Skip to Navigation
Skip to Navigation
Home
...
All Categories
Cloud Data Security Software Discussions
Cloud Data Security Software Discussions
Share
All Cloud Data Security Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
SpinOne
0
1
What is SpinOne used for?
What is SpinOne used for?
Cloud File Security Software
Cloud Data Security Software
Data Loss Prevention (DLP) Software
SaaS Backup Software
Incident Response Software
SaaS Security Posture Management (SSPM) Software
Show More
1
person commented
SpinOne
Pinned by G2 as a
common question.
Posted within
Arpio
0
1
What is Arpio used for?
What is Arpio used for?
AWS Marketplace Software
Cloud Data Security Software
Disaster Recovery as a Service (DRaaS) Solutions
IT Resilience Orchestration Automation (ITRO) Software
1
person commented
Arpio
Pinned by G2 as a
common question.
Posted within
Hybrid Cloud Security
0
1
What is deep security software?
What is deep security software?
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Data Security Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
Check Point Harmony Email & Collaboration
0
1
What are the different types of email security?
What are the different types of email security?
Intelligent Email Protection Software
Cloud File Security Software
Cloud Email Security Solutions
Email Anti-spam Software
Email Encryption Software
Data Loss Prevention (DLP) Software
Cloud Access Security Broker (CASB) Software
Cloud Data Security Software
Show More
2
people commented
SB
Shreya B.
G2
Pinned by G2 as a
common question.
Posted within
Hybrid Cloud Security
0
1
What is Trend Micro in information security?
What is Trend Micro in information security?
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Data Security Software
Intrusion Detection and Prevention Systems (IDPS)
Container Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Show More
Pinned by G2 as a
common question.
Posted within
Redstor Backup for Microsoft 365
0
0
What are the benefits and drawbacks of using Redstor Backup for Microsoft 365 for data protection?
What are the benefits and drawbacks of using Redstor Backup for Microsoft 365 for data protection?
Cloud File Security Software
Cloud Data Security Software
SaaS Backup Software
Archive Storage Solutions
Disaster Recovery as a Service (DRaaS) Solutions
Show More
Pinned by G2 as a
common question.
Posted within
Check Point Cloud Firewall (formerly CloudGuard Network Security)
0
0
How has CloudGuard Network Security supported your cybersecurity efforts, and what features do yo...
How has CloudGuard Network Security supported your cybersecurity efforts, and what features do you rely on most?
Microsegmentation Software
AWS Marketplace Software
Cloud Compliance Software
Cloud Data Security Software
Zero Trust Networking Software
Network Security Policy Management (NSPM) Software
Cloud Workload Protection Platforms
Firewall Software
Show More
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Acronis Cyber Protect Cloud
0
0
What is Acronis Cyber Protect Cloud used for?
What is Acronis Cyber Protect Cloud used for?
Cloud Data Security Software
Server Backup Software
SaaS Backup Software
Patch Management Software
Endpoint Detection & Response (EDR) Software
Show More
2
people commented
AM
Anoop M.
SH
Pinned by G2 as a
common question.
Posted within
Druva Data Security Cloud
0
0
What is Druva Data Resiliency Cloud used for?
What is Druva Data Resiliency Cloud used for?
Online Backup Software
SaaS Backup Software
Backup Solution Suites Software
Server Backup Software
Cloud Data Security Software
Database Backup Software
Disaster Recovery as a Service (DRaaS) Solutions
Show More
Pinned by G2 as a
common question.
Posted within
CyberSentriq
0
0
What is Redstor Backup and Archiving used for?
What is Redstor Backup and Archiving used for?
Disaster Recovery Software
Database Backup Software
Online Backup Software
Server Backup Software
SaaS Backup Software
Cloud File Security Software
Cloud Data Security Software
Archive Storage Solutions
Disaster Recovery as a Service (DRaaS) Solutions
PC Backup Software
Show More
1
person commented
PD
Piere D.
Pinned by G2 as a
common question.
Posted within
Cisco Duo
0
0
What is Duo Security used for?
What is Duo Security used for?
Cloud File Security Software
Cloud Data Security Software
Zero Trust Networking Software
Risk-based Authentication Software
Multi-Factor Authentication (MFA) Software
Single Sign-On (SSO) Solutions
Passwordless Authentication Software
Show More
3
people commented
CC
Cami C.
