Policing the Clouds: 12 Cloud Cybersecurity Companies to Know

June 28, 2019
Updated: August 4, 2019
Written by Sam Daley

Cyber attacks have exploded over the past few years. And seeing as the average cost of a company data breach is $3.62 million, it's no wonder businesses are bolstering their cybersecurity measures. Besides the financial hit, attacks put confidential data at risk and shake customer confidence. Bottom line: it's all bad for the bottom line.

That's why more and more companies are heading for the so-called "cloud." Essentially a network of servers that can store massive amounts of highly valuable raw data, the cloud has become an extremely popular choice for stashing and safeguarding that data — described by Intel CEO Brian Kraznich as ‘the new oil” of the 21st century.

To prevent and thwart sophisticated intrusions, cloud companies offer high-tech tools like secure navigation, multi-factor authentication and data encryption to prevent breaches. Other protective methods include the decentralization of entry points and multi-stage verification processes. Real-time flexibility and scalability are key.

Here are 12 masters of the cloud cybersecurity domain.  

 

cybersecurity applications cloud extrahop
ExtraHop

ExtraHop

Location: Seattle, Washington

How it’s using cybersecurity for the cloud: ExtraHop’s Reveal(x) delivers complete visibility across an enterprise's cloud applications by using machine learning to detect suspicious patterns. A one-click investigation function immediately summons a security team.

Industry Impact: ExtraHop was named a cybersecurity innovator for 2018 by prominent cybersecurity publication SC Media, which lauded the Reveal(x) platform for its "combination of innovation, collaboration and education."

 

cybersecurity applications cloud red canary
Red Canary

Red Canary

Location: Denver, Colorado

How it’s using cybersecurity for the cloud: Red Canary’s cybersecurity technology continuously monitors a network’s endpoints, users and activity for threatening behavior. The company’s ATT&CK Mapping defines all the techniques adversaries could potentially use against an organization and quickly triggers warnings about suspicious attacks.   

Industry Impact: Risk mitigation company Kroll chose Red Canary to power its CyberDetectER tool, which is used to detect and quickly respond to credible cyber threats on servers and laptops.

 

cybersecurity applications cloud ping identity
Ping Identity

Ping Identity

Location: Denver, Colorado

How it’s using cybersecurity for the cloud: The Ping Identity platform employs a variety of access technologies to help prevent security breaches on cloud-based products. The company uses everything from an intelligent single sign-on to multi-factor authentication to securely manage who is signing onto, and sharing, important files.   

Industry Impact: The 12 largest U.S. banks, representing a collective $12.9 trillion in assets, use Ping Identity’s platform to manage cloud-based logins. 

 

cybersecurity applications cloud forcepoint
Forcepoint

Forcepoint

Location: Austin, Texas

How it’s using cybersecurity for the cloud: Forcepoint offers a suite of services to help protect cloud databases. The company offers an upgraded firewall, an email security gateway and even what it calls a Cloud Access Security Broker (CASB), which categorizes a company’s app network based on risk and uses machine learning to catch cybercrime in real time.   

Industry Impact: The Forcepoint CASB suites supports all cloud applications and integrates with tools like Splunk, Okta, Google Drive, Salesforce and Slack to protect vital communications and data.

 

cybersecurity applications cloud carbon black
Carbon Black

Carbon Black

Location: Waltham, Massachusetts

How it’s using cybersecurity for the cloud: Carbon Black's predictive security cloud platform to filters data, using real-time analytics and cloud-based delivery to provide endpoint protection. The platform features everything from “threat hunters” (visual representations of how a company’s data is being stored) to ThreatSight, which deploys a dedicated team to monitor a company’s cloud for malicious behavior.

Industry Impact: Carbon Black recently tested its cloud-based MITRE ATT&CK tool, which reportedly delivered threat detections with no delays or errors. 

 

cybersecurity applications cloud ca technologies
Ca Technologies

CA Technologies

Location: New York, New York

How it’s using cybersecurity for the cloud: CA Technologies' cloud-based cybersecurity options include privileged access management and API security trusted apps. The company’s API management platform helps businesses address their needs with an API-first applications architecture that features an array of cybersecurity tools.

Industry Impact: CA Technologies signed an agreement with SAP to integrate its DevOps and cybersecurity solutions with the SAP Cloud Platform. This partnerships brings accelerated delivery and improved cybersecurity capabilities to all customers using the SAP Cloud.

 

cybersecurity applications cloud jumpcloud
JumpCloud

JumpCloud

Location: Boulder, Colorado

How it’s using cybersecurity for the cloud: JumpCloud’s Directory-as-a-Service is a cloud-based platform that lets IT teams securely oversee user identities and connect them to the resources they need. The platform's identity management portion centralizes and secures the underlying credentials of all employees, while the flexible administration tool helps to streamline daily IT operations.

Industry Impact: JumpCloud's secure management platform is used by IT teams at HelloFresh, CarGurus and ClassPass.

 

cybersecurity applications cloud automox
Automox

Automox

Location: Boulder, Colorado

How it’s using cybersecurity for the cloud: Automox is a cloud-based, automated patch management tool. The company’s system gives IT teams the power to track, control and manage their most sensitive software patches. The Automox environment was built to manage Windows, Mac OS X and Linux, as well as third-party software like Adobe, Java and Chrome.

Industry Impact: Dollar Shave Club, the YMCa and Grab all use Automox to help automate and secure their cloud-based patches.

 

cybersecurity applications cloud red8
Red8

Red8

Location: Costa Mesa, California

How it’s using cybersecurity for the cloud: Red8 manages and secures cloud data throughout its entire life cycle. The company’s cloud experts design, deploy and manage individualized private clouds that all feature personalized applications and data center security tools.

Industry Impact: Red8 partners with with a wide variety of tech service providers, including Amazon Web Services, Cisco, Palo Alto Networks and NetApp.

 

cybersecurity applications cloud onapsis
Onapsis

Onapsis

Location: Boston, Massachusetts

How it’s using cybersecurity for the cloud: The Onapsis Security Platform helps protect business-critical applications across the entire company infrastructure. The company provides adaptive cloud cybersecurity tools that detect, investigate and respond to threats and behavior anomalies across everything from finance software to business intelligence data storage.

Industry Impact: Onapsis is used by major tech companies like NVIDIA, Westinghouse and Siemens to boost cloud cybersecurity infrastructure enterprise-wide.  

 

cybersecurity applications cloud icrypto
iCrypto

iCrypto

Location: Santa Clara, California

How it’s using cybersecurity for the cloud: The iCrypto cloud-based platform can be integrated into existing enterprise applications or deployed as a standalone one-step authentication system. The company has a wide range of cloud-based cybersecurity tools that perform everything from real-time transaction verification to password-less login.

Industry Impact: ZTE, Huawei and Cisco all use iCrypto’s cloud data management security tools to secure and speed up their processes, especially logins and identity verification.

 

cybersecurity applications cloud crowdstrike
Crowdstrike

Crowdstrike

Location: Sunnyvale, California

How it’s using cybersecurity for the cloud: Crowdstrike created the world’s first cloud-native endpoint protection platform specifically built to stop breaches. The endpoint protection solution includes antivirus, cybercrime detection and response, and managed threat hunting. The company’s threat hunters are cybersecurity specialists who work 24/7 to help manage cloud data and identify attacks.  

Industry Impact: Crowdstrike developed the Falcon Platform. This expansive ecosystem is used by companies in more than 176 countries to do everything from preventing data breaches to performing threat intelligence on search engines.

Images via Shutterstock and social media 

Great Companies Need Great People. That's Where We Come In.

Recruit With Us