App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

iPad Computer Security Applications - Page 2

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

44 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

Sealit logo
4.8
(31)

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
HMA logo
4.3
(64)

Virtual private network software for securing online traffic

learn more
HMA is a VPN software, which helps businesses securely browse the web, access blocked websites, and encrypt online traffic. A smart kill switch lets users restrict access to the internet when VPN disconnects and configure automatic launch for the entire network or specific applications.

Read more about HMA

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
Acronis Cyber Protect Cloud logo
4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
Computer security implementation with NordLayer enables protection measures of computer systems and information within the network. NordLayer solution established security procedures to monitor and control identity access and authorized use of company systems.

Read more about NordLayer

Users also considered
Hushmail logo
4.6
(31)

Email, web form, and e-signature solution for healthcare

learn more
Hushmail is a web-based email, web form, and e-signature service that enables businesses to send and receive encrypted client communications. The drag-and-drop form builder, template directory, and integrated e-signatures are perfect for healthcare, legal, and other fields requiring confidentiality.

Read more about Hushmail

Users also considered
DriveStrike logo
4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
ManageEngine Password Manager Pro logo
4.4
(23)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
HiddenApp logo
4.7
(12)

Software for managing multiple devices

learn more
HiddenApp is a cloud-based solution designed to help businesses manage fleets of devices via a unified portal. It offers a host of features such as device monitoring, tracking, theft recovery, equipment tracing and locating, and more. Its anti-theft capability allows users to remotely lock and wipe devices.

Read more about HiddenApp

Users also considered
Acronis Cyber Protect logo
4.7
(6)

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
Fyde logo
5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Hitachi ID Bravura Pass logo
(0)

Bravura Pass simplifies enterprise password management

learn more
Adaptive SSO Authentication & FIM Solution

Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo.

Read more about Hitachi ID Bravura Pass

Users also considered
LiveEnsure logo
(0)

Four factor user authentication

learn more
Live Ensure protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks.

Read more about LiveEnsure

Users also considered
Securden logo
(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
Verimatrix Code Shield logo
(0)

Secure your code with an enterprise grade security toolkit

learn more
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process.

Read more about Verimatrix Code Shield

Users also considered
iPrism Web Security logo
(0)

Computer and network security management software

learn more
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs).

Read more about iPrism Web Security

Users also considered
EndPoint Privilege Manager logo
(0)

Privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about EndPoint Privilege Manager

Users also considered