TT
CJ
Pinned by G2 as a
common question.
Posted within
Check Point Harmony Email & Collaboration
0
0
What is Avanan Cloud Email Security used for?
What is Avanan Cloud Email Security used for?
Intelligent Email Protection Software
Cloud File Security Software
Cloud Email Security Solutions
Email Anti-spam Software
Email Encryption Software
Data Loss Prevention (DLP) Software
Cloud Access Security Broker (CASB) Software
Cloud Data Security Software
Show More
1
person commented
RG
rahul g.
Pinned by G2 as a
common question.
Posted within
Redstor Backup for Microsoft 365
0
0
What is Redstor Backup for Microsoft 365 used for?
What is Redstor Backup for Microsoft 365 used for?
Cloud File Security Software
Cloud Data Security Software
SaaS Backup Software
Archive Storage Solutions
Disaster Recovery as a Service (DRaaS) Solutions
Show More
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
What is Virtru used for?
What is Virtru used for?
Intelligent Email Protection Software
Cloud File Security Software
Encryption Key Management Software
Data-Centric Security Software
Cloud Data Security Software
Email Encryption Software
HIPAA Compliant Messaging Software
Secure Email Gateway Software
Encryption Software
Cloud Content Collaboration Software
Show More
Pinned by G2 as a
common question.
Posted within
Check Point Cloud Firewall (formerly CloudGuard Network Security)
0
0
What is CloudGuard Network Security (IaaS) used for?
What is CloudGuard Network Security (IaaS) used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Microsegmentation Software
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is CloudGuard Posture Management used for?
What is CloudGuard Posture Management used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Cloud Content Collaboration Software
Cloud Security Posture Management (CSPM) Software
Cloud Detection and Response (CDR) Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
API Security Tools
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
DiskStation
0
0
What is DiskStation used for?
What is DiskStation used for?
Cloud File Security Software
Cloud Data Security Software
Cloud Content Collaboration Software
Pinned by G2 as a
common question.
Posted within
Horangi Warden
0
0
What is Horangi Warden used for?
What is Horangi Warden used for?
Cloud Compliance Software
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
Safetica
0
0
What is Safetica used for?
What is Safetica used for?
Insider Threat Management (ITM) Software
Sensitive Data Discovery Software
Cloud File Security Software
User and Entity Behavior Analytics (UEBA) Software
Cloud Data Security Software
Data Loss Prevention (DLP) Software
Show More
1
person commented
FM
Felipe M.
Pinned by G2 as a
common question.
Posted within
Nightfall AI
0
0
What is Nightfall used for?
What is Nightfall used for?
Data Loss Prevention (DLP) Software
Cloud Data Security Software
Sensitive Data Discovery Software
Pinned by G2 as a
common question.
Posted within
Check Point Harmony Email & Collaboration
0
0
What is Check Point Anti-Spam & Email Security used for?
What is Check Point Anti-Spam & Email Security used for?
Email Anti-spam Software
Cloud Access Security Broker (CASB) Software
Cloud File Security Software
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
Coro Cybersecurity
0
0
What is Coro Cybersecurity used for?
What is Coro Cybersecurity used for?
Insider Threat Management (ITM) Software
Malware Analysis Tools
Cloud Security Monitoring and Analytics Software
Cloud File Security Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Email Security Solutions
Data Loss Prevention (DLP) Software
Network Access Control Software
Endpoint Detection & Response (EDR) Software
OT Secure Remote Access Software
Show More
1
person commented
KW
Kevin W.
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is Dome9 ARC used for?
What is Dome9 ARC used for?
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Cloud Security Posture Management (CSPM) Software
Cloud Detection and Response (CDR) Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
API Security Tools
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
DBHawk
0
0
What is DBHawk used for?
What is DBHawk used for?
Database Security Software
Database Management Systems (DBMS)
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
Tenable Cloud Security
0
0
What is Ermetic used for?
What is Ermetic used for?
Cloud Security Posture Management (CSPM) Software
Cloud Security Monitoring and Analytics Software
Data-Centric Security Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Privileged Access Management (PAM) Software
Identity and Access Management (IAM) Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
VP
Veeresh P.
Pinned by G2 as a
common question.
Posted within
Immuta
0
0
What is Immuta used for?
What is Immuta used for?
Sensitive Data Discovery Software
Data De-Identification Tools
Database Security Software
Data Masking Software
Machine Learning Data Catalog Software
Cloud Data Security Software
Show More
1
person commented
JH
Jeffrey H.
Pinned by G2 as a
common question.
Posted within
Symantec Endpoint Threat Defense for Active Directory
0
0
What is Symantec Endpoint Threat Defense for Active Directory used for?
What is Symantec Endpoint Threat Defense for Active Directory used for?
Cloud Data Security Software
Cloud File Security Software
Pinned by G2 as a
common question.
Posted within
Omnishield by MyDigitalShield
0
0
What is Omnishield by MyDigitalShield used for?
What is Omnishield by MyDigitalShield used for?
Cloud Data Security Software
Intrusion Detection and Prevention Systems (IDPS)
Firewall Software
Pinned by G2 as a
common question.
Posted within
Veritas Alta Data Protection
0
0
What is Veritas SaaS Backup used for?
What is Veritas SaaS Backup used for?
SaaS Backup Software
Cloud Data Security Software
Database Backup Software
Online Backup Software
Server Backup Software
Disaster Recovery as a Service (DRaaS) Solutions
Show More
Pinned by G2 as a
common question.
Posted within
nOps
0
0
What is nOps used for?
What is nOps used for?
Cloud Security Posture Management (CSPM) Software
Cloud Management Platforms
Cloud Compliance Software
Cloud Data Security Software
Cloud Cost Management Tools
Show More
Pinned by G2 as a
common question.
Posted within
Soveren
0
0
What is Soveren used for?
What is Soveren used for?
Sensitive Data Discovery Software
Cloud Data Security Software
1
person commented
Soveren
Pinned by G2 as a
common question.
Posted within
Seclore Data-Centric Security Platform
0
0
What is Seclore Rights Management used for?
What is Seclore Rights Management used for?
Cloud File Security Software
Data-Centric Security Software
Cloud Data Security Software
Cloud Email Security Solutions
Mobile Data Security Software
Digital Rights Management (DRM) Software
Sensitive Data Discovery Software
Endpoint Protection Software
Email Encryption Software
Show More
Pinned by G2 as a
common question.
Posted within
SAASPASS
0
0
What is SAASPASS used for?
What is SAASPASS used for?
Cloud Data Security Software
Multi-Factor Authentication (MFA) Software
Password Managers Software
Identity and Access Management (IAM) Software
User Provisioning and Governance Tools
Single Sign-On (SSO) Solutions
Customer Identity and Access Management (CIAM) Software
Show More
Pinned by G2 as a
common question.
Posted within
Imperva Cloud Data Protection
0
0
What is Imperva Cloud Data Protection used for?
What is Imperva Cloud Data Protection used for?
Database Security Software
Web Application Firewalls (WAF)
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
CrashPlan Platform
0
0
What is BluSync used for?
What is BluSync used for?
Cloud Content Collaboration Software
SaaS Backup Software
Cloud Data Security Software
Online Backup Software
Disaster Recovery as a Service (DRaaS) Solutions
Database Backup Software
Show More
Pinned by G2 as a
common question.
Posted within
NordLocker
0
0
What is NordLocker used for?
What is NordLocker used for?
Encryption Software
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
phoenixNAP Data Security Cloud
0
0
What is phoenixNAP Data Security Cloud used for?
What is phoenixNAP Data Security Cloud used for?
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
Cofactor Kite
0
0
What is Cofactor Kite used for?
What is Cofactor Kite used for?
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
BlackFog
0
0
What is BlackFog used for?
What is BlackFog used for?
Insider Threat Management (ITM) Software
User and Entity Behavior Analytics (UEBA) Software
Cloud Data Security Software
Endpoint Management Software
Threat Intelligence Software
Show More
Pinned by G2 as a
common question.
Posted within
FairWarning
0
0
What is FairWarning used for?
What is FairWarning used for?
Healthcare Compliance Software
Cloud Data Security Software
Digital Forensics Software
User and Entity Behavior Analytics (UEBA) Software
Pinned by G2 as a
common question.
Posted within
Check Point Cloud Firewall (formerly CloudGuard Network Security)
0
0
What is CloudGuard Network Security for Gateway Load Balancer used for?
What is CloudGuard Network Security for Gateway Load Balancer used for?
AWS Marketplace Software
Microsegmentation Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Network Security Policy Management (NSPM)
Show More
1
person commented
VM
Viral M.
