- Revenue
- $707M
- Customers
- 350K
- Year founded
- 2012
- Funding
- $1B
- Team size
- 3.1K
- Growth
- 17.83%
Top 41 Cloud Access Security Broker (CASB) Software SaaS Companies in May 2026
As of May 2026, there are 41 SaaS companies in Cloud Access Security Broker (CASB) Software. They have combined revenues of $1B and employ 6K people. They have raised $1.3B and serve 1M customers combined.
Cloud Access Security Broker (CASB) Software is a critical cybersecurity solution that acts as a mediator between an organization’s on-premises infrastructure and cloud service providers. It provides visibility, data security, and compliance capabilities, enabling organizations to secure their cloud applications effectively while maintaining control over access and data usage. The primary use cases for CASB software include monitoring and managing access to sensitive data in cloud-based applications, enforcing security policies such as data loss prevention, and ensuring compliance with industry regulations. CASB solutions typically offer a range of features, including identity and access management, threat protection, data encryption, and activity monitoring. These tools facilitate the identification of unauthorized applications, also known as shadow IT, and allow businesses to govern their cloud usage based on user identity and roles. Common buyer personas include IT security professionals, compliance officers, and risk management teams, all of whom benefit from the enhanced visibility and control that CASB solutions provide in safeguarding cloud environments.
Filters
Sorting: Highest -> Lowest
Top Cloud Access Security Broker (CASB) Software Companies
Showing 10 of 2 companies ranked by annual revenue.

United States
Fox Technologies is a global security company that helps organizations centralize Linux access management across hybrid IT environments.
- Revenue
- $191.3M
- Customers
- -
- Year founded
- 2001
- Funding
- $5M
- Team size
- 1.7K
- Growth
- -
Inclusion Criteria
- Must provide visibility into all cloud application usage and user activities. - Must enforce security policies such as data loss prevention (DLP) and access management. - Must enable compliance with applicable regulations and industry standards. - Must offer risk assessment features to identify and mitigate threats in real-time. - Not just a traditional firewall; must also address specific cloud security challenges. - Should integrate effectively with an organization’s existing security infrastructure.
