Security as a services is a cloud-based model, whwrein security vendors secure and maintain the enterprise network, application, and data over the cloud and on-premises environment. It is a security management approach, which enables the provision of security solutions and services from the cloud. The security services are with the enterprise infrastructure safeguarding enterprises' essential assets from external and internal threats. Security as a service is an outsourcing service, which benefits an organization in a number of ways, such as reduced costs, ease of IT security, scalable security services, and continuous support. It enables organizations to access and implement robust security practices.

PROGRESSIVE COMPANIES

These companies performed exceptionally well in both product excellence and business excellence parameters. They have an extensive partner ecosystem and advanced marketing channels. These organizations also received huge funding for the expansion of their product portfolio. These companies have been active in achieving their growth prospects, thereby have accomplished high partner attractiveness. StackPath, GajShield, Armor, InstaSafe, CloudCodes, and LookingGlass Cyber Solutions have been recognized as the progressive companies in the security as a service market.

RESPONSIVE COMPANIES

These start-ups are technology disruptors with highly innovative product offerings as compared to their competitors. These companies constantly focus on the development of product/service portfolio and bringing new innovations in the market. However, they lag in business excellence parameter as compared to other start-ups. With suitable marketing activities, opportune partnerships, and VC funding these start-ups would be known as responsive companies. Bitglass, Netsecurity AS, Atomic Data, Choice Cybersecurity, and CloudAccess have been recognized as the responsive companies in the security as a service market.

DYNAMIC COMPANIES

These start-ups have performed exceptionally well in the business excellence parameter. However, they are somewhat low in product excellence as compared to progressive and responsive companies. They generally focus on specific type of technology related to the product or service offerings. Airloom and Aqueduct Technologies are recognized as the dynamic companies in the security as a service market.

STARTING BLOCKS

These are start-ups with niche offerings and starting to gain their position in the market. They do not have much stronger business excellence and product excellence as compared to other established start-ups. These organizations might be new entrants in the market and require some more time before it gets significant traction in the market. Cloudbric, Obrela, Coronet, UnitedLayer, Concordus Applications, and Kisi are recognized as the starting blocks in the security as a service market.

TOP VENDORS
In Security as a Service Startups

  1. STACKPATH
    Reviews
    2.5
  2. ARMOR
    Reviews
    2.5
  3. GAJSHIELD INFOTECH
    Reviews
    2.4

Security as a Service Startups Quadrant

Comparing 53 vendors in Security as a Service Startups across 152 criteria.

Find the best Security as a Service Startups solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Security as a Service Startups tools.
Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support
3.70
2.45
3.70
Features and Functionality
3.25
3.15
3.30
Deployment
3.70
5.00
2.45
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • All network traffic through StackPath, including traffic on global private networks, is encrypted by both IPSec and TLS standards. Its automated platform executes regular ping sweeps as well as port and vulnerability scans to detect unauthorized usage of protocols, ports, and services across IT infrastructure. Every StackPath service provides extensive configuration management options for establishing authentication.

    BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Startup
    • Texas, US
    • Founded: 2015
    • $11MN to $50MN
    • 101 to 500
  • Armor Anywhere protects users against threats by using the Armor suite of advanced security technology—supported by a security operations center (SOC) that provides round-the-clock surveillance.Armor Complete goes beyond alerts and blocks 99.999 percent of all malicious security events. It holds a 4 percent false-positive rate in an industry that considers 30 to 40 percent exceptional and reduces the dwell time of threat actors from days (industry average) to minutes.

    BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Startup
    • Texas, USA
    • Founded: 2009
    • $51MN to $100MN
    • 101 to 500
  • GajShield allows organizations to decrypt SSL traffic to detect and block hidden malicious content as well as sensitive outgoing information. Its solutions protect clients from known threats by using heuristic and signature technologies. GajShield provides intricate oversight with speeds matching those of other competitive solutions, ensuring comprehensive protection without latency.

    BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Startup
    • Maharashtra, India
    • Founded: 2002
    • Below $10 MN
    • 501 to 1,000
  • The CloudCodes CASB (Cloud Access Security Broker) dashboard enables IT departments to set up Data Loss Prevention policies for their cloud computing activities. Through CloudCodes SSO, users gain access to all enterprise devices and apps by entering a single username and password.

    BUYERS
    VENDORS
    EXPERTS
    2.2
    ANALYSTS
     
    • Startup
    • Maharashtra, India
    • Founded: 2011
    • Below $10 MN
    • 1 to 50
  • Solutions from InstaSafe enforce stringent cybersecurity inside and outside office premises. The company offers simplified multifactor authentication, a single-pane view with detailed reporting, and the freedom to use any device without compromising on security.

    BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • Startup
    • Karnataka, India
    • Founded: 2012
    • Below $10 MN
    • 1 to 50
  • scoutTHREAT offers e-mail and machine-to-machine STIX-based reporting to commercial, government, and community partners in order to share actionable information without manual conversion. It is a secure platform that allows authorized users to access specific case details based on predefined roles.scoutPRIME provides automated collection, correlation, and reporting of threat intelligence, allowing cybersecurity staff to engage in higher-value activities.scoutSHIELD eliminates the need to maintain long-term policies and avoids the complexity around changing rule sets by using automated rule sets derived from industry-standard LookingGlass threat intelligence.

    BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • Startup
    • Virginia, USA
    • Founded: 2006
    • $51MN to $100MN
    • 51 to 100
  • Bitglass enables data security on any device without agents for managed applications. Their cloud access security broker (CASB) solution protects data end-to-end, from any cloud app to any device. Enforce access controls, limit sharing, protect against malware, avoid data leakage, and more. Bitglass Zero-day Unmanaged App Control enables discovery, blocking, and coaching of new and unknown cloud applications. Bitglass Next-Gen CASB with Zero-day Threat Protection, powered by Cylance, combines the best of traditional signature-based malware scanning with advanced Zero-day threat protection to thwart known and unknown attacks.

    BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Startup
    • Campbell, California, US
    • Founded: 2013
    • $50BN to $100BN
    • 101 to 500
  • Choice's security solutions offers internal & external vulnerability scans, which reveal holes and exploits in the user's perimeter and systems that make it possible for an outsider to access your network. It offers dark web scan which helps in identifying any stolen credentials on illegal, black-market sites as well as private and public networks and forums.

    BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Startup
    • MAryland, USA
    • Founded: 2016
    • 1 to 50
  • Their security assement report provides: Applications in use, and the potential risks to exposure, specific details on ways adversaries are attempting to breach your network and Key areas to focus upon for reducing the organisation’s risk exposure. Netsecurity Security Operations (NSOC) receives, analyses and stores security and traffic information from different sources at the customer.

    BUYERS
    VENDORS
    EXPERTS
    1.9
    ANALYSTS
     
    • Startup
    • Oslo, Norway
    • Founded: 2009
    • 1 to 50
  • Users once backing up to DVDs, external hard drives, or another computer now have the option to automatically send to and store their data in secure, encrypted redundant, enterprise class off site data centers designed specifically to keep the data safe. CrashPlan offers exactly that. Kaseya Monitoring offers proactive monitoring of servers, workstations, remote computers, Windows Event Logs and applications is critical to security, network performance and the overall operations of the organization. Kaseya provides the tools and infrastructure to enforce policies and to easily address the complexities of software and security patch deployment. Kaseya Patch Management automatically keep servers, workstations and remote computers up-to-date with the latest important security patches and software updates.

    BUYERS
    VENDORS
    EXPERTS
    1.8
    ANALYSTS
     
    • Startup
    • Minneapolis, USA
    • Founded: 2001
    • $11MN to $50MN
    • 51 to 100
  • Airloom's cloud access security brokers (CASBs) provide information security professionals with a critical control point for the secure and compliant use of cloud services across multiple cloud providers. Many SaaS apps have limited visibility and control options, however SaaS adoption is becoming pervasive in enterprises, which exacerbates the frustration of security teams looking for visibility and control. CASB solutions fill many of the gaps in individual cloud services and allow enterprise security teams to simultaneously have control across a growing set of cloud services.

