Best Government Cloud Access Security Brokers (CASB) - Page 2

Compare the Top Government Cloud Access Security Brokers (CASB) as of November 2025 - Page 2

  • 1
    SaaS Security by Palo Alto Networks
    SaaS Security is the industry’s leading solution powered by Precision AI®, designed to safeguard SaaS applications and data in today’s AI-driven landscape. It addresses critical challenges like shadow IT, misconfigurations, sprawling data, and insider threats targeting SaaS environments. The platform automatically discovers, categorizes, and controls both traditional SaaS and generative AI applications, providing comprehensive visibility across complex AI ecosystems. SaaS Security includes AI Access Security to monitor sanctioned and shadow AI apps, preventing sensitive data leakage and ensuring workforce protection. With multimodal, AI-augmented data loss prevention, it delivers near-perfect accuracy while minimizing false positives. Proactive risk mitigation and Precision AI-driven threat prevention stop known and unknown attacks instantly, all managed through a unified cloud platform.
  • 2
    CloudCodes

    CloudCodes

    CloudCodes

    CloudCodes is a cloud security solution provider founded in 2011. We focus on providing cloud security solutions to enterprise customers through its single sign-on solution. Our objective is to provide a simple, effective, and efficient platform for securing cloud applications for an enterprise. CloudCodes offers integrated solutions and efficient control over your data. We are also recognized by analyst firm Gartner as one of the sample vendors for Cloud Security and SaaS Security. CloudCodes supports and endorses data governance to enterprises on any device. Our cloud security applications namely G suite, Office 365, Slack, Jira, and many others will ensure the protection of sensitive business data, prevent online attacks, and take necessary actions against cyber threats and data loss. Allowing control over access to data and formulate efficient governance policies for the user. Access Control can regulate and monitor permissions to business data by formulating policies.
    Starting Price: $8.00/year/user
  • 3
    SonicWall Cloud App Security
    Next-Gen Security for Office 365, G Suite and Other SaaS apps. SonicWall Cloud App Security offers next-gen security for your users and data within cloud applications, including email, messaging, file sharing and file storage. For organizations adopting SaaS applications, SonicWall Cloud App Security delivers best-in-class security and a seamless user experience. Get visibility, data security, advanced threat protection and compliance for cloud usage. Stop targeted phishing, impersonation and account takeover attacks in Office 365 and G Suite. Identify breaches and security gaps by analyzing real time and historical events. Deliver the best user experience with out-of-band traffic analysis through APIs and log collection.
  • 4
    Forcepoint CASB
    Give your company the full potential of the cloud. But don't let it cost you the control of your data. Now a Cloud Access Security Broker solution can support any cloud app, managed or unmanaged, securely. Forcepoint CASB works with IdP like Ping and Okta. Segments you’ve already built can be re-used with CASB. Don’t have IdP yet? CASB works like an IdP allowing your team to easily add apps and control individual access to apps. The simple interface is easy for employees to use too. Shadow IT puts data outside of your control. Quickly identify managed and unmanaged cloud apps in real-time using your web proxy and firewall logs. Detect stolen credentials sooner with a patent-pending Zero Trust Impossible Travel which shows individual device method, location, and time of day. Data moves up to the cloud, down from it, and from cloud to cloud. Protect data in motion or at rest. Block data in transit, encrypt or mask it, redact it, or watermark it to track sensitive data.
  • 5
    CloudSOC CASB
    Security without compromise: the broadest, deepest protection for the public cloud. Stay secure and compliant when using sanctioned and unsanctioned cloud apps and services on SaaS, PaaS, and IaaS platforms. Get unequaled cloud app security with the deepest visibility, tightest data security, and strongest threat protection from the CASB. Gain visibility into shadow IT, apply governance over cloud data, protect against threats, and more easily ensure compliance. Take advantage of automated cloud-activity intelligence and machine learning to automatically trigger policy responses, create at-a-glance risk diagnoses, free up IT resources, and make sure your organization uses only cloud services that meet your security and compliance requirements. Surveil and analyze thousands of server-side and mobile cloud apps. Monitoring, data governance, threat protection, and policy controls for sanctioned and unsanctioned cloud accounts.
  • 6
    SecureIdentity CASB
    SecureIdentity CASB provides additional layers of security between your users as they embrace cloud based applications and services. Allowing organisations to understand the associated risks and what controls are required to allow a safe adoption of cloud. At SecurEnvoy, we create all our solutions to help you keep your business secure. We provide trusted identity and access management solutions to millions of users in real-time. Across five continents, our customers benefit from rapid deployments that scale through instant provision, simplicity of use and ease of management. The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time.
  • 7
    Jellyfish

    Jellyfish

    Cogito Group

    Jellyfish has been developed as a modular solution. We have significantly improved the way identity, credentials, access and other security products are managed by developing a series of connectors (Cognectors). These connectors enable the creation of automatic workflows, pass data through disparate systems and use triggers on one platform (example PACS) to affect another (example LACS). The Cognectors feed data from disparate systems into the Service Bus. This enables a number of benefits including enhanced monitoring and reporting of activity. Access to systems and building areas can seamlessly be added and removed as people join, move within, or leave an organisation through existing HR functions. Jellyfish uses modern authentication protocols and adaptive support to provide integration with logical and physical access control systems. Jellyfish focuses on future-proofing security, using emerging standards and multi-factor authentication.