getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 14

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


438 software options

CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
Cymulate logo

Cybersecurity and attack simulation software for SMBs

learn more
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.

Read more about Cymulate

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
Attack Surface logo

Affordable, easy to use Attack Surface tool.

learn more
Risk Cognizance's Attack Surface Platform provides comprehensive vulnerability management across digital environments, including external assets, internal networks, cloud services, and third-party vendors. The platform integrates NIST CSF and OWASP guidelines to identify critical assets, assess risks, and implement security measures through continuous monitoring and threat detection capabilities.

Read more about Attack Surface

Users also considered
Oodrive Save logo

Cloud-based server backup and recovery solution

learn more
Oodrive Save is a cloud-based solution that helps businesses in the energy, healthcare, financial, and other sectors streamline data backup and recovery.

Read more about Oodrive Save

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Revulytics Compliance Intelligence logo

Cybersecurity tool for detecting compliance infringements

learn more
Revenera Compliance Intelligence is designed to help software providers detect software license compliance infringements. It enables IT professionals to gain actionable insights into the unpaid use of applications, create revenue generation strategies, and capture leads via a unified platform.

Read more about Revulytics Compliance Intelligence

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
SiON logo

Employee threat management platform

learn more
Cybersecurity protects systems, networks, and data from theft, damage, and unauthorized access. It’s essential for preventing cyberattacks, safeguarding sensitive information, ensuring business continuity, and maintaining trust in a digital world.

Read more about SiON

Users also considered
Cyberboxx Assist logo

Cyber threat monitoring & incident response tool

learn more
Cyberboxx Assist is a cyber protection platform that provides threat monitoring, prevention tools, and incident response services for businesses and individuals.

Cyberboxx Assist is available as a standalone service or integrated within Cyberboxx Business and Cyberboxx Home insurance policies.

Read more about Cyberboxx Assist

Users also considered
NOVA DRIM logo

AI-powered cyber risk quantification platform

learn more
NOVA AI is a cyber risk intelligence platform that quantifies security risks in financial terms through real-time analysis. The platform ingests data from six security domains including external attack surface monitoring, third-party risk management, governance and compliance, and vulnerability management to generate audit-ready risk scorecards. It features a dual-layer confidence engine that separates detection reliability from quantification reliability.

Read more about NOVA DRIM

Users also considered
Alice logo

Safety, security, and governance for GenAI systems

learn more
Alice is a trust, safety, and security platform built for the AI era. It helps organizations govern and protect GenAI systems, agents, and communicative platforms across their lifecycle, using adversarial intelligence to prevent harm, detect drift, and operate AI responsibly at scale.

Read more about Alice

Users also considered
MailGuard logo

Speed Matters. MailGuard stops threats 2- 48hrs faster.

learn more
MailGuard anticipates, predicts and learns from emerging zero-day threats like ransomware, phishing, spear-phishing, Business Email Compromise and similar malicious email-borne attacks, protecting email users from harm.

Read more about MailGuard

Users also considered
Magnet AXIOM Cyber logo

Digital forensics and incident response software

learn more
Magnet AXIOM Cyber is a cloud-based incident response and digital forensics software.

Read more about Magnet AXIOM Cyber

Users also considered
zScan logo

Cloud-based application development and cybersecurity tool

learn more
zScan helps app developers create and deploy mobile software applications by managing comprehensive aspects of the software development cycle. Key attributes include IT risk management, compliance control, audit management, alert notifications, legal risk assessments, and CAPA.

Read more about zScan

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service platform delivers continuous, scalable, and cost-effective penetration testing — empowering businesses to identify and address security vulnerabilities in real time.

Read more about Blacklock

Users also considered
Panzura logo

Award-winning hybrid, multi-cloud data management

learn more
Award-winning hybrid, multi-cloud data management platform. Panzura's cloud product suite includes CloudFS, Data Services, Smart Apps, and Global Services. Panzura solves all your most critical cloud data management challenges.

Read more about Panzura

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
Agari Secure Email Cloud logo

Email security and cybersecurity software

learn more
Agari Secure Email Cloud is an email security and cybersecurity software that helps businesses in finance, healthcare, retail, legal, and IT industry segments identify and prevent spear phishing, account takeovers, and email compromise-based attacks. With the incident response functionality, staff members can prioritize tasks and conduct attachments, URLs, and sender forensics-based investigations.

Read more about Agari Secure Email Cloud

Users also considered
Arkose Labs logo

Stop online account attacks in hours, permanently

learn more
Arkose Labs is a global online account security and bot detection and prevention company that works with the largest enterprises in the world to stop SMS toll fraud, credential stuffing, account takeovers, fake account registration, inventory hoarding, malicious scraping, genAI abuse, and more.

Read more about Arkose Labs

Users also considered
ThreatMark logo

Fraud prevention & risk management system for banking sector

learn more
ThreatMark is a fraud detection and prevention software designed to help banks manage transaction risk analysis, user behavior profiling, and threat detection. The centralized dashboard allows fraud analysts to gain visibility into security or risk events and view real-time alerts for credit risks.

Read more about ThreatMark

Users also considered
Armor logo

Ransomware and endpoint protection tool for SMBs

learn more
Multi-layered anti-ransomware solution preventing ransomware before it even starts, working alongside EDR/EPP/XDR agents.

Read more about Armor

Users also considered