getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 19

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


515 software options

Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Exein logo

Open-source cybersecurity solution for IoT & SCADA firmware

learn more
Exein is a cloud-based and open-source cybersecurity framework for IoT and SCADA firmware systems, which runs autonomously on any running device and helps businesses identify existing threats or suspicious behavior.

Read more about Exein

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
Baffle logo

Cloud-based data protection software

learn more
Baffle is an enterprise-class data security platform that offers comprehensive protection for sensitive data across cloud-native data stores. With Baffle, you can easily meet compliance controls and security mandates for data protection, including GDPR, PCI, and HIPAA.

Read more about Baffle

Users also considered
CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
Guardey logo

Your Plug & Play Cyber Security Solution

learn more
Guardey is a plug & play cyber security solution offering protection for sensitive data, secure remote work, real-time threat detection, and cyber awareness training.

Read more about Guardey

Users also considered
Qostodian Recon logo

Scan, identify, and secure your sensitive data.

learn more
Qostodian Recon restores visibility and accelerates an organization’s ability to find and secure data even in the most remote locations. With Recon’s industry-leading scan times, security teams achieve immediate time to value and get contextualized results.

Read more about Qostodian Recon

Users also considered
Cymulate logo

Cybersecurity and attack simulation software for SMBs

learn more
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.

Read more about Cymulate

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Oodrive Save logo

Cloud-based server backup and recovery solution

learn more
Oodrive Save is a cloud-based solution that helps businesses in the energy, healthcare, financial, and other sectors streamline data backup and recovery.

Read more about Oodrive Save

Users also considered
Cyclotron Pulse logo

AI agent security and governance solution

learn more
Cyclotron Pulse is an AI agent security and governance solution that helps organizations detect, assess, and manage AI agents across their enterprise environment.

Read more about Cyclotron Pulse

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
CimTrak Integrity Suite logo

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
Wallarm API Security logo

Cybersecurity tool for providing protection against attacks

learn more
With Wallarm, you get total visibility into the malicious traffic on your APIs and microservices, as well as robust protection against attacks from all types of malicious traffic. Our stateful security capabilities include automatic anomaly detection and behavioral analysis, built-in DDoS protection, bot detection for both web browsers and IRC channels, and notification about new instances in your environment – all of that to ensure that your APIs are constantly protected.

Read more about Wallarm API Security

Users also considered
DAtAnchor logo

Cloud-based cybersecurity solution

learn more
Anchor is a cloud-based data security solution that provides businesses with a comprehensive solution to defend against insider threats, cyber-attacks, and data loss. Anchor protects data by providing a high level of encryption with AES 256-bit military-grade encryption and real-time tracking of sensitive data. Anchor also offers multi-factor access controls to provide greater visibility into who has access and when they accessed files.

Read more about DAtAnchor

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Hobsec logo

Complete security platform that automatically discovers and

learn more
Hobsec is a complete cybersecurity solution that automatically finds and fixes security threats.

Read more about Hobsec

Users also considered
Novee logo

AI-powered penetration testing platform

learn more
Novee provides AI-powered penetration testing software that continuously identifies vulnerabilities and exploit chains in live environments. The platform uses AI agents to map systems, detect business logic flaws, and validate security issues with clear replication steps. It offers personalized remediation guidance tailored to specific architectures and automatically retests after fixes are implemented.

Read more about Novee

Users also considered
RedRok logo

Security done right.

learn more
RedRok offers easy-to-use security solutions that cover endpoint, network, and cloud security, as well as threat intelligence and compliance management.

Read more about RedRok

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden offers complete identity cybersecurity in a single package - ensuring that user, application, machine, AI, and cloud identities across your entire IT landscape are protected under a single pane.

Read more about Securden

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered