getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


453 software options

Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
PortSwigger logo

Secure web apps with advanced testing tools.

learn more
PortSwigger offers a comprehensive web application security testing toolkit. It offers a range of tools for identifying and exploiting vulnerabilities, including a web vulnerability scanner, manual testing capabilities, and advanced features for DevSecOps and bug bounty hunting.

Read more about PortSwigger

Users also considered
Specops Password Policy logo

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
Elastic Security logo

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Cyberattacks are increasingly more sophisticated, but Orca makes it easy to remediate at-risk sensitive data in the cloud. Agentless statistical scanning reduces the noise, while contextual analysis helps prioritize risk so security teams can focus on what truly matters.

Read more about Orca Security

Users also considered
Blackpoint MDR logo

Fully managed integrated defense system.

learn more
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.

Read more about Blackpoint MDR

Users also considered
TRAC logo

Compliance. Simplified.

learn more
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.

With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to

Read more about TRAC

Users also considered
Perimeter 81 logo

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.

Read more about Perimeter 81

Users also considered
GeeTest CAPTCHA logo

Bot management system for protecting websites & mobile apps

learn more
GeeTest CAPTCHA protects websites, mobile apps, and APIs against malicious bot attacks while ensuring a smooth user experience.

Read more about GeeTest CAPTCHA

Users also considered
Risk Ledger logo

Supply Chain Risk Management

learn more
Risk Ledger is a network of connected organisations working together to reduce risk in the supply chain. Clients can engage with their suppliers' security and risk teams to conduct assurance. Suppliers can easily share their single Risk Ledger profile with many clients.

Read more about Risk Ledger

Users also considered
Enigma Vault logo

Secure your data

learn more
Enigma Vault is a SaaS-based secure card, data, and file storage and processing solution built from the ground up to solve your data security problems. Instead of you handling and storing sensitive data, we give you a token that can then be used for later retrieval and processing.

Read more about Enigma Vault

Users also considered
NG Firewall logo

Network management and protection

learn more
NG Firewall is a cloud-based network management and protection solution that includes network security, content filtering, user management, and performance optimization tools. The modular software is designed for organizations with limited budgets and IT resources.

Read more about NG Firewall

Users also considered
DNSFilter logo

Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
usecure logo

Transform employees into a cybersecurity asset.

learn more
usecure is the automated Human Risk Management (HRM) platform that transforms employees into a cybersecurity asset through user-tailored training programs.

Read more about usecure

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

learn more
Protect your organization’s data with NinjaOne Endpoint and Autonomous Patch Management. Strengthen the security of your endpoints with 360-degree monitoring, real-time alerting and deploy updates with NinjaOne patch management to ensure your security posture is always up to date.

Read more about NinjaOne

Users also considered
Feedzai logo

Cloud-based financial risk assessment and management tool

learn more
Feedzai is a cloud-based risk management software that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to detect cyber threats or risks across financial transactions or accounts. Supervisors can conduct risk assessments, monitor the status of transactions as ‘fraud’ or ‘not fraud’, and analyze behavioral biometrics, network, and device data.

Read more about Feedzai

Users also considered
Tenacy logo

Pilot your cybersecurity in a single platform.

learn more
Cybersecurity management processes centralized, measured and interconnected. Accelerate your compliance, build action and control plans, analyze and manage your risks, effectively report on your security posture.

Read more about Tenacy

Users also considered
Cloudflare logo

Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare

Users also considered
ESM+Strategy logo

Strategic Planning and Balanced Scorecard Software

learn more
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel.

Read more about ESM+Strategy

Users also considered
SafeDNS logo

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
IRONSCALES logo

We catch the phish that others miss!

learn more
We ensure your inboxes are uncompromised and your team is unburdened.

Read more about IRONSCALES

Users also considered
PowerDMARC logo

Email security and anti-spam software

learn more
PowerDMARC is a cloud-based email security software designed to help businesses secure emails from spam, spoofing, phishing, and other online threats. The platform utilizes artificial intelligence (AI) technology to automatically convert XML data into charts, numbers, and graphs, enabling users to view and evaluate related metrics.

Read more about PowerDMARC

Users also considered
PhishingBox logo

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered