getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


294 software options

INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
IntelliGRC logo

Simplifying CMMC Compliance

learn more
A governance, risk management, and compliance tool built by cybersecurity practitioners specializing in CMMC compliance to help defense.

Read more about IntelliGRC

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE, for agile enterprises, integrates cellular SD-WAN and zero trust security in a centrally managed solution that enables rapid network setup. It offers CASB, SWG, RBI, CDR, and ZTNA to prevent web exploits, ransomware, and data loss, all managed via the NetCloud Manager portal.

Read more about Ericsson NetCloud Manager

Users also considered
Staff.Wiki logo

Policy and Procedure Intelligence Platform

learn more
Staff.Wiki is your Policies & Procedures platform for distributing policies to users and clients, w/ approval workflow, attestation, quizzes, training, checklists, and AI generation!

Read more about Staff.Wiki

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Kaduu logo

Identify stolen data, compromised devices

learn more
Darknet Monitoring made in Switzerland

Read more about Kaduu

Users also considered
ChatMail logo

Engineered for Security. Designed for Privacy.

learn more
ChatMail is a custom-built secure communications app, with reinforced device security. ChatMail encrypts your calls, messages, group chats, photos, and notes.

Read more about ChatMail

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
ComplyAssistant logo

GRC software/services solutions for any organization.

learn more
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare institutions of all sizes.

Read more about ComplyAssistant

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
Modshield SB logo

Cybersecurity platform to detect and remediate threats

learn more
Modshield SB is a web application firewall (WAF) designed to help organizations monitor traffic and protect hosting infrastructure and applications from unauthorized access and credential stuffing attacks. Features include bot protection, compliance metrics, raw logs, geo IP feeds & DoS protection.

Read more about Modshield SB

Users also considered
Excelitte logo

Data protection from Cyberattacks

learn more
If you have sensitive information held in spreadsheets, in Windows files, emails, or any kind of file, then you need Excelitte to provide instant 100% security for such data.

Read more about Excelitte

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Argon logo

Holistic security for CI/CD pipeline

learn more
Argon connects to development environments and tools. It protects the entire CI/CD pipeline from code manipulation misconfigurations, code leaks, and vulnerabilities. This solution enables smooth AppSec orchestration by providing a unified view, full visibility, security, and code integrity.

Read more about Argon

Users also considered
Timus SASE logo

cybersecurity, zero trust network access, msp-focused

learn more
Timus serves MSPs and their business clients by providing a layered security offering built on the principles of Zero Trust Network Access.

Leveraging the foundational principles of SASE and ZTNA, Timus ensures that users, regardless of their location, remain connected and protected.

Read more about Timus SASE

Users also considered
Silent Armor logo

AI-Powered Perimeter Defense

learn more
Silent Armor leverages advanced artificial intelligence to safeguard your digital assets 24/7/365. By analyzing hundreds of security metrics across your attack surface, our AI predicts and prevents breaches before they happen - keeping your organization secure with intelligent, real-time defense.

Read more about Silent Armor

Users also considered
GlitchSecure logo

Real-time Continuous Security Testing

learn more
GlitchSecure is a cloud-based vulnerability scanner, which helps small to large businesses in healthcare, technology, and other sectors streamline continuous security testing via penetration testing, real-time notifications, automated reporting, and more. The platform offers various features such as vulnerability assessment, remediation verification, data dashboards, collaboration tools, and APIs.

Read more about GlitchSecure

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
Universal SSH Key Manager logo

Cybersecurity and key management software

learn more
Universal SSH Key Manager is a cybersecurity software that helps businesses automate governing of SSH keys according to compliance and security standards. It allows teams to create new SSH keys, import existing ones, generate new ones for each server, and export them in different formats such as OpenSSH format and JSON format.

Read more about Universal SSH Key Manager

Users also considered
Fraudlogix logo

Fraudlogix: API solutions to detect bots, proxies, and fraud

learn more
Fraudlogix provides developer-friendly APIs to detect bots, proxies, VPNs, and fraud in real-time. With tools tailored for industries like Ad Tech, E-commerce, and Banking, Fraudlogix delivers 1,000 free IP lookups monthly, seamless integrations, and scalable fraud prevention solutions.

Read more about Fraudlogix

Users also considered