getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 9

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


310 software options

Cisco Umbrella logo

Cloud-based enterprise network security solution

learn more
Cisco Umbrella is an enterprise network security solution that provides DNS-layer security to block threats before connections are established. The platform includes features such as secure web gateway, cloud access security broker, data loss prevention, cloud-delivered firewall, and malware protection. It leverages threat intelligence from Cisco Talos and operates on a global cloud infrastructure to protect users and devices across multiple locations.

Read more about Cisco Umbrella

Users also considered
Barracuda CloudGen Firewall logo

Network firewall solution

learn more
Barracuda CloudGen Firewall is a next generation firewall (NGFW) designed to manage security across complex and distributed networks. The solution offers scalable centralized management alongside an advanced security analytics platform to manage secure access across the entire WAN.

Read more about Barracuda CloudGen Firewall

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Guardio logo

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
Tehama logo

Tehama Enclaves as a Service

learn more
Tehama is the industry’s most advanced enclave hosting platform. Tehama securely connects people to sensitive data and systems—without the complexity.
Through secure cloud-native Enclaves, Tehama delivers Zero Trust access, compliance, and governance in one unified platform. No more layering multip

Read more about Tehama

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about Mend

Users also considered
Acronis True Image logo

Reliable, fast and secure backup with integrated protection

learn more
Acronis True Image, reliable, fast and secure backup with integrated cyber protection, such as anti-ransomware, anti-malware and Identity Protection* all in a single user-friendly solution. *Available in Select Countries

Read more about Acronis True Image

Users also considered
ManageEngine Password Manager Pro logo

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
InsightIDR logo

Cloud-based cybersecurity tool for developers.

learn more
InsightIDR is a cloud-based cybersecurity solution, which helps businesses in food and beverage, cosmetics, media, and other sectors manage extended detection and response (XDR) across networks. The platform provides several functions such as endpoint detection and response (EDR), threat intelligence, traffic analysis, behavioral analytics, security information and event management (SIEM), log search, and data collection.

Read more about InsightIDR

Users also considered
QSEC logo

Governance, risk and compliance platform

learn more
QSEC - the comprehensive solution for the sustainable and efficient establishment and operation of compliance, GRC, ISMS and data protection based on national and international standards such as ISO 27001, ISO 27005, BSI IT-Grundschutz and EU-DSGVO.

Read more about QSEC

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
Security Manager by FireMon logo

Manage Policy, Ensure Compliance, Gain Visibility & Control

learn more
FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration.

Read more about Security Manager by FireMon

Users also considered
Carbonite logo

Internet based backup solution

learn more
Carbonite lets users backup all the data on their computer as long as it’s connected to the internet. It is a cybersecurity software that allows businesses to back up their files and digital assets, as well as recover them in the event of a data loss.

Read more about Carbonite

Users also considered
Ivanti Security Controls logo

Automated patch management & application control

learn more
Ivanti Security Controls streamlines security with unified, automated techniques against major attack vectors. It offers patch management and application control, allowing organizations to find, inventory, and patch servers, VMs, and templates, regardless of power or network status.

Read more about Ivanti Security Controls

Users also considered
Proofpoint Email Protection logo

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Acronis Cyber Protect Cloud logo

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is AI-powered cyber protection for modern MSPs, natively integrating operations management, cybersecurity and data protection in one platform.

Read more about Acronis Cyber Protect Cloud

Users also considered
Portnox CLEAR logo

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Avast Business CloudCare logo

Cybersecurity detection solution with threat diagnostics

learn more
Avast Business Cloudcare is a cloud-based security solution designed for small and midsize businesses (SMBs) that provides advanced protection against cyber threats. It features proactive malware detection, which monitors your network activities in real time to identify threats at an early stage of infection. The software also allows users to create policies and firewalls, allowing you to control employee behavior while they're accessing the internet.

Read more about Avast Business CloudCare

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
DNIF HYPERCLOUD logo

SIEM and log management solution for organizations

learn more
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.

Read more about DNIF HYPERCLOUD

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Defend logo

Full-day, real-time identity—without extra hardware.

learn more
Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.

Read more about Defend

Users also considered
Vectra AI Platform logo

AI-driven network detection and response platform

learn more
Vectra AI detects and stops advanced cyberattacks that evade traditional security controls. Using AI-driven behavioral detection across hybrid environments, it identifies real attacker activity early, helping organizations reduce risk, prevent data exfiltration, and improve overall security outcomes

Read more about Vectra AI Platform

Users also considered