Pinned by G2 as a
common question.
Posted within
Check Point Cloud Firewall (formerly CloudGuard Network Security)
0
0
What is CloudGuard Network Security for Gateway Load Balancer used for?
What is CloudGuard Network Security for Gateway Load Balancer used for?
AWS Marketplace Software
Microsegmentation Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Workload Protection Platforms
Network Security Policy Management (NSPM)
Show More
1
person commented
DP
Dewesh P.
Pinned by G2 as a
common question.
Posted within
Protegrity
0
0
What is Protegrity used for?
What is Protegrity used for?
Sensitive Data Discovery Software
Data De-Identification Tools
Cloud Data Security Software
Database Security Software
Data Masking Software
Encryption Software
AWS Marketplace Software
Show More
Pinned by G2 as a
common question.
Posted within
Barracuda Cloud Security Guardian
0
0
What is Barracuda Cloud Security Guardian used for?
What is Barracuda Cloud Security Guardian used for?
Cloud Compliance Software
Network Security Policy Management (NSPM)
Cloud Data Security Software
Pinned by G2 as a
common question.
Posted within
Forcepoint Data Security Cloud
0
0
What is Forcepoint Data Guard used for?
What is Forcepoint Data Guard used for?
Cloud Data Security Software
Cloud Edge Security Software
Cloud Access Security Broker (CASB) Software
Zero Trust Networking Software
Data Loss Prevention (DLP) Software
Zero Trust Platforms
Show More
Pinned by G2 as a
common question.
Posted within
PingOne Advanced Services
0
0
What is PingCloud Private Tenant used for?
What is PingCloud Private Tenant used for?
Cloud Data Security Software
Privileged Access Management (PAM) Software
Single Sign-On (SSO) Solutions
Identity and Access Management (IAM) Software
Cloud Directory Services
Show More
Pinned by G2 as a
common question.
Posted within
Check Point CloudGuard CNAPP
0
0
What is CloudGuard AppSec used for?
What is CloudGuard AppSec used for?
AWS Marketplace Software
API Security Tools
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Cloud Workload Protection Platforms
Cloud Detection and Response (CDR) Software
Cloud Data Security Software
Container Security Tools
Cloud Security Monitoring and Analytics Software
Cloud-Native Application Protection Platform (CNAPP)
Show More
1
person commented
Check Point CloudGuard CNAPP
Pinned by G2 as a
common question.
Posted within
Virtru Email Encryption
0
0
What is Virtru?
What is Virtru?
Intelligent Email Protection Software
Cloud File Security Software
Encryption Key Management Software
Data-Centric Security Software
Cloud Data Security Software
Email Encryption Software
HIPAA Compliant Messaging Software
Secure Email Gateway Software
Encryption Software
Cloud Content Collaboration Software
Show More
6
people commented
MU
Michael U.
XV
GC
CC
MW
LP
Pinned by G2 as a
common question.
Posted within
Cisco Duo
0
0
Is Duo Security Safe?
Is Duo Security Safe?
Cloud File Security Software
Cloud Data Security Software
Zero Trust Networking Software
Risk-based Authentication Software
Multi-Factor Authentication (MFA) Software
Single Sign-On (SSO) Solutions
Passwordless Authentication Software
Show More
2
people commented
KH
Kaung san H.
AK
Pinned by G2 as a
common question.
Posted within
Coro Cybersecurity
0
0
What software do you need for cyber security?
What software do you need for cyber security?
Insider Threat Management (ITM) Software
Malware Analysis Tools
Cloud Security Monitoring and Analytics Software
Cloud File Security Software
Cloud Compliance Software
Cloud Data Security Software
Cloud Email Security Solutions
Data Loss Prevention (DLP) Software
Network Access Control Software
Endpoint Detection & Response (EDR) Software
OT Secure Remote Access Software
Show More
Pinned by G2 as a
common question.
‹ Prev
‹ Prev
1
2
3
4
Next ›
Next ›
Top Contributors in Cloud Data Security Software
Popular Discussions without Comments
0
1
What are the cloud data security platforms for compliance-heavy industries?
0
0
What are the benefits and drawbacks of using redstor backup for microsoft 365 for data protection?
0
0
What is druva data resiliency cloud used for?
0
0
What is redstor backup for microsoft 365 used for?
0
0
What is virtru used for?