• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Cloud Security Posture Management Tools

Cloud Security Posture Management Tools Reviews and Ratings

What is Cloud Security Posture Management Tools?

Cloud security posture management tools help in the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). These tools continuously assess the security posture across multi-cloud environments by maintaining a current inventory of the cloud assets for proactive analysis and risk assessment to detect any misconfigurations. Once these misconfigurations are identified, security controls are developed and implemented. CSPM solutions also integrate with DevOps tools, streamlining the incident response process and ensuring continuous compliance with regulatory requirements and security frameworks by providing visibility of the cloud environment’s security posture.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Singularity Cloud Security
Singularity Cloud Security
Logo of Sysdig Secure
Sysdig Secure
Logo of Wiz CNAPP
Wiz CNAPP
For 50M-1B USD Companies
Logo of Sysdig Secure
Sysdig Secure
Logo of Tenable Cloud Security
Tenable Cloud Security
Logo of FortiCNAPP
FortiCNAPP
For Asia/Pacific
Logo of Sysdig Secure
Sysdig Secure
Logo of Check Point CloudGuard Network Security
Check Point CloudGuard Network Security
Logo of Wiz CNAPP
Wiz CNAPP
Integration & Deployment
Logo of Sysdig Secure
Sysdig Secure
Logo of Microsoft Defender for Cloud
Microsoft Defender for Cloud
Logo of Wiz CNAPP
Wiz CNAPP

Product Listings

Filter by

Products 1 - 20 of 50
Sort by
Logo of Check Point CloudGuard Network Security

Check Point CloudGuard Network Security

By Check Point Software Technologies

4.6
(387 Ratings)

Check Point CloudGuard Network Security is a software designed to provide security and threat prevention for cloud environments, including public, private, and hybrid clouds. The software delivers network security by using threat intelligence, firewall management, intrusion prevention, and application control to protect cloud assets from unauthorized access and cyberattacks. CloudGuard Network Security integrates with a range of cloud platforms to automate security policy deployment and management across distributed environments. The software supports scalability and helps organizations comply with regulatory requirements by enabling visibility, segmentation, and advanced threat detection. It addresses business challenges related to managing security in dynamic cloud infrastructures and reduces risks associated with cloud migration and ongoing operations.

Show More Details
Logo of Wiz CNAPP

Wiz CNAPP

By Wiz

4.7
(300 Ratings)
customers choice 2026

Wiz CNAPP is a software designed to provide cloud security by helping organizations identify and manage risks across cloud environments. This software offers visibility into cloud infrastructure, enabling detection of vulnerabilities, misconfigurations, and exposures in real time. It integrates with major cloud platforms, offering context on workloads, identities, and network configurations. Wiz CNAPP enables prioritization and remediation of security issues by presenting actionable insights into risks and compliance status. The software supports security operations by correlating various cloud resources, supporting governance and risk reduction for enterprises seeking to secure complex cloud architectures.

Show More Details
Logo of Cortex Cloud

Cortex Cloud

By Palo Alto Networks

4.5
(234 Ratings)

Cortex Cloud is a software developed by Palo Alto Networks that delivers automated security operations for organizations aiming to enhance cybersecurity posture. The software provides advanced threat detection, investigation, and response capabilities by integrating artificial intelligence and machine learning across security tools and workflows. It enables centralized management of security alerts and incidents, facilitating efficient triage and resolution. Cortex Cloud supports the monitoring and analysis of security data from multiple sources, helping organizations identify vulnerabilities and streamline remediation processes. The software addresses the business challenge of managing complex security environments by providing visibility, automation, and scalability for security operations teams.

Show More Details
Logo of CrowdStrike Falcon Cloud Security

CrowdStrike Falcon Cloud Security

By CrowdStrike

4.6
(95 Ratings)

CrowdStrike Falcon Cloud Security is a software designed to provide cloud-native security for workloads, applications, and containers across public, private, and hybrid cloud environments. The software delivers continuous monitoring, threat detection, and automated response capabilities to help organizations protect against vulnerabilities and unauthorized access. It integrates with existing cloud platforms to offer visibility into cloud assets and activities, allowing businesses to address compliance requirements and manage risks associated with cloud infrastructure. By leveraging real-time analytics and threat intelligence, the software enables organizations to safeguard cloud resources and maintain security posture throughout the application lifecycle.

Show More Details
Logo of Sysdig Secure

Sysdig Secure

By Sysdig

4.9
(91 Ratings)

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, detection, and response so customers can confidently secure containers, Kubernetes, hosts/servers, and cloud services. Sysdig provides real-time visibility at scale across multiple clouds, eliminating security blind spots. We use intelligence from runtime to prioritize alerts so teams can focus on high-impact security events and improve efficiency. By understanding the entire source to response flow and suggesting guided remediation, customers can both fix issues in production with no wasted time and also detect and respond to threats in real time.

