getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 9

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


294 software options

Cisco Secure Access logo

Cloud security solution for hybrid workforce

learn more
Cisco Secure Access is a comprehensive security solution designed to protect data, applications, and secure access across multiple devices, clouds, and networks.

Read more about Cisco Secure Access

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
Risk Ident logo

Software specialized for the prevention of online fraud

learn more
RISK IDENT is specialized software for the prevention of online fraud. To aid the identification of fraudulent transactions, the package carries out automated evaluations and interprets data points to calculate results. RISK IDENT gives real-time results, which enables companies to take action.

Read more about Risk Ident

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Smarsh logo

Cloud-based archiving and compliance platform.

learn more
Smarsh is a cloud-based archiving and compliance platform that helps financial services firms and government organizations manage risk and extract intelligence from electronic communications data. With a focus on data privacy and security, Smarsh helps businesses store and manage communications data, ensuring regulatory compliance. It offers various features such as chat and voice recording, message archiving, and e-discovery capabilities.

Read more about Smarsh

Users also considered
Passpack logo

Reliable and Secure Access Management Control

learn more
Secure and efficient management of access to applications and data by teams and roles for all businesses.

Read more about Passpack

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
SiteLock logo

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
SpyWarrior logo

Anti-virus software

learn more
SpyWarrior is a comprehensive anti-malware solution designed to provide online protection and security against ransomware, viruses, trojans and other threats using AI algorithms and machine learning.

Read more about SpyWarrior

Users also considered
Rightworks Cloud Premier logo

Cloud-based platform for accounting and tax management firms

learn more
Rightworks Cloud Premier hosts all your core accounting, tax and business apps in a single, secure cloud platform where you and your team can work and collaborate anytime, anywhere.

Read more about Rightworks Cloud Premier

Users also considered
Advisera logo

Web-based ISO compliance & document management solution

learn more
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards

Read more about Advisera

Users also considered
Arctic Wolf Managed Detection and Response logo

Security software for detecting and mitigating cyberattacks

learn more
Arctic Wolf Managed Detection and Response offers round-the-clock monitoring of networks, endpoints, and clouds to block cyberattacks. Integrating with existing tech, it identifies assets, gathers security data, and tracks threats continuously, allowing organizations to concentrate elsewhere. The system swiftly investigates and contains incidents, preventing escalation. It also aids in recovery, enhancing rules to bolster defenses against future threats.

Read more about Arctic Wolf Managed Detection and Response

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
Integrite logo

Digital Risk Monitoring and Threat Intelligence

learn more
SaaS-based AI-powered digital risk monitoring platform helps you to do a 360-degree posturing on digital assets and prevent risks.

Read more about Integrite

Users also considered
AirCISO logo

Extended detection and response (XDR) software

learn more
AirCISO is an XDR software that connects in to your devices and provides actionable insights and intelligence.

Read more about AirCISO

Users also considered
Domdog logo

Page security and privacy platform

learn more
Domdog offers a security platform designed to help businesses meet PCI DSS 4.0.1 requirements 6.4.3 and 11.6.1 for payment page protection. The solution features three monitoring modes—JavaScript Agent, Content Security Policy, and Remote Scanner—allowing organizations to implement the appropriate security level for their environment. Domdog provides comprehensive evidence reports that can be exported as PDFs for auditor review.

Read more about Domdog

Users also considered
NOVA DRIM logo

AI-powered cyber risk quantification platform

learn more
NOVA AI is a cyber risk intelligence platform that quantifies security risks in financial terms through real-time analysis. The platform ingests data from six security domains including external attack surface monitoring, third-party risk management, governance and compliance, and vulnerability management to generate audit-ready risk scorecards. It features a dual-layer confidence engine that separates detection reliability from quantification reliability.

Read more about NOVA DRIM

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered