App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 5

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

220 software options

Sponsored

Filter results



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

TypingDNA ActiveLock logo
4.6
(11)

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
Indeni logo
4.5
(13)

The Automation Platform for IT

learn more
Indeni makes it easy to manage the infrastructure of digital businesses. Indeni Knowledge and Indeni Insight offers integrations to critical devices, built-in automation, and easy-to-read remediation instructions that allow IT users to move from reactive to proactive infrastructure management.

Read more about Indeni

Users also considered
Password Safe logo
4.7
(10)

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
Qualys Cloud Platform logo
3.9
(27)

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Cortex XDR logo
4.4
(14)

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Kloudle logo
4.9
(8)

Automated Cloud Security for growing engineering teams

learn more
Kloudle automates the critical steps required for public cloud infrastructure. Engineers who use public cloud infra for their work get instant security capabilities.

Kloudle builds and maintains inventory, finds security misconfigs, and gives detailed steps to fix them.

Read more about Kloudle

Users also considered
ASPIA logo
5.0
(7)

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
Carbon Black Endpoint logo
5.0
(7)

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
ThreatAdvice Cybersecurity Education logo
4.3
(14)

Cybersecurity training platform

learn more
ThreatAdvice Cybersecurity Education is a software that helps businesses train employees about cyber threats. It includes courses for various aspects of cybersecurity, such as threat detection and prevention tactics and technologies, digital forensics investigations, privacy law compliance & more.

Read more about ThreatAdvice Cybersecurity Education

Users also considered
Cofense PhishMe logo
4.7
(9)

Security awareness training software for phishing attacks

learn more
Cofense PhishMe is a SaaS security awareness training software designed to help businesses educate employees about cyberattacks and threats through simulation. Executives can use board reports to gain insights into the company's performance and monitor the change in staff members' response towards phishing attacks.

Read more about Cofense PhishMe

Users also considered
AwareGO logo
4.5
(11)

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
Cisco Umbrella logo
4.4
(11)

Cloud-based cybersecurity and internet gateway software

learn more
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform.

Read more about Cisco Umbrella

Users also considered
Barracuda Web Security Gateway logo
4.6
(9)

Cloud-based application protection solution

learn more
Barracuda Web Security Gateway is a cloud-based solution, which helps enterprises protect applications and social media platforms from various types of cyber threats, misused bandwidth issues, and malware, spyware, or virus attacks. Features include SSL filtering, traffic monitoring, tagging, and reporting.

Read more about Barracuda Web Security Gateway

Users also considered
Enginsight logo
5.0
(6)

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Liongard logo
4.6
(8)

Unleash teams to operate at 10X

learn more
Liongard gives MSPs an operational advantage that delivers both higher profits and an exceptional customer experience. Our Deep Data Platform unlocks the intelligence hidden deep within IT systems by transforming messy, hard-to-reach data into a unified, actionable source of intelligence.

Read more about Liongard

Users also considered
Jscrambler logo
4.4
(9)

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
JupiterOne logo
5.0
(5)

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
CWIS Antivirus Scanner logo
5.0
(5)

Web-based antivirus software for the IT industry

learn more
CWIS Antivirus Scanner is a web-based antivirus software that helps businesses in the IT industry streamline network security processes, such as website protection, vulnerability testing, and malware removal. It lets staff members fix hacked websites, detect spyware, perform blacklist checks, and more from a unified platform.

Read more about CWIS Antivirus Scanner

Users also considered
heylogin logo
5.0
(5)

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
Acronis Cyber Protect logo
4.7
(6)

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered
Spybot logo
4.7
(6)

Endpoint protection and file analysis platform

learn more
Spybot is an endpoint security suite, which helps enterprises detect and remove corrupt files, track unauthorized access to data, and protect systems from malware attacks. Features include anti-virus and anti-spyware, automated signature updates, task scheduling, and command-line tools.

Read more about Spybot

Users also considered
Vade logo
4.4
(7)

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
Endpoint Protector logo
4.4
(7)

Data loss prevention and endpoint protection tool

learn more
Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.

Read more about Endpoint Protector

Users also considered
Specops uReset logo
4.4
(7)

Sel-service password reset solution

learn more
Our enterprise self-service password reset solution allows users to securely reset their Active Directory passwords themselves. The product can be used for the purpose of updating local cached credentials, even when they are off VPN. This can be done by initiating the reset process right from the Windows logon screen on their workstations. With security features like multi-factor authentication and geo-blocking, Specops uReset is a perfect fit for organizations that take security very seriously.

Read more about Specops uReset

Users also considered
CipherCloud logo
4.8
(5)

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered