable_resource_id%5D=1859&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1859&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1214164&amp;secure%5Bresource_id%5D=1859&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-data-security%3Fopen_modal_url%3D%252Fproducts%252Fcortex-data-lake%252Fwishlists%253Fhost_path%253D%25252Fcategories%25252Fcloud-data-security%2526source%253Dcategory&amp;secure%5Btoken%5D=2a3bc5515669636060c610fa1dbca05a8cb7071ed5c52f20eb29c80bf8a00123&amp;secure%5Burl%5D=https%3A%2F%2Fwww.cyera.com%2Fdemo%3Futm_medium%3Dreferral%26utm_source%3Dg2&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Acronis Cyber Protect Cloud](https://www.g2.com/products/acronis-cyber-protect-cloud/reviews)
  Acronis delivers the world’s most complete cyber resilience platform, combining backup, disaster recovery, cybersecurity, RMM, and business operations tools into a single, natively integrated solution. Built specifically for Managed Service Providers (MSPs) and IT teams, Acronis simplifies operations with one agent, one console, and one license model. Automation, AI-driven insights, and multi-tenant management ensure that fewer technicians can manage more clients at lower cost. With predictable pricing and transparent billing, Acronis enables partners and IT teams to scale efficiently, comply with regulations, and deliver unmatched resilience. No other vendor delivers this level of integration, efficiency, and MSP alignment. Acronis Cyber Protect Cloud unites backup and next-generation, AI-based anti-malware, antivirus, and endpoint protection management in one solution. Integration and automation provide unmatched ease for service providers — reducing complexity while increasing productivity and decreasing operating costs. Acronis Cyber Protect Cloud is the single service provider solution that combines backup, anti-malware (including anti-virus, anti-ransomware, and anti-cryptojacking) and security and management capabilities such as vulnerability assessments, patch management, URL filtering and more. Now, service providers can eliminate complexity and make security a centerpiece of their offerings while increasing SLAs, decreasing churn, and generating more recurring revenue. Get upgraded security with integrated AI-based defenses that protect clients from modern threats, make smarter use of resources so your team can focus on clients, and earn new recurring revenue and higher margins that strengthen your business. Enriched with next-gen, full-stack anti-malware protection and comprehensive yet simple management tools, built on top of our industry-leading backup and data recovery solution, Acronis Cyber Protect Cloud simplifies onboarding, daily operations, and reporting, and combats advanced attacks with new use cases enabled by integration. Acronis Cyber Protect Cloud makes it easy to deliver the modern cyber protection your clients seek. Acronis is majority-owned by EQT.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,260

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)
- **Auditing:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Acronis](https://www.g2.com/sellers/acronis)
- **Company Website:** https://www.acronis.com/
- **Year Founded:** 2003
- **HQ Location:** Schaffhausen
- **Twitter:** @acronis (94,780 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/13179/ (1,917 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, Director
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 68% Small-Business, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (217 reviews)
- Backup Solutions (213 reviews)
- Backup Ease (169 reviews)
- Protection (159 reviews)
- Security (158 reviews)

**Cons:**

- Slow Performance (77 reviews)
- Expensive (65 reviews)
- Complexity (53 reviews)
- Poor Customer Support (50 reviews)
- Backup Issues (41 reviews)

  ### 2. [Druva Data Security Cloud](https://www.g2.com/products/druva-data-security-cloud/reviews)
  Over the past decade, data risks have diversified, shifting data protection’s role from a passive last line of defense to an active data partner in responding to and recovering from diverse data risks. Traditionally, backup solutions aimed to secure against system risks such as hardware and application failures. However, with cloud making infrastructure redundant and applications becoming more resilient, risks have shifted from infrastructure to the data layer. While security tools play a critical role in creating defensive layers to secure the enterprise perimeter, some threats inevitably breach these defenses. Legacy backup approaches typically resorted to brute force recovery, but modern incident response demands a thorough analysis of the breach&#39;s scope, impact, and remediation strategies before recovery can occur. Data security is essential in this process, providing deep data insights that, when combined with perimeter security data, drive comprehensive and effective data-powered incident response. Druva bolsters enterprise data defense with the Data Security Cloud, a 100% SaaS, fully-managed platform that enhances protection, monitoring, and recovery. Druva ensures secure and clean recovery through air-gapped immutable backups, and advanced anomaly detection facilitates early threat identification. The platform&#39;s integrated response capabilities allow organizations to assess and address threats promptly, and bounce back to clean data without loss. By combining these features, Druva complements existing perimeter defenses, providing a seamless, comprehensive solution that simplifies the response and recovery process and ensures robust protection against modern threats. About Druva Druva is the leading provider of data security solutions, empowering customers to secure and recover their data from all threats. The Druva Data Security Cloud is a fully managed SaaS solution offering air-gapped and immutable data protection across cloud, on-premises, and edge environments. By centralizing data protection, Druva enhances traditional security measures and enables faster incident response, effective cyber remediation, and robust data governance. Trusted by over 7,500 customers, including 65 of the Fortune 500, Druva safeguards business data in an increasingly interconnected world.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 714

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.4/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.4/10 (Category avg: 9.0/10)
- **Auditing:** 9.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Druva](https://www.g2.com/sellers/druva)
- **Company Website:** https://www.druva.com
- **Year Founded:** 2008
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @druvainc (19,156 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/960262/ (1,383 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 59% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (219 reviews)
- Backup Ease (167 reviews)
- Backup Solutions (167 reviews)
- Customer Support (140 reviews)
- Backup Frequency (126 reviews)

**Cons:**

- Backup Issues (56 reviews)
- Storage Limitations (28 reviews)
- Expensive (26 reviews)
- Slow Performance (25 reviews)
- Lack of Backup (23 reviews)

  ### 3. [Sprinto](https://www.g2.com/products/sprinto-inc/reviews)
  Sprinto is the world&#39;s first Autonomous Trust Platform, detecting change across your posture, determining what&#39;s at risk, and acting across compliance, vendor risk, AI governance, and more, so your organization stays trustworthy without the operational chaos. Sprinto is trusted by 3,000+ companies across 75 countries, including Emergent, CodeRabbit, Anaconda, and Whatfix. The platform supports 200+ global standards, including SOC 2, ISO 27001, GDPR, HIPAA, PCI-DSS, and ISO 42001, for AI governance across 300+ integrations.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 1,610

