
🔐 Cloud Security Tools
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Palo Alto Prisma Cloud | Cloud security posture management (CSPM); workload protection; container security | Custom Pricing | prismacloud.io | 
| Check Point CloudGuard | Cloud-native security; threat prevention; security posture management | Custom Pricing | checkpoint.com | 
| Trend Micro Cloud One | Cloud security services; file storage security; workload security; container security | Starts at $1/hour for workloads | trendmicro.com | 
| Lacework | Automated security & compliance for cloud accounts, workloads, and containers | Custom Pricing | lacework.com | 
| AWS Security Hub | Centralized security posture management for AWS; automated compliance checks | Pay as you go (free for first 10,000 security checks/month) | aws.amazon.com/security-hub | 
⚙️ Compliance Management Tools
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Drata | Automated SOC 2, ISO 27001, HIPAA, GDPR compliance; real-time monitoring | Starts at $7,500/year | drata.com | 
| Vanta | SOC 2, ISO 27001, HIPAA, PCI, GDPR automation; continuous monitoring; evidence collection | Starts at $5,000/year | vanta.com | 
| Secureframe | Automate compliance for SOC 2, ISO 27001, HIPAA, GDPR, PCI DSS | Starts at $10,000/year | secureframe.com | 
| Sprinto | Compliance automation for SOC 2, ISO 27001, GDPR, HIPAA; continuous risk assessment | Custom Pricing | sprinto.com | 
| LogicGate | GRC platform; automate risk management; policy and compliance workflows | Custom Pricing | logicgate.com | 
🕵️ Identity & Access Management (IAM)
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Okta | IAM, SSO, MFA; user lifecycle management; adaptive authentication | Free trial / Custom Pricing | okta.com | 
| Auth0 | Identity management; social login; MFA; B2B/B2C authentication | Free / Paid plans start at $23/mo | auth0.com | 
| AWS IAM | Manage AWS user permissions and credentials; policy enforcement | Free (pay for resources used) | aws.amazon.com/iam | 
| OneLogin | Unified access management; SSO; MFA; user provisioning and deprovisioning | Free trial / Starts at $2/user/mo | onelogin.com | 
| JumpCloud | Directory-as-a-service; SSO; device management; IAM for remote teams | Free / Starts at $2/user/mo | jumpcloud.com | 
🛡️ Web Application Firewall (WAF)
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Cloudflare WAF | DDoS protection; OWASP top 10 protection; bot mitigation; rate limiting | Free (basic) / Paid from $20/mo | cloudflare.com | 
| AWS WAF | Protect apps on AWS; custom rules; bot control | Pay-as-you-go (starts at $5 per rule) | aws.amazon.com/waf | 
| Imperva WAF | API and app protection; bot mitigation; DDoS protection; CDN | Custom Pricing | imperva.com | 
| Akamai Kona Site Defender | DDoS mitigation; API security; WAF; advanced bot detection | Custom Pricing | akamai.com | 
| Barracuda WAF | App security; API protection; DDoS protection; bot mitigation | Starts at $1,239/year | barracuda.com | 
🛠️ Vulnerability Scanning Tools
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Nessus (Tenable) | Vulnerability assessment; configuration auditing; compliance checks | Free (Essentials) / Pro starts at $3,390/year | tenable.com | 
| Qualys Vulnerability Management | Cloud-based vulnerability scanning and patching; compliance reporting | Custom Pricing | qualys.com | 
| OpenVAS (Greenbone) | Open-source vulnerability scanning; network-based vulnerability tests | Free / Enterprise options | greenbone.net | 
| Rapid7 InsightVM | Live vulnerability management; real-time monitoring; integrations with CI/CD tools | Custom Pricing | rapid7.com | 
| Acunetix | Automated web vulnerability scanner; detects SQLi, XSS, and over 7,000 vulnerabilities | Starts at $4,500/year | acunetix.com | 
🔎 Security Information and Event Management (SIEM)
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Splunk Enterprise Security | Real-time threat detection; advanced analytics; incident response workflows | Starts at $2,000/year (based on data ingested) | splunk.com | 
| IBM QRadar | Threat intelligence; real-time analytics; automated response | Custom Pricing | ibm.com | 
| Azure Sentinel | Cloud-native SIEM; AI analytics; security orchestration and automation | Pay-as-you-go (starts at $2.46/GB) | azure.microsoft.com | 
| LogRhythm | Log management; threat intelligence; user behavior analytics | Custom Pricing | logrhythm.com | 
| Securonix | Cloud-native SIEM; UEBA; SOAR integrations; threat detection and hunting | Custom Pricing | securonix.com | 
🕷️ Penetration Testing & Ethical Hacking Tools
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| Burp Suite | Web vulnerability scanner; penetration testing; security auditing | Free (Community) / Pro starts at $449/user/year | portswigger.net | 
| Metasploit | Penetration testing framework; exploit development; security testing | Free / Pro starts at $2,000/year | rapid7.com | 
| OWASP ZAP | Open-source web app security scanner; automatic and manual testing tools | Free | owasp.org | 
| Nmap | Network scanning and host discovery; security auditing; OS detection | Free / Open Source | nmap.org | 
| Cobalt.io | Pentest as a Service (PtaaS); access to vetted ethical hackers; vulnerability management | Custom Pricing | cobalt.io | 
🔐 Encryption & Data Protection Tools
| Tool | Features | Pricing | Link | 
|---|---|---|---|
| VeraCrypt | Open-source disk encryption; supports standard and hidden volumes | Free | veracrypt.fr | 
| BitLocker | Full-disk encryption for Windows; integrates with Active Directory | Included with Windows Pro/Enterprise | microsoft.com | 
| Symantec Encryption | Endpoint, email, and file encryption; data loss prevention (DLP) | Custom Pricing | broadcom.com | 
| AxCrypt | File encryption; secure file sharing; cloud storage integration | Free / Premium from $3.75/mo | axcrypt.net | 
| NordLocker | Secure file storage and encryption; zero-knowledge encryption | Free (up to 3GB) / Paid starts at $7.99/mo | nordlocker.com | 
📝 Summary of Categories
| Category | Description | 
|---|---|
| Cloud Security Tools | Protect workloads, storage, and cloud infrastructure | 
| Compliance Management | Automate regulatory compliance and risk management | 
| IAM Tools | Manage user identity, access, and authentication | 
| Web Application Firewalls | Protect web apps from OWASP Top 10 and DDoS attacks | 
| Vulnerability Scanners | Assess system vulnerabilities and compliance risks | 
| SIEM Solutions | Monitor and analyze security events and incidents | 
| Penetration Testing | Tools for ethical hacking and security assessment | 
| Encryption & Data Protection | Secure data in transit and at rest | 
 
 