App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software for Windows - Page 3

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

154 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

ESET Home Office Security Pack logo
4.8
(30)

Cloud-based cybersecurity solution for SMBs

learn more
ESET Home Office Security Pack is a comprehensive solution for small and medium-sized businesses and startups that need to protect digital equipment

Read more about ESET Home Office Security Pack

Users also considered
CyLock Anti-Hacker logo
4.9
(27)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Acronis Cyber Protect Cloud logo
4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
EventSentry logo
5.0
(22)

Real-time log & event log hybrid SIEM monitoring solution

learn more
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more

Read more about EventSentry

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
Computer security implementation with NordLayer enables protection measures of computer systems and information within the network. NordLayer solution established security procedures to monitor and control identity access and authorized use of company systems.

Read more about NordLayer

Users also considered
Heimdal Threat Prevention logo
4.8
(25)

Advanced DNS Filtering for Your Perimeter and Endpoints.

learn more
A comprehensive DNS security solution that leverages cutting-edge technology to prevent future cyber-threats with unparalleled accuracy. Proprietary detection technologies power it to stop ransomware, data leaks, and network malware in their tracks.

Read more about Heimdal Threat Prevention

Users also considered
ManageEngine ADAudit Plus logo
4.3
(43)

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
UserLock logo
4.5
(32)

Multi-Factor Authentication and Access Management

learn more
UserLock allows businesses to verify the identity of all Active Directory users with strong multi-factor authentication and access management on Windows logon, Remote Desktop (RDP & RD Gateway), IIS, VPN, and Cloud Applications.

Read more about UserLock

Users also considered
Acunetix logo
4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
BLACKbox logo
4.4
(32)

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
ManageEngine Vulnerability Manager Plus logo
4.6
(24)

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Specops Password Auditor logo
4.8
(19)

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
DriveStrike logo
4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
INLYSE Malware.AI logo
5.0
(14)

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Proofpoint Email Protection logo
4.2
(36)

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Invicti logo
4.7
(18)

Security scanning & vulnerability management

learn more
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Apex One logo
4.4
(25)

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
ESET PROTECT MDR logo
4.8
(16)

Future ready protection for enterprise

learn more
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
Black Duck logo
4.2
(29)

Build secure, high-quality software faster.

learn more
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.

Read more about Black Duck

Users also considered
ManageEngine Password Manager Pro logo
4.4
(23)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
Advanced SystemCare Ultimate logo
4.5
(17)

Antivirus system for real-time Windows protection.

learn more
Advanced SystemCare Ultimate is an antivirus solution for Windows PCs that provides real-time browsing protection and prevents threats such as Trojans, ransomware, and spyware from invading the user's machine and putting their privacy and data at risk.

Read more about Advanced SystemCare Ultimate

Users also considered
RG System logo
4.8
(13)

French unified IT management platform for MSP and IT pros

learn more
RG System's SaaS IT management portal offers MSPs, IT professionals and Office automation company complementary RMM, Microsoft 365 Data backup and recovery, cybersecurity and remote control functions in a single portal.

Read more about RG System

Users also considered
Elastic Security logo
4.8
(13)

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Specops Password Policy logo
4.8
(12)

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered