getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


499 software options

Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Excelitte logo

Data protection from Cyberattacks

learn more
If you have sensitive information held in spreadsheets, in Windows files, emails, or any kind of file, then you need Excelitte to provide instant 100% security for such data.

Read more about Excelitte

Users also considered
Radiant Security logo

Cloud-based computer security tool for SOC teams.

learn more
Radiant Security is a cloud-based computer security solution that helps businesses detect and manage security incidents via artificial intelligence (AI). The solution helps automate the triage of alerts to ensure threat detection and response. It helps administrators investigate every alert, identify genuine incidents, delineate their root cause, and track attack paths. Radiant Security also provides incident analysis and response capabilities to manage the remediation process.

Read more about Radiant Security

Users also considered
Staff.Wiki logo

Policy and Procedure Intelligence Platform

learn more
Staff.Wiki is your Policies & Procedures platform for distributing policies to users and clients, w/ approval workflow, attestation, quizzes, training, checklists, and AI generation!

Read more about Staff.Wiki

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE, for agile enterprises, integrates cellular SD-WAN and zero trust security in a centrally managed solution that enables rapid network setup. It offers CASB, SWG, RBI, CDR, and ZTNA to prevent web exploits, ransomware, and data loss, all managed via the NetCloud Manager portal.

Read more about Ericsson NetCloud Manager

Users also considered
Glue logo

The cohesive adhesive for your cybersecurity controls.

learn more
Cyber security asset management (CAASM) software that consolidates your tools and identifies gaps in your security posture.

Read more about Glue

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
ManageEngine Application Control Plus logo

Endpoint protection tool for security teams.

learn more
ManageEngine Application Control Plus is a cloud-based and on-premise software that enables businesses to gain control over software usage and mitigate security risks.

Read more about ManageEngine Application Control Plus

Users also considered
Panorays logo

Third-party security risk management software

learn more
Panorays enables customers to automate, accelerate and scale their third-party security evaluation and management process so they can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve security across the board.

Read more about Panorays

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Nitrogen logo

Cloud-based software that helps optimize website performance

learn more
Nitrogen is a cloud-based and AI-enabled software that helps optimize website performance and user experience. The platform can also manage SEO ranks and operational costs.

Read more about Nitrogen

Users also considered
Weagle logo

Enterprise security designed to protect sensitive data

learn more
Weagle secures businesses by combining an enterprise search engine and AI chat with security features. It protects sensitive data during web browsing by using AI, with an analysis tool and a management dashboard, to identify threats and manage access to potentially harmful content.

Read more about Weagle

Users also considered
BIMA logo

Unifying Cybersecurity, Simplifying Protection

learn more
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Read more about BIMA

Users also considered
condignum logo

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
BhaiFi Core logo

Unified Software-Based Networking Platform Beyond Firewall.

learn more
All-In-One Software-Based Network Security & Management Solution for Coworking Spaces, SMEs, Hotels & Retail.

Read more about BhaiFi Core

Users also considered
ThreatSTOP DNS Defense logo

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered
Defendify logo

All-in-one cybersecurity platform

learn more
Defendify offers comprehensive cybersecurity protection with layers of security including threat detection, security awareness training, assessments, and incident response support. Backed by automation and expert guidance, the platform aims to strengthen security posture across people, processes, and technology.

Read more about Defendify

Users also considered
1Fort logo

Cyber insurance made seamless

learn more
1Fort streamlines and automates the complex process for businesses to comply with the security requirements for cyber insurance, ensuring they can get coverage within a matter of weeks and become cyber resilient.

Read more about 1Fort

Users also considered
CYBERAWARE SECURITY logo

SaaS educational platform

learn more
Ongoing SaaS based programme to help organisations nurture a culture of security awareness. It includes training modules, monitoring and reporting functions, as well as practical phishing simulation campaigns. Risk exposure index can be calculated for each individual computer user.

Read more about CYBERAWARE SECURITY

Users also considered