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.4/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **Auditing:** 9.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Sprinto Technology Private Limited](https://www.g2.com/sellers/sprinto-technology-private-limited)
- **Company Website:** https://sprinto.com/
- **Year Founded:** 2020
- **HQ Location:** San Francisco, US
- **Twitter:** @sprintoHQ (13,304 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sprinto-com (460 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 56% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (418 reviews)
- Customer Support (346 reviews)
- Compliance (324 reviews)
- Helpful (320 reviews)
- Compliance Management (275 reviews)

**Cons:**

- Integration Issues (74 reviews)
- Limited Integrations (42 reviews)
- Limited Customization (41 reviews)
- Unclear Guidance (41 reviews)
- Software Bugs (40 reviews)

  ### 4. [Check Point Harmony Email &amp; Collaboration](https://www.g2.com/products/check-point-harmony-email-collaboration/reviews)
  Check Point Harmony Email &amp; Collaboration, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 465

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.1/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)
- **Auditing:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 59% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Email Security (94 reviews)
- Security (83 reviews)
- Protection (74 reviews)
- Ease of Use (50 reviews)
- Phishing Protection (45 reviews)

**Cons:**

- False Positives (29 reviews)
- Complexity (23 reviews)
- Complex Setup (22 reviews)
- Limited Features (18 reviews)
- Configuration Difficulties (17 reviews)

  ### 5. [Coro Cybersecurity](https://www.g2.com/products/coro-cybersecurity/reviews)
  Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead with elegant simplicity. Coro is fast to deploy, easy to use, and designed not to waste your time. Once you install Coro, you’ll hardly think about us. That’s the point. Coro automatically detects and fixes security problems, so IT teams don’t have to spend time investigating or troubleshooting. We’re also one of the fastest-growing tech companies in North America, just ask Deloitte. Designed primarily for lean IT teams, Coro’s platform is particularly beneficial for organizations that may lack extensive IT resources or dedicated cybersecurity teams. With the increasing complexity of cyber threats, these businesses often find it challenging to maintain adequate security measures. Coro addresses this gap by automating the detection and remediation of security threats, allowing businesses to focus on their core operations without the constant worry of potential breaches or security incidents. One of Coro&#39;s key benefits is its intuitive, user-friendly interface, which simplifies the management of cybersecurity protocols. This ease of use is particularly advantageous for organizations with limited IT expertise, as it minimizes the need for extensive training or technical knowledge. Additionally, Coro’s continuous monitoring and reporting features provide businesses with valuable insights into their security posture, enabling them to make informed decisions about their cybersecurity strategies. Another impressive features is how comprehensive, yet powerful, it&#39;s all-in-one platform is. Using advanced AI technology, it detects and remediates over 92% of threats automatically, ensuring potential vulnerabilities are identified and addressed in real-time, significantly reducing the risk of data breaches and other cyber incidents. Their impressive performance has been recognised by G2 with a 94% approval rating from users and SE Labs, who awarded them three AAA ratings for their EDR, Email and Cloud modules. Overall, Coro’s cybersecurity platform represents a significant advancement in the field of cybersecurity. By automating threat detection and remediation, offering customizable solutions, and providing a user-friendly experience, Coro empowers organizations to effectively defend against the evolving landscape of cyber threats. Its recognition as one of the fastest-growing cybersecurity companies in North America further underscores its commitment to delivering innovative and effective security solutions.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 231

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.5/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.5/10 (Category avg: 9.0/10)
- **Auditing:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Coronet](https://www.g2.com/sellers/coronet)
- **Company Website:** https://www.coro.net
- **Year Founded:** 2014
- **HQ Location:** Chicago, IL
- **Twitter:** @coro_cyber (1,892 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/coronet (295 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Non-Profit Organization Management, Financial Services
  - **Company Size:** 57% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (99 reviews)
- Security (68 reviews)
- Customer Support (67 reviews)
- Protection (55 reviews)
- Easy Setup (49 reviews)

**Cons:**

- Performance Issues (32 reviews)
- Improvements Needed (20 reviews)
- False Positives (19 reviews)
- Inaccuracy (19 reviews)
- Limited Features (16 reviews)

  ### 6. [Cisco Duo](https://www.g2.com/products/cisco-duo/reviews)
  Duo stops identity-based threats and boosts workforce productivity. Our Continuous Identity Security solution provides the best access management experience across users, devices, and applications while incorporating identity visibility and context from multiple identity sources.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 489

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.9/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.3/10 (Category avg: 9.0/10)
- **Auditing:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Company Website:** https://www.cisco.com
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,388 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (71 reviews)
- Security (67 reviews)
- Authentication (46 reviews)
- Easy Access (46 reviews)
- Authentication Ease (40 reviews)

**Cons:**

- Authentication Issues (24 reviews)
- Login Issues (16 reviews)
- Complexity (15 reviews)
- Notification Issues (15 reviews)
- Delay Issues (14 reviews)