Show More Details
Logo of FortiCNAPP

FortiCNAPP

By Fortinet

4.6
(82 Ratings)

FortiCNAPP is a cloud-native application protection software designed to secure cloud environments and workloads by integrating security controls and compliance features. The software provides real-time threat detection, vulnerability management, and posture assessment across containerized and serverless architectures. It enables automated policy enforcement and monitors for misconfigurations, unauthorized access, and malicious activities within cloud infrastructures. FortiCNAPP supports compliance with regulatory standards through continuous security monitoring and reporting. By consolidating protection for applications, APIs, and cloud resources, the software assists organizations in managing risks associated with cloud deployments and maintaining the security and integrity of their cloud-hosted applications.

Show More Details
Logo of Trend Vision One Cloud Security

Trend Vision One Cloud Security

By Trend Micro

4.5
(72 Ratings)

Trend Vision One Cloud Security software provides centralized security management and threat detection capabilities for cloud environments, supporting multiple cloud infrastructures and workloads. The software incorporates automated monitoring, compliance assessment, vulnerability scanning, malware detection, and identity protection features designed to help organizations safeguard cloud-based applications, data, and systems. It addresses the business need of reducing exposure to cyber threats and maintaining regulatory compliance through streamlined visibility, policy enforcement, and incident response across public, private, and hybrid cloud deployments. Trend Vision One Cloud Security software integrates with DevOps pipelines and delivers analytics to support proactive risk management and operational efficiency within cloud ecosystems.

Show More Details
Logo of Singularity Cloud Security

Singularity Cloud Security

By SentinelOne

4.5
(54 Ratings)

Singularity Cloud Security is a software designed to provide comprehensive protection for cloud environments, focusing on threat detection, compliance monitoring, and vulnerability management. The software enables organizations to identify risks within workloads, containers, and cloud-native applications, helping address security gaps across multi-cloud and hybrid deployments. Singularity Cloud Security offers features that include real-time visibility into cloud assets, automated correlation of security findings, and integration with existing security tools. The software assists businesses in meeting regulatory requirements by continuously assessing security configurations and providing actionable insights to remediate identified issues, supporting safer operation of cloud infrastructure and applications.

Show More Details
Logo of Microsoft Defender for Cloud

Microsoft Defender for Cloud

By Microsoft

4.5
(43 Ratings)

Microsoft Defender for Cloud is a software that provides security management and threat protection for cloud-based and on-premises resources. It offers capabilities such as vulnerability assessment, security posture management, and continuous monitoring of workloads across different environments. The software helps organizations identify misconfigurations, strengthen the security of their infrastructure, and detect potential threats using analytics and intelligence tools. Microsoft Defender for Cloud supports protecting applications and data by providing recommendations for improving security and enabling automated responses to security incidents, addressing the need for unified security and compliance management across hybrid and multi-cloud environments.

Show More Details
Logo of AlgoSec Cloud Enterprise (ACE)

AlgoSec Cloud Enterprise (ACE)

By AlgoSec

4.3
(31 Ratings)

AlgoSec Cloud Enterprise (ACE) is a software designed to manage and automate network security policies across cloud, hybrid, and on-premise environments. The software provides visibility into security policies, application connectivity, and traffic flows, helping organizations streamline firewall management and ensure compliance with regulatory requirements. ACE enables users to analyze risks, simulate changes, and automate policy workflows, which reduces the chances of misconfigurations and security gaps. By unifying security policy management across different platforms, the software addresses the challenge of maintaining consistent security posture in complex and dynamic network infrastructures.

Show More Details
Logo of Tenable Cloud Security

Tenable Cloud Security

By Tenable

4.3
(24 Ratings)

Tenable Cloud Security (TCS) is an identity-intelligent, actionable cloud security platform that exposes and closes security gaps caused by misconfigurations, risky entitlements and vulnerabilities. Organizations use its intuitive, unifying UI to secure the full cloud stack, achieving visibility, prioritization and remediation across infrastructure, workloads, identities, data and AI resources. TCS pinpoints toxic combinations of risk most likely to be exploited. Users are enabled to take action, even if they have only 5 minutes, with guided remediations and code snippets that reduce MTTR. TCS is a comprehensive CNAPP solution; its wide-reaching capabilities also meet the criteria of specific cloud security domains. TCS is part of Tenable’s AI-powered exposure management platform, Tenable One.

Show More Details
Logo of Zscaler Posture Control

Zscaler Posture Control

By Zscaler

4.4
(13 Ratings)

Zscaler Posture Control is a software designed to help organizations manage and secure their cloud environments by providing visibility into cloud-native applications, identifying vulnerabilities, and ensuring compliance with security policies. The software offers capabilities such as continuous monitoring of configurations, detection of misconfigurations and potential threats, and automated remediation options. It enables security teams to manage risk across multiple cloud platforms, supports governance by enforcing security controls, and assists in maintaining regulatory compliance. Zscaler Posture Control helps address challenges related to securing workloads, managing access, and reducing possible attack surfaces in modern cloud infrastructures.

Show More Details
Logo of InsightCloudSec

InsightCloudSec

By Rapid7

4.7
(12 Ratings)

InsightCloudSec is a software designed to provide organizations with continuous security and compliance monitoring across public cloud environments. The software offers features such as automated discovery, policy enforcement, and real-time risk identification for cloud infrastructure. It enables users to detect misconfigurations, enforce governance policies, and maintain compliance with regulatory frameworks. By aggregating data from multiple cloud providers, InsightCloudSec helps organizations gain visibility into their cloud assets and activities, supporting security operations and reducing the risk of unauthorized access or data exposure. The software is used to address challenges related to cloud security management and to improve the oversight of complex multi-cloud deployments.

