getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 4

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


449 software options

UNGUESS logo

Unleash the power of the Crowd

learn more
AppQuality is the crowd-based digital platform that help to create proven and effective user-centered digital solutions unleashing the power of your most powerful resource: THE CROWD!

Read more about UNGUESS

Users also considered
DoveRunner logo

Number 1 App Shielding and Runtime App Security Solution

learn more
AppSealing is a cloud-based solution that automates application security with no-coding RASP protection. It lets users protect their apps with a SaaS-based security layer.

Read more about DoveRunner

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Nitrogen logo

Cloud-based software that helps optimize website performance

learn more
Nitrogen is a cloud-based and AI-enabled software that helps optimize website performance and user experience. The platform can also manage SEO ranks and operational costs.

Read more about Nitrogen

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered
Silent Armor logo

AI-Powered Perimeter Defense

learn more
Silent Armor leverages advanced artificial intelligence to safeguard your digital assets 24/7/365. By analyzing hundreds of security metrics across your attack surface, our AI predicts and prevents breaches before they happen - keeping your organization secure with intelligent, real-time defense.

Read more about Silent Armor

Users also considered
Verimatrix XTD logo

Prevent, detect, respond and predict threats on mobile apps.

learn more
Verimatrix XTD employs advanced obfuscation, anti-tamper and environmental checks to shield Android and iOS mobile apps from attack. Its extensive suite of cybersecurity capabilities spans mobile, embedded, desktop, and web platforms, including browsers, JavaScript, various frameworks and libraries.

Read more about Verimatrix XTD

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
GuardRails logo

Application security software

learn more
With GuardRails, you can finally feel safe on every level of your security. The platform enhances development processes and gives developers control via its layered approach that shields them from code to the cloud for complete protection against attackers.

Read more about GuardRails

Users also considered
PingSafe logo

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Arsen logo

Effective phishing training awareness platform

learn more
Arsen is a phishing training awareness SaaS allowing CISOs and cybersecurity expert to create realistic looking phishing simulations and improve their resiliency against phishing attacks.

Read more about Arsen

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Defendify logo

All-in-one cybersecurity platform

learn more
Defendify offers comprehensive cybersecurity protection with layers of security including threat detection, security awareness training, assessments, and incident response support. Backed by automation and expert guidance, the platform aims to strengthen security posture across people, processes, and technology.

Read more about Defendify

Users also considered
Hakware logo

Cloud-based solution for scanning system vulnerabilities.

learn more
Hakware is an AI-powered Security Management Solution, vulnerability scanner and pen testing tool. It aids organizations in safeguarding networks, systems, and applications by continuously identifying security risks through advanced AI analysis, facilitating a more secure operational environment.

Read more about Hakware

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Weagle logo

Enterprise security designed to protect sensitive data

learn more
Weagle secures businesses by combining an enterprise search engine and AI chat with security features. It protects sensitive data during web browsing by using AI, with an analysis tool and a management dashboard, to identify threats and manage access to potentially harmful content.

Read more about Weagle

Users also considered
UTunnel VPN logo

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
RiskProfiler logo

Fortify Your External Threat Exposure

learn more
RiskProfiler is an Unified Platform for managing your Third-Party Risk, Attack Surface Management, and Automated Vendor Questionnaire Assessments helping organizations fortify their External Continuous Threat Exposure.

Read more about RiskProfiler

Users also considered
Hackrate logo

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Red Sift OnDMARC logo

Automated DMARC software to stop phishing & spoofing attacks

learn more
Red Sift OnDMARC shuts down the exact impersonation of email-sending domains used in cyber attacks, phishing, and scam emails. It also increases the deliverability of authorized emails and protects brand reputations.

Read more about Red Sift OnDMARC

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
RapidSpike logo

Monitor, Protect & Improve your customers digital experience

learn more
Detect key vulnerabilities and supply chain attacks (Magecart) to reduce exposure to data breaches, reducing both ICO fines and financial losses. This protects your online reputation and customer trust in your brand.

Read more about RapidSpike

Users also considered
CyberHoot logo

Security awareness training platform

learn more
CyberHoot is a sleek and easy platform that provides security awareness training, a pioneering zero-configuration phish testing, dark web monitoring, and more.

Read more about CyberHoot

Users also considered