  ### 7. [Check Point CloudGuard Network Security](https://www.g2.com/products/check-point-cloudguard-network-security/reviews)
  CloudGuard Network Security is a comprehensive cloud security solution designed to protect public, private, and hybrid cloud environments from a wide array of cyber threats. This platform focuses on delivering advanced threat protection, ensuring that organizations can confidently transition to the cloud while maintaining robust security measures. With an impressive malware catch rate, CloudGuard is engineered to defend against various types of attacks, including ransomware and other malicious software. Targeted at enterprises and organizations that are increasingly adopting cloud technologies, CloudGuard Network Security is particularly beneficial for IT teams and security professionals who require a reliable and efficient way to manage security across multiple environments. The solution is ideal for businesses looking to enhance their cloud security posture without compromising on agility or operational efficiency. By integrating seamlessly with leading Infrastructure as Code (IaC) tools, CloudGuard automates network security processes, making it easier for teams to implement security measures within their continuous integration and continuous deployment (CI/CD) workflows. One of the standout features of CloudGuard is its advanced protection capabilities. The platform includes a suite of security features such as a firewall, data loss prevention (DLP), intrusion prevention system (IPS), application control, IPsec VPN, URL filtering, antivirus, anti-bot protection, threat extraction, and threat emulation. These tools work in concert to provide a multi-layered defense strategy that addresses various attack vectors, ensuring that organizations can mitigate risks effectively. Additionally, CloudGuard&#39;s automated network security capabilities support IaC and CI/CD practices, allowing organizations to streamline their security processes through the use of APIs and automation. This enables security teams to focus on more strategic initiatives rather than being bogged down by manual tasks. The unified security management feature further enhances the solution by providing consistent visibility and policy management across hybrid-cloud and on-premises environments. Users can access logging, reporting, and control from a single interface, simplifying the management of security policies and improving overall operational efficiency. Overall, CloudGuard Network Security stands out in the cloud security landscape by offering a robust, integrated solution that not only protects against emerging threats but also enhances the agility and efficiency of security operations. Its comprehensive feature set and automation capabilities make it a valuable asset for organizations navigating the complexities of cloud security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 170

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.9/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.6/10 (Category avg: 9.0/10)
- **Auditing:** 8.2/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Network Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 41% Enterprise, 30% Mid-Market


#### Pros & Cons

**Pros:**

- Security (42 reviews)
- Ease of Use (28 reviews)
- Threat Detection (28 reviews)
- Threat Protection (28 reviews)
- Cloud Integration (22 reviews)

**Cons:**

- Complexity (26 reviews)
- Difficult Setup (25 reviews)
- Difficult Learning (24 reviews)
- Difficult Configuration (23 reviews)
- Difficult Learning Curve (22 reviews)

  ### 8. [Rubrik](https://www.g2.com/products/rubrik/reviews)
  Rubrik is the leading cyber resilience and data protection company with a mission to secure the world’s data. Rubrik pioneered Zero Trust Data SecurityTM to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, built with a Zero Trust design and powered by machine learning, delivers complete cyber resilience in a single platform across enterprise, cloud, and SaaS. Rubrik’s platform automates data policy management and enforcement, safeguards sensitive data, delivers data threat analytics and response, and orchestrates rapid cyber and operational recovery.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 146

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.9/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Rubrik](https://www.g2.com/sellers/rubrik)
- **Company Website:** https://www.rubrik.com
- **Year Founded:** 2014
- **HQ Location:** Palo Alto, California
- **Twitter:** @rubrikInc (43,907 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/4840301/ (4,969 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** System Administrator
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 41% Enterprise, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (49 reviews)
- Backup Solutions (32 reviews)
- Reliability (28 reviews)
- Backup Efficiency (26 reviews)
- User Interface (26 reviews)

**Cons:**

- Expensive (17 reviews)
- Limited Features (11 reviews)
- Complexity (8 reviews)
- Cost Management (8 reviews)
- Missing Features (8 reviews)

  ### 9. [Veritas Alta Data Protection](https://www.g2.com/products/cohesity-veritas-alta-data-protection/reviews)
  The Veritas Alta Platform is designed to intelligently and securely backup, govern, protect, and orchestrate clean recovery for enterprise data wherever it may live so business continuity is never at risk. Veritas Alta Data Protection provides AI-powered anomaly detection and automated malware scanning for cyber resiliency across all major cloud environments, flexible disaster recovery options, native container protection and recovery, and advanced storage technologies. Alta Data Protection delivers the industry’s most secure, cost-efficient, and unified cloud workload protection. Veritas Alta Recovery Vault is the most secure storage foundation for a cyber resilient backup strategy. With the flexibility to rapidly recover applications across clouds and on premises, Recovery Vault is engineered to seamlessly back up your data and is securely managed by Veritas. Ensuring uninterrupted access and recovery, regardless of disruptions. Embrace the cloud with confidence, knowing that your critical workloads are safeguarded.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 39

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.6/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.9/10 (Category avg: 9.0/10)
- **Auditing:** 8.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Cohesity](https://www.g2.com/sellers/cohesity)
- **Year Founded:** 2013
- **HQ Location:** San Jose, CA
- **Twitter:** @Cohesity (29,307 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3750699/ (7,684 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 50% Mid-Market, 31% Small-Business


  ### 10. [IBM Guardium Data Detection and Response](https://www.g2.com/products/ibm-guardium-data-detection-and-response/reviews)
  IBM Guardium DDR (Data Detection and Response) is a data security solution that helps organizations detect, analyze, and respond to potential data threats in hybrid and multi-cloud environments. It provides centralized visibility, advanced threat detection, and automated response capabilities to protect sensitive data and minimize security risks across diverse IT infrastructures. Key Features and Benefits: • Complete Data Visibility: See everything happening across your data, whether it’s stored on premises, in the cloud or in hybrid environments. Consolidate fragmented security tools in a single view, monitor every data interaction and quickly identify suspicious activity • AI-Powered Threat Detection: Detect potential threats before they escalate. Leverage advanced analytics and machine learning to continuously monitor for unusual data patterns, unauthorized access attempts or changes in behavior. • Automated Incident Response: Prioritize threats by severity and focus on the most important issues. Immediately identify abnormal activity in near realtime and automate incident response workflows, minimizing potential damage and downtime. As part of IBM® Guardium® Data Security Center, Guardium DDR can address the security challenges you face with a holistic strategy that focuses on early risk detection, threat prioritization, and protecting data in motion and at rest. Availability: IBM Guardium DDR is available for purchase on AWS Marketplace and IBM Marketplace.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 32

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.0/10)
- **Auditing:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,023 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)
- **Ownership:** SWX:IBM

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Enterprise, 41% Mid-Market


  ### 11. [Google Apigee Sense](https://www.g2.com/products/google-apigee-sense/reviews)
  Apigee Sense works in conjunction with the Apigee Edge API Management Platform to give API teams a powerful weapon to protect APIs from attacks


