Loading...

Upwind Cloud Runtime Visibility is a commercial Cloud-Native Application Protection Platform tool developed by Upwind. Security professionals most commonly compare it with Orca Security Platform. All 82 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Upwind Cloud Runtime Visibility, including their key features and shared capabilities.
Command your cloud with Orca to Identify, Prioritize, and Remediate risks
Agentless cloud workload protection for VMs, containers, and Kubernetes
Cloud-native app security platform covering code to cloud with SAST, SCA, IaC
Runtime CNAPP + CADR platform unifying app-layer threat detection and response.
Shares 3 capabilities with Upwind Cloud Runtime Visibility: Cloud Native, Runtime Security, Visibility
CNAPP providing unified cloud security posture, workload, and app protection.
Shares 3 capabilities with Upwind Cloud Runtime Visibility: Cloud Native, Attack Paths, Visibility
A cloud security platform that combines Kubernetes security scanning, runtime monitoring, and cloud security posture management using Kubescape and eBPF technology.
CNAPP providing CSPM and workload protection across multicloud environments.
Runtime CNAPP with AI-powered cloud and AI stack security platform
Command your cloud with Orca to Identify, Prioritize, and Remediate risks
Agentless cloud workload protection for VMs, containers, and Kubernetes
Cloud-native app security platform covering code to cloud with SAST, SCA, IaC
Runtime CNAPP + CADR platform unifying app-layer threat detection and response.
CNAPP providing unified cloud security posture, workload, and app protection.
A cloud security platform that combines Kubernetes security scanning, runtime monitoring, and cloud security posture management using Kubescape and eBPF technology.
CNAPP providing CSPM and workload protection across multicloud environments.
Runtime CNAPP with AI-powered cloud and AI stack security platform
Cloud-native security platform with runtime insights and AI-driven analysis
Cloud workload protection platform securing apps, data, and infrastructure
AWS cloud security scanner that unifies findings into a graph-based attack path view.
AI-driven cloud-native security platform for runtime threat detection
Cloud-Native Application Protection Platform for vulnerability & runtime security
CNAPP for runtime threat detection and protection in cloud environments
AI-powered CNAPP for AppSec, CloudSec, and AISec with zero-trust runtime security.
Cloud-native app security platform with discovery, testing, and runtime protection
Unified CNAPP for multi-cloud security, compliance, and threat detection
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
CNAPP for multi-cloud and hybrid cloud security with risk prioritization
CNAPP platform for multi-cloud security with risk mgmt and threat detection
Unified cloud security platform with Zero Trust protection for multi-cloud
CNAPP providing security from code to cloud for cloud native and AI apps
VM security for cloud environments with compliance, runtime protection & monitoring
Runtime workload protection for cloud and containerized environments
Cloud security platform with CSPM, CIEM, vulnerability mgmt, and compliance
CNAPP for multi-cloud security, compliance, and workload protection
CNAPP providing cloud security across application lifecycle with runtime insights
Cloud-native application protection platform for cloud security lifecycle
Enterprise platform for Kubernetes networking, security, and observability
Universal networking layer for Kubernetes, VMs, and servers across environments
Unified CNAPP consolidating CSPM, CIEM, and CWPP for multi-cloud security.
AI-native runtime security platform for edge, GPU & Kubernetes workloads.
Proactive cloud security platform built for cloud-native architectures.
Cloud security suite for auto-detecting and remediating misconfigs across multi-cloud.
Cloud asset discovery & threat detection with continuous monitoring & CI/CD integration.
AWS cloud security platform for misconfiguration discovery, IAM mgmt & compliance.
Unified CNAPP for cloud security across infra, apps, data, and identities.
CNAPP for securing cloud native apps from code to runtime across multi-cloud
Full-stack edge compute platform with AI-ready performance and security
Cloud workload protection platform for hybrid cloud environments
Unified cloud platform integrating cloud, edge, AI, data, and security services
CNAPP with eBPF sensors for runtime detection & response across cloud environments
AI infrastructure security platform for discovering, securing, and governing AI agents
Code to cloud security platform for app lifecycle protection
CNAPP for hybrid and multi-cloud security with real-time monitoring
Cloud-native application protection platform with unified security
Cloud-native application protection platform for multi-cloud security & compliance
Multi-cloud security platform for workloads, identities, and compliance
Unified security platform for code, CI/CD, and cloud environments
Agentless cloud security platform for risk detection & prevention
Cloud workload protection platform for containers, Kubernetes, and serverless
Kubernetes and cloud monitoring platform with managed Prometheus service
Alibaba Cloud CNAPP offering CWPP, CSPM, CIEM, SIEM, and SOAR for cloud workloads.
CNAPP for securing cloud-native apps with CSPM, DLP, and threat protection
Open-source CNAPP for vuln, malware, secrets, & compliance scanning w/ ThreatGraph
Cloud security platform with CDR, CNAPP, and CSPM for multi-cloud environments
AWS-native malware scanning & data classification for S3 and other AWS storage.
Integrates CSPM with CI/CD and app-layer context, linking risks to product teams.
Hybrid cloud security platform with workload and network protection
AI-powered CNAPP combining SAST, DAST, API, SCA, CSPM, CWPP, and CIEM capabilities
Cloud security platform for threat prevention across apps, networks, workloads
Real-time cloud workload protection for VMs, containers, K8s & serverless
Cloud and server security for hybrid and multi-cloud workload protection
Antimalware security solution for AWS cloud workloads via GravityZone
Runtime protection for containers, K8s, serverless, and VMs in cloud environments
Confidential computing platform for running apps in secure enclaves.
Malware scanning solution for Azure Blob Storage with in-tenant detection.
Multi-tenant cloud security platform for MSSPs across AWS, Azure, and GCP.
Hyper-converged infrastructure solution for virtualization and cloud computing
Enterprise cloud security platform for endpoint, network, email & data protection
Cloud security platform with AI teammate for AWS, Azure, GCP & Kubernetes
Runtime security for physical, virtual, cloud, and container workloads
Cloud security platform for protecting workloads and data in cloud environments
Security solution for KVM hypervisor in tactical virtualization environments
Confidential computing platform for building secure, privacy-preserving applications.
Confidential computing platform deploying apps to secure enclaves, no code changes needed.
Secures cloud servers from APTs, malicious hardware, and insider threats.
Cloud platform offering scalable infrastructure, backup, and DevSecOps testing.
In-tenant malware scanning for AWS, Azure & GCP object storage.
Antivirus & data classification for files transferred into AWS S3/EFS via Transfer Family.
Hardware-based confidential VMs for secure, isolated cloud workloads.
HAWK is a multi-cloud antivirus scanning API that uses CLAMAV and YARA engines to detect malware in AWS S3, Azure Blob Storage, and GCP Cloud Storage objects.
Common questions security professionals ask when evaluating alternatives and competitors to Upwind Cloud Runtime Visibility.
The most popular alternatives to Upwind Cloud Runtime Visibility include Orca Security Platform, Orca Security CWPP, Orca Security Application Security, RoonCyber Runtime CNAPP + CADR, and Native Security Platform. These Cloud-Native Application Protection Platform tools offer similar capabilities and are frequently compared by security professionals evaluating their options.