getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 14

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


453 software options

The Marvelous APS Software logo

The Marvelous APS Software for Production Capacity Planning

learn more
The Marvelous APS is an Advanced Production Capacity Planning & Production Scheduling Software

Read more about The Marvelous APS Software

Users also considered
DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
iManage Threat Manager logo

Detect unusual behavior, quickly

learn more
iManage Threat Manager detects malicious behavior, intervenes to prevent data loss and delivers usage analytics to address regulatory compliance and information governance needs.

Read more about iManage Threat Manager

Users also considered
Domdog logo

Page security and privacy platform

learn more
Domdog offers a security platform designed to help businesses meet PCI DSS 4.0.1 requirements 6.4.3 and 11.6.1 for payment page protection. The solution features three monitoring modes—JavaScript Agent, Content Security Policy, and Remote Scanner—allowing organizations to implement the appropriate security level for their environment. Domdog provides comprehensive evidence reports that can be exported as PDFs for auditor review.

Read more about Domdog

Users also considered
SOAR+ logo

Security automation platform for the entire threat lifecycle

learn more
Security automation for the entire threat lifecycle.

Read more about SOAR+

Users also considered
Hobsec logo

Complete security platform that automatically discovers and

learn more
Hobsec is a complete cybersecurity solution that automatically finds and fixes security threats.

Read more about Hobsec

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden offers complete identity cybersecurity in a single package - ensuring that user, application, machine, AI, and cloud identities across your entire IT landscape are protected under a single pane.

Read more about Securden

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

With detailed visibility over user behavior, permissions, security states, and more, you can ensure your data is protected from internal and external threats.

Read more about Lepide Data Security Platform

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Octiga logo

Coherent and Office 365 security in Clicks, Not Weeks

learn more
Octiga applies Coherent best practice security posture for Office 365 through a holistic approach, including Monitored Configuration Baselines, Breach and risky activity monitoring all under one roof

Protect, Detect and Remediate—all in App.

In Clicks, Not Weeks.

Read more about Octiga

Users also considered
Armor logo

Ransomware and endpoint protection tool for SMBs

learn more
Multi-layered anti-ransomware solution preventing ransomware before it even starts, working alongside EDR/EPP/XDR agents.

Read more about Armor

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service platform delivers continuous, scalable, and cost-effective penetration testing — empowering businesses to identify and address security vulnerabilities in real time.

Read more about Blacklock

Users also considered
Magnet AXIOM Cyber logo

Digital forensics and incident response software

learn more
Magnet AXIOM Cyber is a cloud-based incident response and digital forensics software.

Read more about Magnet AXIOM Cyber

Users also considered
MailGuard logo

Speed Matters. MailGuard stops threats 2- 48hrs faster.

learn more
MailGuard anticipates, predicts and learns from emerging zero-day threats like ransomware, phishing, spear-phishing, Business Email Compromise and similar malicious email-borne attacks, protecting email users from harm.

Read more about MailGuard

Users also considered
Alice logo

Safety, security, and governance for GenAI systems

learn more
Alice is a trust, safety, and security platform built for the AI era. It helps organizations govern and protect GenAI systems, agents, and communicative platforms across their lifecycle, using adversarial intelligence to prevent harm, detect drift, and operate AI responsibly at scale.

Read more about Alice

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
Revulytics Compliance Intelligence logo

Cybersecurity tool for detecting compliance infringements

learn more
Revenera Compliance Intelligence is designed to help software providers detect software license compliance infringements. It enables IT professionals to gain actionable insights into the unpaid use of applications, create revenue generation strategies, and capture leads via a unified platform.

Read more about Revulytics Compliance Intelligence

Users also considered
Oodrive Save logo

Cloud-based server backup and recovery solution

learn more
Oodrive Save is a cloud-based solution that helps businesses in the energy, healthcare, financial, and other sectors streamline data backup and recovery.

Read more about Oodrive Save

Users also considered
Cymulate logo

Cybersecurity and attack simulation software for SMBs

learn more
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.

Read more about Cymulate

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
A-LIGN logo

All-in-One Compliance Automation Solution

learn more
A-LIGN's award-winning compliance management platform A-SCEND allows teams of all sizes to gain instant visibility into their compliance standing, create policies, and manage evidence, all from one centralized platform.

Read more about A-LIGN

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Carbon Black EDR logo

Endpoint detection and response solution

learn more
Carbon Black ER is a on-premises incident response and threat hunting solution that delivers continuous EDR visibility in offline, air-gapped and disconnected environments.

Read more about Carbon Black EDR

Users also considered