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 19

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.7/10 (Category avg: 9.0/10)
- **Auditing:** 9.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,885,216 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Top Industries:** Electrical/Electronic Manufacturing, Information Technology and Services
  - **Company Size:** 65% Small-Business, 35% Mid-Market


  ### 12. [Satori Data Security Platform](https://www.g2.com/products/satori-data-security-platform/reviews)
  Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 87

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.3/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **Auditing:** 9.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Commvault](https://www.g2.com/sellers/commvault)
- **Company Website:** https://www.commvault.com
- **Year Founded:** 1996
- **HQ Location:** Eatontown, New Jersey, United States
- **Twitter:** @Commvault (64,790 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/163166/ (3,456 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Computer Software, Computer &amp; Network Security
  - **Company Size:** 56% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (16 reviews)
- Security (14 reviews)
- Access Control (13 reviews)
- Data Protection (11 reviews)
- Features (11 reviews)

**Cons:**

- Complexity (7 reviews)
- Complexity Management (5 reviews)
- Slow Performance (5 reviews)
- Expensive (4 reviews)
- Improvement Needed (4 reviews)

  ### 13. [Check Point CloudGuard CNAPP](https://www.g2.com/products/check-point-cloudguard-cnapp/reviews)
  CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter. With CloudGuard&#39;s unified &amp; modular platform , customers receive: Enhanced Cloud Security Posture Management Deep Workload Security Visibility at Scale with No Agents Enforcement of Least Privilege with Cloud Infrastructure Entitlement Management (CIEM) Runtime Protection for Cloud Workloads (CWPP) Context-Based Web Application and API Protection (WAF) Shift CNAPP Left to Secure Applications in the CI/CD Pipeline Context Graph Visualization &amp; Cloud Detection and Response For more information on CloudGuard CNAPP, visit https://www.checkpoint.com/cloudguard/cnapp/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.6/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **Auditing:** 8.9/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Security (45 reviews)
- Cloud Security (35 reviews)
- Ease of Use (30 reviews)
- Cloud Integration (29 reviews)
- Comprehensive Security (29 reviews)

**Cons:**

- Improvement Needed (13 reviews)
- Complexity (12 reviews)
- Difficult Setup (10 reviews)
- Integration Issues (10 reviews)
- Poor Customer Support (10 reviews)

  ### 14. [CrashPlan Platform](https://www.g2.com/products/crashplan-platform/reviews)
  CrashPlan Platform securely, efficiently, and comprehensively backs up files and emails in Microsoft Exchange Online, SharePoint, OneDrive, Gmail, and Google Drive without user action or time-consuming IT intervention. Flexible infrastructure, deployment, management, and restore options allow organizations to back up SaaS data at scale within budget and human resource constraints.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 247

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.9/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [CrashPlan](https://www.g2.com/sellers/crashplan)
- **Company Website:** https://www.crashplan.com/
- **Year Founded:** 2001
- **HQ Location:** Minneapolis, MN
- **Twitter:** @crashplan (24,592 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/crashplan/ (157 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Administrator
  - **Top Industries:** Real Estate, Information Technology and Services
  - **Company Size:** 63% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Backup Frequency (100 reviews)
- Ease of Use (72 reviews)
- Security (61 reviews)
- Customer Support (50 reviews)
- Reporting (37 reviews)

**Cons:**

- Improvement Needed (10 reviews)
- Poor Reporting (8 reviews)
- Restoration Issues (6 reviews)
- Slow Performance (6 reviews)
- Backup Issues (4 reviews)

  ### 15. [Securiti](https://www.g2.com/products/securiti/reviews)
  Securiti is the pioneer of the DataAI Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti&#39;s Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including &quot;Most Innovative Startup&quot; by RSA, &quot;Top 25 Machine Learning Startups&quot; by Forbes, &quot;Most Innovative AI Companies&#39;&#39; by CB Insights, &quot;Cool Vendor in Data Security&quot; by Gartner, and &quot;Privacy Management Wave Leader&#39;&#39; by Forrester. For more information, please follow us on LinkedIn and visit Securiti.ai.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 80

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.5/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.0/10)
- **Auditing:** 10.0/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Veeam](https://www.g2.com/sellers/veeam)
- **Company Website:** https://www.veeam.com
- **Year Founded:** 2006
- **HQ Location:** Columbus, OH
- **Twitter:** @veeam (51,564 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/veeam-software/ (6,666 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Retail
  - **Company Size:** 66% Enterprise, 14% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (38 reviews)
- Customer Support (26 reviews)
- Features (21 reviews)
- Helpful (20 reviews)
- Problem Solving (20 reviews)

**Cons:**

- Complexity (11 reviews)
- Learning Curve (10 reviews)
- Implementation Issues (9 reviews)
- Complexity Issues (8 reviews)
- Learning Difficulty (8 reviews)

  ### 16. [SpinOne](https://www.g2.com/products/spinone/reviews)
  SpinOne is an all-in-one SaaS security platform that protects your mission critical SaaS environments including Google Workplace, Microsoft 365, Salesforce, Slack – and now we&#39;ve added 50+ more SaaS apps to SSPM coverage. SpinOne comprehensive SaaS security addresses the inherent challenges associated with safeguarding SaaS environments by providing full SaaS visibility, risk management, and fast incident response capabilities. SpinOne helps mitigate the risks of data leaks and data loss while streamlining operations for security teams through automation. Key solutions of the SpinOne platform include: - SaaS Backup &amp; Recovery, which ensures that critical data is backed up and can be quickly restored in the event of a loss. - SaaS Ransomware Detection &amp; Response, which proactively identifies and responds to ransomware threats, minimizing downtime and recovery costs. - SaaS Data Leak Prevention &amp; Data Loss Protection (DLP) capabilities help organizations safeguard against unauthorized access and accidental data exposure - SaaS Security Posture Management (SSPM) - provides insights into the security status of various applications, allowing organizations to maintain a robust security posture. - Enterprises App + Browser Security - helps enterprises with Risky OAuth app + browser extension protection, SaaS/GenAI DLP, SaaS Discovery. - Archive &amp; eDiscovery - lets your legal teams interface securely with your SaaS data to build cases with the same search and privacy features you expect in a standalone eDiscovery solution. Plus, SpinOne integrates seamlessly with popular business applications such as Jira, ServiceNow, DataDog, Splunk, Crowdstrike, Slack, andTeams to make your life easier. This integration not only enhances the platform&#39;s functionality but also helps organizations save time and reduce manual workloads, allowing security teams to focus on more strategic initiatives. The rmarket recognition of Spin.AI as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management Report underscores its effectiveness and reliability in the realm of SaaS security solutions. By choosing SpinOne, organizations can enhance their data protection strategies while ensuring operational efficiency and compliance.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 124

