getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 4

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


310 software options

CyberHoot logo

Security awareness training platform

learn more
CyberHoot is a sleek and easy platform that provides security awareness training, a pioneering zero-configuration phish testing, dark web monitoring, and more.

Read more about CyberHoot

Users also considered
Tricent logo

Automate compliance in Google Workspace or Microsoft 365

learn more
Audit and cleanup your shared data in Microsoft 365 or Google Workspace with compliance automation.

Tricent helps you
1. Identify and revoke data shared with external users
2. Mitigate ongoing sharings through automated compliance policies
3. Involve the employees in the cleanup processes

Read more about Tricent

Users also considered
Phishing Tackle logo

Simulated phishing and security awareness training platform

learn more
Phishing Tackle is a cloud-based cyber security platform, which assists not-for-profit, public, and private organizations with simulated phishing and security awareness training. Key features include attack simulation, customizable content, knowledge testing and campaign statistics.

Read more about Phishing Tackle

Users also considered
Cyber Security Suite logo

Managed Detection and Response 24/7

learn more
CYBEROO's MDR (Managed Detection & Response) service,
combines Artificial Intelligence, Machine Learning and the analysis of over 50 cyber security specialists. To protect you from the most advanced cyber threats. 24 hours a day. 365 days a year.

Read more about Cyber Security Suite

Users also considered
WP Cerber Security logo

Cybersecurity, anti-spam and malware scanning software

learn more
WP Cerber Security is a cybersecurity software designed to help businesses scan WordPress websites for spam, malware, and hack attempts. The application uses inspection algorithms and a bot engine to screen incoming traffic requests for malicious activities, identify threat patterns, and automatically block them from entering the network.

Read more about WP Cerber Security

Users also considered
Sense Defence AI logo

Firewall software

learn more
Sense Defence AI WAF is an AI-powered Web Application Firewall (WAF) solution offering real-time threat detection, intelligent traffic analysis, and proactive attack blocking.

Read more about Sense Defence AI

Users also considered
IPQS logo

Fraud prevention solution for proactively detecting fraud

learn more
IPQS, an unparalleled fraud prevention solution powered by fresh data. Detect fraud in real-time, score mobile traffic, identify high-risk users, and block abusive behavior. Ensure lead quality with data verification. Choose IPQS for proactive fraud prevention and a frictionless user experience.

Read more about IPQS

Users also considered
Logsign Unified SO Platform logo

Logsign Unified Security Operations Platform

learn more
Logsign Unified SO Platform delivers comprehensive threat detection, investigation, and response (TDIR) through integrated next-gen SIEM, threat intelligence, UEBA, and SOAR capabilities.

Read more about Logsign Unified SO Platform

Users also considered
ThreatLocker logo

Zero Trust Platform

learn more
ThreatLocker is a Zero Trust platform that blocks unknowns, enforces least privilege, and protects endpoints from cyber threats.

Read more about ThreatLocker

Users also considered
GoodAccess logo

Zero Trust Architecture as a Service

learn more
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.

Read more about GoodAccess

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Hack The Box logo

Online ethical hacking and cybersecurity training platform

learn more
Hack the Box is a hacking training platform allowing IT professionals to advance their ethical hacking skills and be part of a worldwide community. Hack the Box offers labs and challenges for hackers to develop and practice their cybersecurity skills.

Read more about Hack The Box

Users also considered
Huntress logo

Cloud-based cybersecurity platform

learn more
Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard, security professionals can monitor active incidents, review investigations, receive custom incident reports, and respond to threats in an automated manner.

Read more about Huntress

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Libraesva Email Security logo

Exceptional Email Security

learn more
Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine.

Read more about Libraesva Email Security

Users also considered
Make IT Safe logo

Reduce risks and simplify your cybersecurity compliance.

learn more
Make IT Safe supports mid-sized and large companies across all sectors, fostering collaboration between management, CISOs, DPOs, and related business functions.

Read more about Make IT Safe

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Libraesva Email Archiver logo

Secure Email Archiving

learn more
Protect business information, simplify compliance, and improve efficiency by using Libraesva Email Archiver to automatically save a copy of every email sent or received by businesses. Libraesva's Resilient Archive technology stores every email in highly secure and digitally signed archives.

Read more about Libraesva Email Archiver

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
NetExplorer Workspace logo

Cloud-based file sharing and management software solution

learn more
NetExplorer is a cloud storage software in French and English with file management and collaboration tools. Key attributes include data migration, audit trail, backup & recovery, API, offline access, content & user management, data migration, digital signature, SSL security, and access control.

Read more about NetExplorer Workspace

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered