getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 14

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


369 software options

Silo for Research logo

Endpoint protection management tool for IT and other sectors

learn more
Silo is an endpoint protection management software designed to help businesses in the IT, legal, government, finance, healthcare, and other sectors securely access websites and collect data to anonymously conduct investigations. Key features of the platform include network isolation, delegated admin control, data loss prevention, encrypted audit logs, Dark Web access, and language translation.

Read more about Silo for Research

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Cyver Core logo

Cloud-based penetration testing platform

learn more
Cyver delivers pentest management-as-a-service, through a cloud platform. It offers automation, digitization, client management, and findings management to improve customer satisfaction and the quality of delivered reports.

Read more about Cyver Core

Users also considered
Hobsec logo

Complete security platform that automatically discovers and

learn more
Hobsec is a complete cybersecurity solution that automatically finds and fixes security threats.

Read more about Hobsec

Users also considered
VNIS logo

Web security platform with WAF and CDN protection

learn more
VNIS is a comprehensive security platform designed to protect web servers, applications, and APIs from cyber threats. The platform includes cloud-based web application firewall capabilities, multi-CDN infrastructure across multiple countries, DDoS protection for various network layers, and smart load balancing technology. It offers bot management, access control, SSL services, and DNS management through a unified interface.

Read more about VNIS

Users also considered
Domdog logo

Page security and privacy platform

learn more
Domdog offers a security platform designed to help businesses meet PCI DSS 4.0.1 requirements 6.4.3 and 11.6.1 for payment page protection. The solution features three monitoring modes—JavaScript Agent, Content Security Policy, and Remote Scanner—allowing organizations to implement the appropriate security level for their environment. Domdog provides comprehensive evidence reports that can be exported as PDFs for auditor review.

Read more about Domdog

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
Netrinos logo

Secure global LAN for seamless connections.

learn more
The Netrinos Network is a secure private network that seamlessly bypasses firewalls and routers, giving users instant access to their devices from anywhere on the internet. It encrypts traffic for privacy and security, allows devices to connect across locations, and switches networks without disrupting connections.

Read more about Netrinos

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
Siberson Verifim File Integrity Monitoring logo

File integrity monitoring for critical changes

learn more
Siberson Verifim File Integrity Monitoring helps organizations detect unauthorized changes across files, folders, registry, permissions, and system configurations with centralized policies, event visibility, file comparison, and audit-ready monitoring.

Read more about Siberson Verifim File Integrity Monitoring

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
ThreatAdvice Breach Prevention logo

Cybersecurity and risk assessment platform

learn more
ThreatAdvice vCISO is a cybersecurity platform designed to assist businesses with risk assessment and vulnerability management operations. Administrators can configure roles, view disaster recovery questionnaires, and store policy information within a centralized repository.

Read more about ThreatAdvice Breach Prevention

Users also considered
Wultra In-App Protection logo

The Most Feature-Rich In-App Protection Solution For Apps

learn more
In-App Protection is a cybersecurity solution that helps businesses with real-time monitoring, runtime library injection, external screen sharing, and more

Read more about Wultra In-App Protection

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
SpamTitan Plus logo

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
Phalanx GRC logo

Built, manage and maintain your compliance program.

learn more
Phalanx is a GRC platform that can help your team effectively build, manage, and maintain your compliance program. With Phalanx, you not only get access to the software itself but also have a dedicated team of security and compliance professionals who are there to help you every step of the way.

Read more about Phalanx GRC

Users also considered
BlackCloak logo

Protect Your Executives Personal Lives, Protect Your Company

learn more
BlackCloak helps reduce enterprise risk by providing online privacy protection, home network security, device security, identity theft protection, and cybersecurity incident response to executives in their personal digital lives.

Read more about BlackCloak

Users also considered
Area 1 logo

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1

Users also considered
Digital Armor logo

Cybersecurity solution for securing mobile applications

learn more
Digital Armor is a cybersecurity solution that helps businesses secure and harden mobile applications at runtime.

Read more about Digital Armor

Users also considered
Deepinfo Attack Surface Platform logo

Know your attack surface. Empower your security.

learn more
Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action.

Read more about Deepinfo Attack Surface Platform

Users also considered
Shield Sphere logo

Cybersecurity with SIEM & SOAR automation

learn more
Shield Sphere is a unified cybersecurity platform that consolidates SIEM, SOAR, threat intelligence, and compliance automation into a single command center. It features real-time threat detection, automated incident response, dark web monitoring, and an AI-powered query builder for transforming natural language into structured security searches. Shield Sphere supports compliance frameworks like ISO 27001, PCI DSS, HIPAA, and GDPR with automated evidence collection and audit-ready documentation.

Read more about Shield Sphere

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
Insights logo

Threat Intelligence protects from attacks before disclosure

learn more
Leverage InQuest Threat Intelligence services to reduce time spent performing manual threat research. Improve your ability to predict, prevent, detect, prevent, hunt, and respond to emerging threats targeting your organization.

Read more about Insights

Users also considered