getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


112 software options

CyberHoot logo

Security awareness training platform

learn more
CyberHoot is a sleek and easy platform that provides security awareness training, a pioneering zero-configuration phish testing, dark web monitoring, and more.

Read more about CyberHoot

Users also considered
Action1 logo

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
WP Cerber Security logo

Cybersecurity, anti-spam and malware scanning software

learn more
WP Cerber Security is a cybersecurity software designed to help businesses scan WordPress websites for spam, malware, and hack attempts. The application uses inspection algorithms and a bot engine to screen incoming traffic requests for malicious activities, identify threat patterns, and automatically block them from entering the network.

Read more about WP Cerber Security

Users also considered
IPQS logo

Fraud prevention solution for proactively detecting fraud

learn more
IPQS, an unparalleled fraud prevention solution powered by fresh data. Detect fraud in real-time, score mobile traffic, identify high-risk users, and block abusive behavior. Ensure lead quality with data verification. Choose IPQS for proactive fraud prevention and a frictionless user experience.

Read more about IPQS

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Make IT Safe logo

Reduce risks and simplify your cybersecurity compliance.

learn more
Make IT Safe supports mid-sized and large companies across all sectors, fostering collaboration between management, CISOs, DPOs, and related business functions.

Read more about Make IT Safe

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered
Beyond Identity logo

Unphishable Multi-Factor Authentication

learn more
Unphishable, passwordless, multi-factor authentication to eliminate credential attacks and secure your workforce and customer identities.

Read more about Beyond Identity

Users also considered
GitGuardian logo

Automated Secrets Detection and Remediation

learn more
GitGuardian leads the way in Non-Human Identity security, offering end-to-end solutions from secrets detection in code, productivity tools and environments to strong remediation, governance and proactive prevention of leaks

Read more about GitGuardian

Users also considered
Specops Password Auditor logo

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
IPinfo logo

IP address data for users around the globe.

learn more
IPinfo powers accurate IP address data for users around the globe. Businesses use IPinfo's reliable data to power various use cases including, secure online transactions, web personalization, data enrichment, fraud prevention, content restrictions, lead generation, and more.

Read more about IPinfo

Users also considered
PortSwigger logo

Secure web apps with advanced testing tools.

learn more
PortSwigger offers a comprehensive web application security testing toolkit. It offers a range of tools for identifying and exploiting vulnerabilities, including a web vulnerability scanner, manual testing capabilities, and advanced features for DevSecOps and bug bounty hunting.

Read more about PortSwigger

Users also considered
TRAC logo

Compliance. Simplified.

learn more
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.

With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to

Read more about TRAC

Users also considered
Risk Ledger logo

Supply Chain Risk Management

learn more
Risk Ledger is a network of connected organisations working together to reduce risk in the supply chain. Clients can engage with their suppliers' security and risk teams to conduct assurance. Suppliers can easily share their single Risk Ledger profile with many clients.

Read more about Risk Ledger

Users also considered
Enigma Vault logo

Secure your data

learn more
Enigma Vault is a SaaS-based secure card, data, and file storage and processing solution built from the ground up to solve your data security problems. Instead of you handling and storing sensitive data, we give you a token that can then be used for later retrieval and processing.

Read more about Enigma Vault

Users also considered
NG Firewall logo

Network management and protection

learn more
NG Firewall is a cloud-based network management and protection solution that includes network security, content filtering, user management, and performance optimization tools. The modular software is designed for organizations with limited budgets and IT resources.

Read more about NG Firewall

Users also considered
GeeTest CAPTCHA logo

Bot management system for protecting websites & mobile apps

learn more
GeeTest CAPTCHA protects websites, mobile apps, and APIs against malicious bot attacks while ensuring a smooth user experience.

Read more about GeeTest CAPTCHA

Users also considered
Cloudflare logo

Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare

Users also considered
PowerDMARC logo

Email security and anti-spam software

learn more
PowerDMARC is a cloud-based email security software designed to help businesses secure emails from spam, spoofing, phishing, and other online threats. The platform utilizes artificial intelligence (AI) technology to automatically convert XML data into charts, numbers, and graphs, enabling users to view and evaluate related metrics.

Read more about PowerDMARC

Users also considered
ESM+Strategy logo

Strategic Planning and Balanced Scorecard Software

learn more
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel.

Read more about ESM+Strategy

Users also considered