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.6/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)
- **Auditing:** 8.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [SpinAI](https://www.g2.com/sellers/spinai)
- **Company Website:** https://spin.ai/
- **Year Founded:** 2017
- **HQ Location:** Palo Alto, California
- **Twitter:** @spintechinc (769 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3146884 (90 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, IT Director
  - **Top Industries:** Marketing and Advertising, Non-Profit Organization Management
  - **Company Size:** 51% Mid-Market, 40% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (33 reviews)
- Customer Support (32 reviews)
- Backup Ease (25 reviews)
- Reliability (22 reviews)
- Backup Features (21 reviews)

**Cons:**

- Backup Issues (8 reviews)
- Expensive (7 reviews)
- Poor Interface Design (7 reviews)
- Pricing Issues (5 reviews)
- Lack of Backup (4 reviews)

  ### 17. [Rewind Backups](https://www.g2.com/products/rewind-backups/reviews)
  Rewind is the leading SaaS resilience platform, helping organizations stay failover-ready in an increasingly complex cloud landscape. SaaS application vendors secure their own infrastructure, but the responsibility to protect account-level data, configurations, and business logic often falls on the customer. Rewind fills that gap with schema-aware recovery and precise, item-level restores that maintain the relationships between data, settings, and workflows. Rewind safeguards the operational backbone of platforms like Jira, Confluence, Bitbucket, GitHub, and Azure DevOps. It also helps organizations meet industry standards and regulatory requirements such as SOC 2 Type 2, GDPR, CCPA, and HIPAA, giving teams confidence in their security posture so they can recover quickly, satisfy auditors, and keep shipping.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 101

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 9.5/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.5/10 (Category avg: 9.0/10)
- **Auditing:** 9.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Rewind](https://www.g2.com/sellers/rewind)
- **Company Website:** https://rewind.com/
- **Year Founded:** 2015
- **HQ Location:** Ottawa, Ontario
- **Twitter:** @rewind (3,033 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10358347/ (133 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, Software Engineer
  - **Top Industries:** Information Technology and Services, Retail
  - **Company Size:** 55% Small-Business, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (14 reviews)
- Backup Ease (11 reviews)
- Easy Setup (9 reviews)
- Helpful (6 reviews)
- Affordable (5 reviews)

**Cons:**

- Backup Issues (5 reviews)
- Restore Difficulties (3 reviews)
- Lack of Backup (2 reviews)
- Poor Customer Support (2 reviews)
- Pricing Issues (2 reviews)

  ### 18. [Tresorit](https://www.g2.com/products/tresorit/reviews)
  Tresorit is a secure content collaboration platform built to help individuals and organizations store, sync, and share sensitive information without sacrificing privacy. It brings encrypted storage, file sharing, collaboration, data rooms, and e-signatures into one product family, and is trusted by thousands of organizations worldwide. Tresorit is part of Swiss Post and positions itself as a privacy-first alternative to mainstream cloud tools for teams handling confidential files, regulated data, or client-facing work. At the core of Tresorit is zero-knowledge, end-to-end encryption. Files are encrypted on the user’s device before they are uploaded, and the encryption keys remain inaccessible to Tresorit—meaning Tresorit cannot read customer content. This architecture is designed to protect files even in scenarios where infrastructure is compromised, because plaintext data isn’t stored on Tresorit servers. Tresorit also emphasizes cryptographic design choices intended to avoid leakage through content matching or server-side visibility. For daily work, Tresorit SecureCloud provides an encrypted workspace for internal collaboration and external exchange. It supports secure file storage, syncing, and team collaboration while aiming to keep workflows simple for end users. Tresorit also offers personal and business plans, positioning personal use as an encrypted vault for sensitive documents and business use as a secure workspace that supports IT control, governance, and collaboration. Tresorit’s Drive experience lets users access encrypted content through familiar interfaces like Windows File Explorer and macOS Finder, including “cloud-only” access to avoid storing all files locally. This helps teams work efficiently while maintaining centralized control. Admins can also take action if a device is lost or compromised—for example, revoking access and unlinking the device to reduce risk. For external sharing, Tresorit FileSharing focuses on secure delivery with strong access control. Sharing links can be protected with expiration rules, passwords, watermarks, and restrictions on download or printing, with detailed activity tracking and auditing. Tresorit also integrates into email workflows like Outlook and Gmail to help reduce the risks of sending sensitive attachments, while keeping sharing secure and manageable. For structured client collaboration, Tresorit Engage provides encrypted, customizable data rooms built for ongoing projects rather than one-off transactions. It supports role-based access control, templates, document and task management, granular permissions, and branded client experiences—useful for industries like legal, finance, consulting, HR, and any scenario involving recurring confidential exchanges with external stakeholders. Tresorit extends beyond storage and sharing with Tresorit eSign, which combines document signing with encrypted file handling. It includes support for EU-qualified electronic signatures, enabling high-trust signing workflows aligned with strict legal and regulatory expectations. Tresorit also offers Tresorit Email Encryption, enabling users to send encrypted emails directly from Outlook, and provides integration options designed for organizations that need secure communication without forcing recipients into complex setups. On compliance and assurance, Tresorit highlights strong security validation and certifications. It is ISO 27001:2022 certified and has achieved Common Criteria EAL4+ certification, reflecting structured security governance and independently evaluated assurance. Tresorit also supports compliance needs such as GDPR, HIPAA (including BAA support), and other frameworks often referenced by regulated industries. For data sovereignty, it offers data residency choices across multiple regions, allowing organizations to align storage locations with legal, contractual, or internal governance requirements.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 250

