Latka logo

Top 7 Cloud Edge Security Software SaaS Companies in May 2026

As of May 2026, there are 7 SaaS companies in Cloud Edge Security Software. They have combined revenues of $31.4M and employ 328 people. They have raised $42.5M and serve - customers combined.

Cloud Edge Security Software encompasses solutions designed to protect data and applications as they move between a user's device and the cloud. This category of software is tailored for organizations that use multiple cloud services and need to secure their data from a variety of threats, including unauthorized access, data breaches, and malware. Key features typically include real-time threat detection, access control, encryption, and data loss prevention, tailored specifically to support the unique environments presented by cloud interactions. The primary use cases for Cloud Edge Security Software include securing remote workforces, safeguarding sensitive data in transit, and ensuring compliance with regulatory standards. Organizations utilizing this software often include IT departments, security teams, and compliance officers, all of whom need reliable mechanisms for protecting assets that are increasingly dispersed across cloud environments. As businesses adopt hybrid infrastructure models, the demand for such security solutions continues to grow, necessitating robust support for a range of workflows and integrations with existing IT security frameworks.

Companies
7
Revenue
$31.4M
Funding
$42.5M
Employees
328

Filters

Sorting: Highest -> Lowest

Filters

Top Cloud Edge Security Software Companies

Showing 10 of 7 companies ranked by annual revenue.

1
Neeve

San Francisco, California, United States

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable. It provides cybersecurity, secure remote and cloud access, edge compute, applications, and cloud management for intelligent buildings.

Revenue
$10.6M
Customers
-
Year founded
2024
Funding
-
Team size
58
Growth
-
2
Edge Delta

Seattle, Washington, United States

Edge Delta's intelligent Telemetry Pipelines are designed to manage exponential volumes of Observability and Security data — at the edge or in the cloud. It's control for the knowns you understand, AI and automation for the unknowns you can’t.

Revenue
$8.3M
Customers
-
Year founded
2018
Funding
-
Team size
75
Growth
-
3
ZEDEDA

San Jose, California, United States

Provider of a cloud-native edge virtualization software platform intended to monitor, visualize and secure real-time edge applications. The company's platform uses Edge Virtualization X (EVx) engine, enabling organizations to get complete control of their edge data and avoid vendor lock-in regardless of the apps and clouds they choose to implement.

Revenue
$6M
Customers
-
Year founded
2016
Funding
$31.5M
Team size
138
Growth
71.41%
4
Neutroon

Barcelona, Catalonia, Spain

Neutroon is a Network-as-a-Service platform that enables enterprise, cities and private venue's IT teams to seamlessly deploy and manage multi-tenant private cellular networks. Private cellular networks offer a significant advantage vs. WiFi in terms of coverage, speed and latency, without any congestion issues. Vs. public cellular, private networks provide the highest cybersecurity standards keeping all network data on premise (at the edge), accessible at the lowest latency to boost AI-heavy apps. Neutroon deploys fully virtualized end-to-end networks running on cheap general purpose hardware, which can be up to 50% cheaper in terms of TCO compared to integrated solutions from traditional vendors. Neutroon's mission is to bridge the gap between IT and cellular telecommunications. Neutroon is a spin-off from i2Cat Foundation in Barcelona.

Revenue
$2.5M
Customers
-
Year founded
2020
Funding
-
Team size
23
Growth
-
5
ShieldIOT

Kfar Saba, Israel

Developer of a security management software designed to protect edge devices from security threats and operational risks. The company's software includes multiple layers of device-level security responsible for ongoing automatic protection, with a centralized security management application to be used by the IoT network operator to easily manage the fleet/device security and offer value-added services, enabling device manufacturers and IoT network operators to automatically secure existing and new devices with no need for any development resources or security expertise.

Revenue
$2.5M
Customers
-
Year founded
2017
Funding
$11M
Team size
17
Growth
90.28%
6
Total Uptime Technologies, LLC

United States

Multicloud Made Awesome - Unified availability, security, performance and connectivity for any app anywhere. We are the Cloud Availability Platform. Total Uptime let's you route traffic around network outages, ISP issues, device failures and anything else from the edge of the Internet. Integrate devices on-prem, at colo facilities or in the cloud. Secure them and boost performance. It doesn't matter where they are because you're completely in control.

Revenue
$990K
Customers
-
Year founded
2011
Funding
-
Team size
9
Growth
-
7
Labforge, Inc

Waterloo, Ontario, Canada

Developer of a robotic device designed to detect and track objects of interest for better business intelligence. The company's device incorporate drones, wearable sensors and smart cameras as well as big data and machine learning for situational awareness to track position and condition of things and people and the objects around them using edge computing, enabling security forces to be aware of what's happening around their personnel in the field and take necessary precautions in advance while reducing data usage.

Revenue
$508.5K
Customers
-
Year founded
2013
Funding
-
Team size
8
Growth
26.5%

Inclusion Criteria

- The product must provide real-time threat detection capabilities to identify and respond to security incidents. - It should include access controls to manage who can access specific data and applications. - Must offer data encryption services to protect sensitive information both at rest and in transit. - The solution should feature comprehensive data loss prevention tools to safeguard against unauthorized data sharing. - It must integrate effectively with multiple cloud service providers and support hybrid environments. - Not just provide security alerts; must also automate responses to potential threats.