getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 12

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


310 software options

Siberson Verifim File Integrity Monitoring logo

File integrity monitoring for critical changes

learn more
Siberson Verifim File Integrity Monitoring helps organizations detect unauthorized changes across files, folders, registry, permissions, and system configurations with centralized policies, event visibility, file comparison, and audit-ready monitoring.

Read more about Siberson Verifim File Integrity Monitoring

Users also considered
Fingerprint logo

Identify fraud before it happens.

learn more
Fingerprint offers a comprehensive user profiling solution for both web and mobile platforms. Recognize 99.5% of returning visitors, and get the full view of your users behavior.

Read more about Fingerprint

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
DAtAnchor logo

Cloud-based cybersecurity solution

learn more
Anchor is a cloud-based data security solution that provides businesses with a comprehensive solution to defend against insider threats, cyber-attacks, and data loss. Anchor protects data by providing a high level of encryption with AES 256-bit military-grade encryption and real-time tracking of sensitive data. Anchor also offers multi-factor access controls to provide greater visibility into who has access and when they accessed files.

Read more about DAtAnchor

Users also considered
CimTrak Integrity Suite logo

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
Flusk Vault logo

Software for securing and monitoring the Bubble app

learn more
Flusk Vault monitors your Bubble app round the clock for your secrets and sensitive data. The platform automatically catches leaks and mistakes, helping users build a secure and compliant app.

Read more about Flusk Vault

Users also considered
Clario logo

One Clario app. Complete cybersecurity.

learn more
Clario is a cybersecurity app that combines VPN, data breach monitoring, antivirus, ad blocker, and other great security tools. It helps users secure their devices and online identity from viruses, hacking, ID theft, or spying - all in real-time. One Clario account easily protects up to three iOS, Android, or macOS devices.

Read more about Clario

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
Verosint logo

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
EncryptRIGHT logo

Application Level Data Encryption

learn more
EncryptRIGHT provides application-level data encryption, tokenization, data masking, key management, role-based data access controls, audit-logging and reporting functionality to pseudonymize, anonymize, and protect sensitive data.

Read more about EncryptRIGHT

Users also considered
Redamp.io logo

Simplified protection for mobile, desktop and server devices

learn more
Redamp.io revolutionizes digital safety, safeguarding endpoints, networks, and privacy. With our apps, users protect devices, ensure network security, and stay updated. We verify physical device security and monitor app safety.

Read more about Redamp.io

Users also considered
Kikimora Agent logo

AI-powered cybersecurity platform

learn more
Kikimora Agent is a ai-powered vulnerability management solution. The agent allows for conversational management of complex security tasks across your infrastructure.

Read more about Kikimora Agent

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
MetaDefender Storage Security logo

Multi-layered data storage protection platform

learn more
MetaDefender Storage Security enables teams to ensure data protection across on-premises, hybrid, and cloud environments in a single platform. It allows managers to combine metascan multiscanning, deep CDR, and proactive DLP to detect and remove threats in stored files. The solution integrates with storage platforms, such as AWS S3, Microsoft Azure, NetApp, and SharePoint, enabling secure file collaboration and regulatory compliance.

Read more about MetaDefender Storage Security

Users also considered
S2ME logo

Free security assessment software

learn more
S2ME is a free cloud-based security assessment software that uses statistical measurements of risk. Users are given an overall score one the evaluation is completed. The scores are divided into categories, demographic comparison and come with recommendations for improvements.

Read more about S2ME

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
UnderDefense MAXI logo

One platform. All things cybersecurity.

learn more
UnderDefense MAXI is security-as-a-service for teams with limited capacity. Stop threats with our award-winning MDR, boasting a 100% ransomware defense rate. Get full context in 2 minutes and contain threats in 15 minutes while maintaining full control through automation and human expertise.

Read more about UnderDefense MAXI

Users also considered
SiON logo

Employee threat management platform

learn more
Cybersecurity protects systems, networks, and data from theft, damage, and unauthorized access. It’s essential for preventing cyberattacks, safeguarding sensitive information, ensuring business continuity, and maintaining trust in a digital world.

Read more about SiON

Users also considered