Cloud Access Security Broker (CASB) Software

Cloud Access Security Broker

What is Cloud Access Security Broker Software?

A cloud access security broker (CASB) is a software intermediary between an organization's users and one or more cloud services, enabling the organization to enforce certain types of security policies into the cloud.

Common Features

  • Data Loss Prevention
  • Policy Management
  • Analytics and Reporting
  • Threat Integration
  • IAM Integration
  • Encryption/Tokenization
  • Access Control
  • Inspect Data in Authorized App
  • Record Management
  • Cloud Discovery
  • User Behaviour Analytics
  • Zero Trust
  • Web Content Filtering
  • Cloud Security Posture Management

Top Cloud Access Security Broker (CASB) Software

2024 Data Quadrant Awards

2024 Emotional Footprint Awards

At SoftwareReviews, we take pride in recognizing excellence. Each year, we present the Data Quadrant Awards to top-performing software products based solely on authentic user reviews, without any paid placements or analyst opinions. These awards highlight software products that excel in terms of features, vendor capabilities, and customer relationships, earning them the highest overall rankings.

At SoftwareReviews, we take pride in recognizing excellence. Each year, we present the Emotional Footprint Awards to top-performing software products based solely on authentic user reviews, without any paid placements or analyst opinions. These awards shine a spotlight on software vendors who excel in crafting and nurturing strong customer relationships.

Switch to Emotional Footprint
Products: 7
Next Award: Jun 2025

Top Cloud Access Security Broker Software 2024

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

Filter by
Composite Score
8.1 /10
CX Score
8.3 /10

Defender for Cloud Apps includes additional capabilities that extend beyond the traditional cloud access security broker (CASB) scope to strengthen app posture and protect against malicious cloud apps. Ensure holistic coverage for your apps by combining SaaS security posture management, data loss prevention, app-to-app protection, and integrated threat protection.

Scorecard
Scorecard

Pros

  • Enables Productivity
  • Saves Time
  • Effective Service
  • Respectful
Badge Winner
Badge Winner
Plurilock Security Inc

Plurilock AI

Composite Score
7.9 /10
CX Score
8.3 /10

Plurilock secures workforces, delivering least privilege access management and advanced IT solutions to over 600 commercial and government customers worldwide. With industry-leading artificial intelligence and patented real-time identity confirmation technology, Plurilock combines next-generation cybersecurity with a comprehensive line of products and services that enable teams across North America and the globe to compute safely in a remote work world.

Scorecard
Scorecard

Pros

  • Trustworthy
  • Caring
  • Client Friendly Policies
  • Fair
Badge Winner
Badge Winner
Cisco Systems

Cisco Cloudlock

Composite Score
7.9 /10
CX Score
8.0 /10

Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cloudlock's simple, open, and automated approach uses APIs to manage the risks in your cloud app ecosystem. With Cloudlock you can more easily combat data breaches while meeting compliance regulations.

Scorecard
Scorecard

Pros

  • Performance Enhancing
  • Enables Productivity
  • Unique Features
  • Efficient Service
Palo Alto Networks

Prisma Cloud

Composite Score
7.4 /10
CX Score
7.4 /10

By offering advanced data protection and consistency across clouds, Palo Alto Networks reins in the risks. Our products address your cloud access security broker, or CASB, needs and provide advanced capabilities in risk discovery, data loss prevention and advanced threat protection. Now, you can maintain compliance while preventing data leaks and business disruption through a fully cloud-delivered CASB deployment.

Scorecard
Scorecard

Pros

  • Respectful
  • Enables Productivity
  • Security Protects
  • Reliable
Badge Winner
Badge Winner
Skyhigh Security

Skyhigh CASB

Composite Score
7.2 /10
CX Score
7.1 /10

Transform your cloud footprint from a black box to an open book with our industry-leading CASB, an integrated component of Skyhigh Security SSE (formerly MVision Cloud)

Scorecard
Scorecard

Pros

  • Respectful
  • Security Protects
  • Helps Innovate
  • Friendly Negotiation
Composite Score
6.8 /10
CX Score
6.8 /10

Stay secure and compliant when using sanctioned and unsanctioned cloud apps and services on SaaS, PaaS, and IaaS platforms. Get unequaled cloud app security with the deepest visibility, tightest data security, and strongest threat protection from the CASB vendor.

Scorecard
Scorecard

Pros

  • Helps Innovate
  • Efficient Service
  • Appreciates Incumbent Status
  • Friendly Negotiation

Products below are ineligible for awards due to insufficient recent reviews

Composite Score
7.2 /10
CX Score
8.0 /10

Confidently adopt cloud applications and services – without sacrificing security. Manage the unintentional or unapproved movement of sensitive data between cloud app instances and in the context of app risk and user risk with Netskope CASB, a core component of Netskope Security Service Edge (SSE).

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing
Composite Score
7.1 /10
CX Score
7.4 /10

With Forcepoint CASB discover sanctioned and unsanctioned cloud application use, analyze risk, and enforce appropriate controls for SaaS and custom applications.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Enables Productivity
  • Effective Service
Composite Score
6.2 /10
CX Score
6.0 /10

Discover, analyze, secure and manage user interaction with cloud applications. Achieve complete visibility and control with a full-featured CASB solution and protect your modern mobile workforce. Integrated with Web Security for visibility and protection at every stage of an attack.

Pros

  • Transparent
  • Enables Productivity
  • Trustworthy
  • Fair

Cons

  • Leverages Incumbent Status
  • Commodity Features
  • Wastes Time
Perimeter 81 Ltd

Perimeter 81

Insufficient Data
This product does not have enough reviews to meet the minimum criteria to display results. Please check back shortly or write a review.

Unlike legacy solutions, Perimeter 81’s Zero Trust Secure Network as a Service utilizes a Software-Defined Perimeter architecture, offering greater network visibility, seamless onboarding, and full compatibility with all major cloud providers.