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.7/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Tresorit](https://www.g2.com/sellers/tresorit)
- **Year Founded:** 2011
- **HQ Location:** Zurich, Zurich
- **Twitter:** @Tresorit (7,468 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2449399/ (138 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO, Manager
  - **Top Industries:** Information Technology and Services, Non-Profit Organization Management
  - **Company Size:** 84% Small-Business, 13% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (98 reviews)
- Security (85 reviews)
- File Sharing (64 reviews)
- Secure Sharing (57 reviews)
- Security Focus (36 reviews)

**Cons:**

- Access Limitations (24 reviews)
- Expensive (23 reviews)
- File Management Issues (20 reviews)
- Syncing Issues (19 reviews)
- File Sharing Issues (18 reviews)

  ### 19. [Hybrid Cloud Security](https://www.g2.com/products/trend-micro-hybrid-cloud-security/reviews)
  In today&#39;s complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend&#39;s Cloud Security provides essential visibility, allowing you and your teams to secure every aspect of your transformation and eliminate disruptive security silos. Automate security policies, deployments, monitoring, and compliance audits seamlessly from a single console, ensuring the automatic protection of all workloads from both known and unknown threats. With Cloud-Native Application Protection and robust platform capabilities, Trend empowers you to proactively address vulnerabilities and defend against threats. Gain centralized visibility, continuous asset discovery, and contextualized risk assessments, equipping your team with everything necessary to stay ahead of potential cloud security risks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 181

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.6/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.8/10 (Category avg: 9.0/10)
- **Auditing:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Who Uses This:** Cyber Security Associate, Cyber Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Security (9 reviews)
- Security Protection (7 reviews)
- Compliance (6 reviews)
- Cloud Security (4 reviews)
- Comprehensive Security (4 reviews)

**Cons:**

- Complexity (6 reviews)
- Complex Setup (4 reviews)
- Feature Complexity (4 reviews)
- Learning Curve (4 reviews)
- Difficult Learning (3 reviews)

  ### 20. [DiskStation](https://www.g2.com/products/diskstation/reviews)
  DiskStation Manager (DSM) is an intuitive web-based operating system for every Synology NAS, designed to help you manage your digital assets across home and office.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 82

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.7/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.2/10 (Category avg: 9.0/10)
- **Auditing:** 8.5/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Synology](https://www.g2.com/sellers/synology)
- **Year Founded:** 2000
- **HQ Location:** Taiwan
- **Twitter:** @Synology (67,505 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/synology/ (986 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Higher Education
  - **Company Size:** 61% Small-Business, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Easy Setup (7 reviews)
- Reliability (7 reviews)
- Backup Ease (5 reviews)
- Easy Access (5 reviews)

**Cons:**

- Lacking Features (4 reviews)
- Complexity (3 reviews)
- Slow Performance (3 reviews)
- Unclear Guidance (3 reviews)
- Expensive (2 reviews)

  ### 21. [Virtru Email Encryption](https://www.g2.com/products/virtru-email-encryption/reviews)
  Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), intellectual property, and other regulated information. Seamlessly integrating with platforms like Gmail and Microsoft Outlook, Virtru empowers organizations to meet compliance requirements for HIPAA, GDPR, CJIS, CMMC 2.0, ITAR and other data privacy regulations, without disrupting existing workflows. Virtru provides full control over email content even after it’s been sent. Users can set expiration dates, revoke access, and track where emails are shared, ensuring total visibility and control over sensitive information. With granular access control and audit trails, Virtru simplifies data protection for enterprises and small businesses alike. Ideal for industries such as healthcare, financial services, government, and education, Virtru empowers your teams to confidently share sensitive information without sacrificing security.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 402

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.1/10 (Category avg: 9.0/10)
- **Auditing:** 8.6/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Virtru](https://www.g2.com/sellers/virtru)
- **Company Website:** https://virtru.com
- **Year Founded:** 2012
- **HQ Location:** Washington, DC
- **Twitter:** @virtruprivacy (1,795 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/virtru/ (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Administrative Assistant
  - **Top Industries:** Hospital &amp; Health Care, Health, Wellness and Fitness
  - **Company Size:** 45% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (80 reviews)
- Security (78 reviews)
- Encryption (66 reviews)
- Email Encryption (56 reviews)
- Secure Communication (45 reviews)

**Cons:**

- Email Issues (55 reviews)
- Email Encryption Issues (44 reviews)
- Access Issues (29 reviews)
- Encryption Issues (26 reviews)
- Access Limitations (20 reviews)

  ### 22. [Rotate](https://www.g2.com/products/rotate/reviews)
  Rotate is a 360-degree cybersecurity cloud platform designed for small and midsize businesses (SMBs and SME’s). It provides all-around protection that integrates seamlessly with existing tech stacks. Rotate features five key hubs: Identity, Email, Endpoint, Training, and Monitoring, offering essential technology services, education, and expertise to help SMBs, SMEs, and Managed Service Providers (MSPs) tackle cybersecurity challenges effectively. Supported by investors of SentinelOne, Rotate is rapidly gaining adoption across North America.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 23

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Quality of Support:** 10.0/10 (Category avg: 9.0/10)
- **Ease of Use:** 10.0/10 (Category avg: 9.0/10)
- **Auditing:** 9.7/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Rotate](https://www.g2.com/sellers/rotate)
- **Year Founded:** 2023
- **HQ Location:** Palo Alto, US
- **LinkedIn® Page:** https://www.linkedin.com/company/withrotate (29 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 87% Small-Business, 13% Mid-Market


#### Pros & Cons

**Pros:**

- Affordable (1 reviews)
- Centralized Management (1 reviews)
- Comprehensive Solutions (1 reviews)
- Cyber Security (1 reviews)
- Ease of Use (1 reviews)