Show More Details
Logo of MatosSphere

MatosSphere

By CloudMatos

4.9
(7 Ratings)

MatosSphere is a software designed to enhance cloud security and operations by providing automated visibility, monitoring, and remediation across various cloud environments. It helps organizations identify misconfigurations, vulnerabilities, and compliance risks by analyzing cloud resources, policies, and settings. The software offers features such as real-time compliance checks, continuous security assessment, and risk prioritization to streamline cloud governance. MatosSphere also supports automated remediation workflows that enable efficient management and resolution of detected issues, assisting businesses in maintaining secure and compliant cloud infrastructures while reducing manual effort and operational overhead.

Show More Details
Logo of imPAC

imPAC

By imPAC Labs

5
(6 Ratings)

imPAC Labs is the cloud control plane for complex, multi-cloud environments which transforms clouds into a searchable model for Cloud Ops, Security and GRC teams.

Through agentless, read-only access, the platform captures every asset, configuration, and change across AWS, Azure, and GCP in one unified model.

Cloud engineers can instantly understand their entire asset inventory, track configuration history with built-in Time Machine, and complete projects like KMS key rotation or backup validation in minutes instead of weeks. Incident responders see exactly what changed without correlating fragmented logs.

Security teams cut alert noise by scoping detections to production workloads and sensitive data, evaluating findings against compensating controls, and enforcing consistent standards across accounts. Delivering true "Defense in Depth" by catching misconfigurations before they become incidents.

Show More Details
Logo of Orca Security

Orca Security

By Orca Security

4.5
(6 Ratings)

Orca Security is a software designed to provide comprehensive cloud security and compliance solutions across public cloud environments. The software offers features such as asset inventory, vulnerability management, threat detection, and risk assessment, enabling organizations to identify and prioritize security risks without agents. It integrates with major cloud platforms to deliver visibility into workloads, configurations, and data, supporting incident investigation and compliance reporting. Orca Security addresses challenges associated with securing complex cloud infrastructures by enabling users to detect misconfigurations, malware, and sensitive data exposure, contributing to improved security posture and regulatory compliance in cloud ecosystems.

Show More Details
Logo of Cyscale

Cyscale

By Cyscale

4.8
(4 Ratings)

Cyscale is a comprehensive cloud security platform designed to empower SMEs with the tools they need to mitigate risks and prevent threats. Our unified CNAPP platform offers real-time intelligence on cloud misconfigurations, vulnerabilities, identity and access management (IAM), and data security. With Cyscale, businesses can achieve strong cloud protection, ensuring compliance and protecting critical assets in an ever-evolving digital landscape.

Show More Details
Logo of Veza Access Control Platform

Veza Access Control Platform

By Veza

4.8
(4 Ratings)

Veza Access Control Platform is a software designed to enable organizations to manage and secure access rights across cloud and on-premises systems. The software provides features that help identify who has access to data, applications, and infrastructure, allowing for centralized visibility and governance of permissions. It works by mapping identities and permissions, helping organizations understand and control access to sensitive resources while supporting compliance requirements. By offering automated entitlement discovery and management, the software addresses business challenges related to least privilege enforcement, permission sprawl, and security risk reduction.

Show More Details
Logo of Sonrai Security

Sonrai Security

By Sonrai Security

4
(2 Ratings)

The Sonrai Cloud Permissions Firewall gets cloud access under control, reduces the permissions attack surface, and automates least privilege – all without impeding DevOps. The solution is built on permission usage intelligence that understands what your machines and humans need access to. Unused sensitive permissions are restricted with a global default deny policy. Unused services and regions are disabled and dormant identities are quarantined, leaving them useless to attackers. A permissions on-demand workflow provides access to restricted permissions through an automated chatops process. The Cloud Permissions Firewall allows you to secure with confidence, accelerate productivity, and save time. After achieving least privilege, shut down remaining attack paths with Sonrai’s CIEM+ solution. Use manual or automated remediation options to disrupt lateral movement opportunities created by toxic combinations of permissions.

Show More Details
Logo of Aikido Security

Aikido Security

By Aikido Security

5
(1 Rating)

Aikido is a developer-centric security platform that gives developers and security teams an instant overview of all code-to-cloud security issues and guides teams to fix vulnerabilities fast. Aikido supports security teams execute by aggressively reducing false-positives, automatic triage and risk bundling, and translating Common Vulnerabilities and Exposures (CVEs) into easy step-by-step explanations to resolve.

Described as an "all-in-one" application security platform, Aikido's covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source lisence scanning, cloud posture management (CSPM), runtime protection, and more.

Show More Details

Gartner Research

Gartner Peer Insights 'Voice of the Customer': Cloud Security Posture Management Tools

Top Trending Products

CrowdStrike Falcon Cloud SecurityimPACSysdig SecureIntruderSweet

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.