    BUYERS
    VENDORS
    EXPERTS
    1.8
    ANALYSTS
     
    • Startup
    • NSW, Australia
    • Founded: 2000
    • 1 to 50
  • Aqueduct's security as a service has unique features which offer a lot of benefits to the users. These include: Deep security insights: - Threat visibility across application stack - Security content mapped to the stages of an attack - Continuously updated threat intelligence and security content - Continuous protection: 24×7 security monitoring - Expert-assisted remediation - Quick incident response - Lower total cost: Pay-as-you-go pricing model - No 24×7 staffing required - No expensive software licenses, maintenance or hardware to purchase

    BUYERS
    VENDORS
    EXPERTS
    1.7
    ANALYSTS
     
    • Startup
    • Massachusetts, USA
    • Founded: 2011
    • S10BN to $50BN
    • 51 to 100
  • CloudSOC can address the needs of an expanded group of network sizes. The hierarchical architecture of CloudAccess SIEM engines, CloudAccess Log Management (CloudLogger) forensic archives, and the CloudAccess Sensors allow seamless communication over encrypted connections to address even the largest and most complex networks. The true and unique value of REACT is it works with existing security tool investments and can add the necessary solutions to close the circle. So, if an organization already has an investment (for example Identity Management), REACT leverages the investment with the other modules.

    BUYERS
    VENDORS
    EXPERTS
    1.6
    ANALYSTS
     
    • Startup
    • Michigan, USA
    • Founded: 2011
    • $11MN to $50MN
    • 1 to 50
  • Obrela exposure management assesses IT components by leveraging long-term agreements that provide for annualized professional testing services. Pricing is flexible and is based on the depth, scope, and frequency of testing. Obrela risk management services make use of SWORDFISH to reduce development and deployment times for cybersecurity programs, improve context and content dissemination, and lower cybersecurity OPEX. Obrela threat management services consist of threat intelligence, threat analytics, threat detection, and threat prevention solutions that leverage shared and extensible core services and a highly scalable multi-tenant cloud infrastructure.

    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • Startup
    • London, United Kingdom
    • Founded: 2003
    • 1 to 50
  • Their Security-as-a-Service Offering enables users to comply with industry regulations such as PCI-DSS, SOX COBIT and GDPR. As part of their standard service Infinity Gate provides a web facing portal from where the users can schedule an unlimited number of scans of their IP addresses. Continuous Vulnerability Protection provides a set of standard vulnerability assessment reports that can be accessed from a secure portal via any major web browser. CyberFoundry provides the key elements to identify network threats so you can respond quickly: Highly trained security experts, they collect and monitor real-time activity in the user's network and computing environment and vulnerability scanning and reporting.

    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • Startup
    • Gjøvik, Norway
    • Founded: 2014
    • 1 to 50
  • Kisi Access Control allows users to manage doors, share and revoke access, and see door events in real time. This solution can be configured through the cloud. The Kisi Controller is tamperproof and supports cloud-based configuration.

    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • Startup
    • New York, USA
    • Founded: 2014
    • Below $10 MN
    • 1 to 50
  • Cloudbric solutions are powered by logical analysis technology and are renowned for maintaining a consistently low false-positive rate.

    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • Startup
    • Seoul, South Korea
    • Founded: 2017
    • 1 to 50
  • UnitedLayer security solutions provide DoS/DDoS detection and prevention and standard TCP/UDP port filtering on networks and firewalls. Its SIEM solutions offer advanced monitoring and alerting capabilities—in the event that suspicious activity is identified on the network, UnitedLayer will quickly alert the client within the operational service level agreement (OSLA).

    BUYERS
    VENDORS
    EXPERTS
    1.4
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2001
    • Below $10 MN
    • 1 to 50
  • Solutions from Concordus have the following unique features: - On-demand compliance with corporate governance, risk, and compliance guidelines - Document management capabilities - Advanced integration - Advanced analytics - Audit trails - Single comprehensive package

    BUYERS
    VENDORS
    EXPERTS
    1.3
    ANALYSTS
     
    • Startup
    • Sacramento, USA
    • Founded: 2012
    • 1 to 50
  • Coronet Access Control allows users to exercise control over anything that tries to access their data and services. It offers full visibility into the security of user services and works with all popular SaaS applications. The secure analysis of its application code is based on the OWASP 10 and compliance objectives such as PCI, SSAE18 SOC1/2, and FISMA/FedRAMP.

    BUYERS
    VENDORS
    EXPERTS
    1.3
    ANALYSTS
     
    • Startup
    • Tel Aviv, Israel
    • Founded: 2013
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2009
    • Below $10 MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2012
    • Below $10 MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Greater San Diego Area, USA
    • Founded: 2013
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2011
    • $11MN to $50MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • England, UK
    • Founded: 2016
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • New York, USA
    • Founded: 2016
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Tel Aviv, Israel
    • Founded: 2015
    • Below $10 MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2011
    • $101MN to $500MN
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • SME
    • Massachusetts, USA
    • Founded: 1999
    • $101MN to $500MN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Massachusetts, USA
    • Founded: 2012
    • $51MN to $100MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • SME
    • California, USA
    • Founded: 2013
    • $11MN to $50MN
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2015
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • San Francisco Bay Area, USA
    • Founded: 2011
    • $11MN to $50MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • East Coast, England
    • Founded: 2017
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2013
    • $11MN to $50MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2013
    • $50BN to $100BN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Tsuen Wan, Hong Kong
    • Founded: 2008
    • $50BN to $100BN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2017
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • New York, USA
    • Founded: 2016
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • San Francisco Bay Area, USA
    • Founded: 2015
    • Below $10 MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2011
    • S10BN to $50BN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • New York, USA
    • Founded: 2012
    • $50BN to $100BN
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Texas, USA
    • Founded: 2013
    • $50BN to $100BN
    • 101 to 500
  • StrataCore SECaaS protects data and applications on-premises, in the cloud, and in hybrid environments across multiple layers - network, system and web application. It offers managed threat detection and response with 24x7 SOC monitoring and rapid notification by security experts. The company provides rapid deployment - experts who manage deployment, configuration, tuning and training, so the solution is active quickly. Their solutions also prioritize remediation steps in an effective plan based on the user's company specific goals, budgets and timelines. StrataCore works with experienced security consulting partners that have CISO experience in an array of indutries. These leaders can guide security staff with and help the company navigate the complexities of selecting the right information security technologies, processes, and strategies.

    BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Washington, USA
    • Founded: 2003
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Punjab, India
    • Founded: 2013
    • Below $10 MN
    • 101 to 500
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • California, USA
    • Founded: 2016
    • Below $10 MN
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Herzliya, Israel
    • Founded: 2018
    • Below $10 MN
    • 1 to 50
  • Blockmail service continuously monitors email traffic immediately blocking spam, and any emails containing viruses. The filtering takes place on multiple levels, with layers of security and a vast range of checks carried out on all inbound and outbound emails. FileXchange offers full visibility and tracking and allows a logged in user to view all audit log entries associated with their account and files uploaded by this account, including when and from where (IP Address) a file was downloaded.

    BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • Dublin, Ireland
    • Founded: 2002
    • 1 to 50
  • Twin Networks places the highest priority on computer and network security. Our data security solutions prevent malicious viruses and unwanted intrusions into your networks and servers, and safeguards against the theft of vital information. We also educate you on relevant security regulations and practices so that you can be in control of your data. Our security services give you peace of mind that your computers and systems are yours and yours alone.

    BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Startup
    • England, UK
    • Founded: 2006
    • Below $10 MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    ANALYSTS
     
    • Enterprise
    • California, USA
    • Founded: 2014
    • Below $10 MN
    • 101 to 500

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

TOP REVIEWS

Looking for Security as a Service Startups? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.