**Cons:**

- Compatibility Issues (1 reviews)
- Limited Compatibility (1 reviews)
- Missing Features (1 reviews)

  ### 23. [Safetica](https://www.g2.com/products/safetica/reviews)
  Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data. ✔️ Data Protection: Classify, monitor and control sensitive data across devices and clouds in real time. ✔️ Insider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity. ✔️ Compliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest. ✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data by monitoring, classifying files, and enforcing policies on M365 file operations. Safetica covers the following data security solutions: ✅ Data Loss Prevention: Discover, classify, and protect sensitive data through visibility, continuous monitoring, and real-time awareness alerts defending against data loss, empowering users, and to support regulatory compliance. ✅ Insider Risk Management: Enhance the protection of sensitive data from insider threats with real-time detection of anomalous behavior while also gaining insight into employee productivity. ✅ Cloud Data Protection: Continuously protect valuable data across Microsoft 365 by extending existing protection policies —ensuring secure access, responsible sharing, and visibility into cloud-based workloads across devices and hybrid environments. ✅ AI-Powered Contextual Defense: Access an intelligent, adaptive layer of protection that learns typical user behavior to detect anomalies and proactively mitigate insider threats with real-time detection, risk scoring, and dynamic response. ✅ Data Discovery and Classification: Discover and classify sensitive data using content and contextual analysis —giving you the insight to identify risks, reduce exposure, and enforce compliance. ✅ Reporting and Administration: Safetica’s centralized console delivers clear, actionable insights—serving as a single source of truth for reviewing threats, enforcing policies, and investigating incidents. ✅ Device Control: Prevent unauthorized data access and reduce the risk of data loss by monitoring, controlling, and securing external devices connected to USB and peripheral ports across endpoints. ✅ User Activity and Workspace Audit: Protect sensitive data and reduce organizational risk by detecting both malicious and unintentional user activity —ensuring security, compliance, and visibility across your entire environment. ✅ Regulatory Compliance: Ensure data privacy and effortlessly maintain local and international compliance standards including GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 182

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 9.0/10 (Category avg: 9.0/10)
- **Auditing:** 9.3/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Safetica](https://www.g2.com/sellers/safetica)
- **Company Website:** https://www.safetica.com
- **Year Founded:** 2011
- **HQ Location:** San Jose, California, United States
- **Twitter:** @Safetica (662 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/safetica-technologies (134 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Mid-Market, 38% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (23 reviews)
- Security (19 reviews)
- Data Protection (18 reviews)
- Features (17 reviews)
- User Interface (16 reviews)

**Cons:**

- Slow Performance (9 reviews)
- Complexity (7 reviews)
- Integration Issues (7 reviews)
- Limited Compatibility (7 reviews)
- Limited Features (7 reviews)

  ### 24. [Virtru Secure Share](https://www.g2.com/products/virtru-secure-share/reviews)
  Virtru Secure Share is a cloud-native secure file transfer solution designed to simplify sharing sensitive documents. Advanced encryption, customizable access controls, and complete data visibility ensure a seamless and secure user experience. Users maintain full control over their data, with the ability to revoke access at any time—providing peace of mind when sharing sensitive information such as intellectual property, personally identifiable information (PII), personal healthcare information (PHI), and other regulated data. Accessible via any web browser or integrated with popular business applications like Google Drive, Zendesk, and Confluence, Virtru Secure Share delivers robust file protection wherever your files are shared.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 111

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.8/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.7/10 (Category avg: 9.0/10)
- **Auditing:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Virtru](https://www.g2.com/sellers/virtru)
- **Company Website:** https://virtru.com
- **Year Founded:** 2012
- **HQ Location:** Washington, DC
- **Twitter:** @virtruprivacy (1,795 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/virtru/ (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Hospital &amp; Health Care, Financial Services
  - **Company Size:** 43% Mid-Market, 31% Small-Business


#### Pros & Cons

**Pros:**

- Security (66 reviews)
- Ease of Use (62 reviews)
- Secure Sharing (51 reviews)
- File Sharing (41 reviews)
- Data Protection (29 reviews)

**Cons:**

- Access Limitations (21 reviews)
- Email Issues (20 reviews)
- Not User-Friendly (14 reviews)
- Email Encryption Issues (13 reviews)
- Access Issues (12 reviews)

  ### 25. [AWS PrivateLink](https://www.g2.com/products/aws-privatelink/reviews)
  AWS PrivateLink increases the security of data shared with cloud-based applications by eliminating the exposure of data to the public Internet. AWS PrivateLink provides private connectivity between VPCs, AWS services, and on-premises applications, securely on the Amazon network.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Quality of Support:** 8.7/10 (Category avg: 9.0/10)
- **Ease of Use:** 8.5/10 (Category avg: 9.0/10)
- **Auditing:** 7.1/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,223,984 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 50% Small-Business, 29% Mid-Market




## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [SaaS Backup Software](https://www.g2.com/categories/saas-backup)
- [Data Loss Prevention (DLP) Software](https://www.g2.com/categories/data-loss-prevention-dlp)
- [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance)
- [Data-Centric Security Software](https://www.g2.com/categories/data-centric-security)
- [Cloud File Security Software](https://www.g2.com/categories/cloud-file-security)
- [Sensitive Data Discovery Software](https://www.g2.com/categories/sensitive-data-discovery)
- [ Data Security Posture Management (DSPM)](https://www.g2.com/categories/data-security-posture-management-dspm)



---

## Buyer Guide

### What You Should Know About Cloud Data Security Software 

### What is Cloud Data Security Software?

Cloud data security software helps protect information stored in the cloud. Some information may be personal or sensitive, requiring additional labeling and protection. Other datasets may just need an additional layer of security. Either way, if a company is looking for added protection and data loss prevention, cloud data security software may be a good fit.

Cloud storage services come in many forms and may have unique requirements for protection. Public, private, and hybrid cloud systems do not possess the same level of protection. As a result, many solutions have emerged to protect data and ensure its compliance no matter where it is stored. Many have to support cross-cloud data protection allowing users to manage data stored by multiple cloud service providers. Other products offer simpler solutions for smaller businesses who are looking for reassurance that their data is safe.

