getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 18

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


438 software options

Fortra’s DMARC Protection logo

Software for protection from spoofing and phishing attacks

learn more
Agari Brand Protection is a simple anti-phishing solution that helps enterprises prevent and recover from email spoofing attacks. Businesses can block phishing attacks with DMARC, SPF, DKIM, and other email authentication services.

Read more about Fortra’s DMARC Protection

Users also considered
Netrinos logo

Secure global LAN for seamless connections.

learn more
The Netrinos Network is a secure private network that seamlessly bypasses firewalls and routers, giving users instant access to their devices from anywhere on the internet. It encrypts traffic for privacy and security, allows devices to connect across locations, and switches networks without disrupting connections.

Read more about Netrinos

Users also considered
VNIS logo

Web security platform with WAF and CDN protection

learn more
VNIS is a comprehensive security platform designed to protect web servers, applications, and APIs from cyber threats. The platform includes cloud-based web application firewall capabilities, multi-CDN infrastructure across multiple countries, DDoS protection for various network layers, and smart load balancing technology. It offers bot management, access control, SSL services, and DNS management through a unified interface.

Read more about VNIS

Users also considered
Cyver Core logo

Cloud-based penetration testing platform

learn more
Cyver delivers pentest management-as-a-service, through a cloud platform. It offers automation, digitization, client management, and findings management to improve customer satisfaction and the quality of delivered reports.

Read more about Cyver Core

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
ThreatDefence XDR Platform logo

On-premise & cloud-based XDR tool for developers.

learn more
ThreatDefence XDR Platform is a cloud-based and on-premise cybersecurity solution, which helps businesses in legal services, education, finance, and other sectors manage threat detection and response across servers, cloud environments, endpoints, and more. The platform provides various features such as vulnerability management, dark web monitoring, activity tracking, risk protection, root cause analysis, cloud asset management, and reporting.

Read more about ThreatDefence XDR Platform

Users also considered
Gradient Cyber logo

Cybersecurity platform for small and midsize businesses

learn more
Gradient Cyber offers extended detection and response (XDR), managed risk, and threat assessment using the SecOps Delivery Platform. It helps businesses gain insights into cybersecurity maturity and improvement.

Read more about Gradient Cyber

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Redamp.io logo

Simplified protection for mobile, desktop and server devices

learn more
Redamp.io revolutionizes digital safety, safeguarding endpoints, networks, and privacy. With our apps, users protect devices, ensure network security, and stay updated. We verify physical device security and monitor app safety.

Read more about Redamp.io

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
Kikimora Agent logo

AI-powered cybersecurity platform

learn more
Kikimora Agent is a ai-powered vulnerability management solution. The agent allows for conversational management of complex security tasks across your infrastructure.

Read more about Kikimora Agent

Users also considered