Key Benefits of Cloud Data Security Software

- Encrypt or mask data stored in the cloud
- Identify and discover sensitive information
- Control access to sensitive information
- Monitor user behavior and access for abnormalities

### Why Use Cloud Data Security Software?

There are many reasons companies should invest in cloud data security software, most importantly is the obvious need to protect data whether it relates to business, employees, or customers. Despite misconceptions that information stored using notable cloud providers, there is still a shared responsibility that places significant accountability on both the provider and their customer.

The shared responsibility can come down to this: Companies are responsible for securing everything in the cloud while cloud service providers are responsible for protecting the cloud. The shared responsibility between clients and service providers places a heavy burden of security responsibilities on the customer. While customers utilizing cloud services want to relinquish the responsibility of protecting on-premise infrastructure, they are still responsible for securing access, workloads, data, and applications.

**Access control —** Information should always be limited to the individuals at a company who are approved to view it. Access control describes the product’s ability to prevent unapproved parties from gaining access to a database, application or network. These are some of the most important features in any data security solution. Access control can prevent the public from viewing sensitive information about customers and prevent competitors from accessing that data. This software typically integrates with identity solutions or cloud directories for simplified privilege management and user governance. Companies can create identities, delegate their privileges, and relinquish them upon termination. They can also give temporary access to business partners or limited access to customers, depending on a company’s specific requirements.

**Visibility —** Some data can get lost, especially when managing information across numerous clouds and databases.To prevent things from getting lost in the shuffle, many cloud data security solutions allow continuous discovery and monitoring of datasets. This helps pinpoint information that should be encrypted but isn’t or information publicly available that should be limited to within the company. Improved visibility can help companies know what data is where and what security policies are enforced on the dataset at all times.

**Compliance —** Compliance refers to the need to enforce policies in alignment with data protection and privacy requirements outlined in government legislation. This can include data encryption, masking, or deliverability, among others. Companies can use cloud data security software to identify data requiring additional security and enforce those policies continuously to avoid fines and penalties. These compliance regulations may be unique to a company’s industry as well. For example, hospitals and banks will likely have more requirements and steeper penalties than a food truck or gas station. As a result, it’s important to keep in mind industry-specific needs when evaluating tools.

### What are the Common Features of Cloud Data Security Software?

Cloud data security software can provide a wide range of features, but here are a few of the most common found in the market.

**Data masking —** Data masking functionality protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

**Data encryption —** Encryption features are used to manage policies for user data access and data encryption.

**Data loss prevention —** This feature stores data securely either on-premise or in an adjacent cloud database to prevent loss of data at rest.

**Anomaly detection —** Anomaly detection features are used to constantly monitor activity related to user behavior and compares activity to benchmarked patterns.

**Sensitive data compliance —** Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

**Cloud gap analytics —** Cloud gap analytics analyze data associated with denied entries and policy enforcement, giving better information of authentication and security protocols.

**Compliance monitoring —** Compliance-related monitoring features are used to monitor data quality and send alerts based on violations or misuse.

**User analytics —** User analysis functionality allows reporting and documentation of individual user behavior and privileges.

**Auditing —** Auditing and documentation features increase visibility into access and alterations of the database and can be used for behavioral analytics and reporting.

**Data discovery —** Data discovery features unveil data connected to infrastructure and applications used to manage and maintain compliance within complex IT systems.

**Access control —** Access control requires a product to support LDAP protocol to enable access control and governance.

### Trends Related to Cloud Data Security Software

**Unified cloud security platforms —** Unified cloud security platforms are one of the major [cybersecurity trends](https://research.g2.com/insights/2020-trends/cybersecurity-technology-trends-2020) impacting businesses today. Since the majority of businesses today are utilizing multiple cloud services, unified visibility through consolidated platforms appears to be the preferred management approach going forward. Cloud data security solutions can help with that by expanding a platform’s ability to visualize information across clouds, and adding the functionality to monitor access and make changes to the data.

**API security —** [API security](https://research.g2.com/insights/api-security-in-multicloud) is increasingly important as API usage continues to expand. These integration tools help add functionality and data to expand the functionality of an application or provide a cloud service. There are thousands of APIs in use today, and most businesses don’t use just one. API security solutions help identify APIs, test their security, create an inventory of connections, and discover “shadow APIs&quot; unknown to the business they’re connected to.

### Software and Services Related to Cloud Data Security Software

These technology families are either closely related to cloud data security software or there is frequent overlap between products.

[**Data-centric security software**](https://www.g2.com/categories/data-centric-security) **—** Data-centric security software is, for most intents and purposes, the same solution as cloud data security software—it’s just designed to manage and secure information stored on-premises as well as in the cloud. Bigger companies and organizations with significant amounts of sensitive information often run systems locally, where they’ll use data-centric security software to discover and protect information.

[**Cloud file security tools**](https://www.g2.com/categories/cloud-file-security) **—** Cloud file security software also serves a similar purpose to cloud data security tools. Instead of data, these tools integrate with cloud storage and collaboration tools to prevent employees from sharing sensitive files outside the company. These tools will label files containing sensitive data and alert administrators or restrict access if the file is sent to an unapproved party.

[**Cloud security monitoring and analytics software**](https://www.g2.com/categories/cloud-security-monitoring-analytics) **—** Cloud security monitoring and analytics solutions provide similar monitoring capabilities to cloud file and cloud data security solutions, but add a level of behavioral analysis to improve the detection of misuse and insider threats. The added ability to monitor files and data for activity is coupled with reporting features to improve a company’s security posture and expedite the amount of time needed to resolve issues.

[**Cloud compliance software**](https://www.g2.com/categories/cloud-compliance) **—** Cloud compliance tools are used often in tandem with cloud data security tools. Although, instead of protecting information on the data level, they protect entire workloads and are used to protect information across all kinds of cloud services. Some tools may provide features for discovering individual data sets or unencrypted information, but are less granular in their ability to secure data itself.




