getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 16

Last updated: April 2026

515 software options

Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
Red Access logo

Agentless Browsing Security

learn more
Red Access is an agentless browsing security platform that helps companies secure web sessions without disrupting user experience. It prevents zero-day threats and malware across browsers, files, identity, and data with combined cloud and endpoint inspection. The platform supports hybrid environments, secures web apps and browsers across devices and operating systems, and enables control and visibility without installing agents, isolating browsers, or adding extensions.

Read more about Red Access

Users also considered
Armor logo

Ransomware and endpoint protection tool for SMBs

learn more
Multi-layered anti-ransomware solution preventing ransomware before it even starts, working alongside EDR/EPP/XDR agents.

Read more about Armor

Users also considered
Tripwire Enterprise logo

Superior security, continuous compliance.

learn more
Fortra's Tripwire Enterprise is a leading compliance monitoring solution, using file integrity monitoring (FIM) and security configuration management (SCM). Backed by decades of experience, its advanced use cases are unmatched by other solutions.

Read more about Tripwire Enterprise

Users also considered
DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
Fortra’s DMARC Protection logo

Software for protection from spoofing and phishing attacks

learn more
Agari Brand Protection is a simple anti-phishing solution that helps enterprises prevent and recover from email spoofing attacks. Businesses can block phishing attacks with DMARC, SPF, DKIM, and other email authentication services.

Read more about Fortra’s DMARC Protection

Users also considered
Netrinos logo

Secure global LAN for seamless connections.

learn more
The Netrinos Network is a secure private network that seamlessly bypasses firewalls and routers, giving users instant access to their devices from anywhere on the internet. It encrypts traffic for privacy and security, allows devices to connect across locations, and switches networks without disrupting connections.

Read more about Netrinos

Users also considered
VNIS logo

Web security platform with WAF and CDN protection

learn more
VNIS is a comprehensive security platform designed to protect web servers, applications, and APIs from cyber threats. The platform includes cloud-based web application firewall capabilities, multi-CDN infrastructure across multiple countries, DDoS protection for various network layers, and smart load balancing technology. It offers bot management, access control, SSL services, and DNS management through a unified interface.

Read more about VNIS

Users also considered
Cyver Core logo

Cloud-based penetration testing platform

learn more
Cyver delivers pentest management-as-a-service, through a cloud platform. It offers automation, digitization, client management, and findings management to improve customer satisfaction and the quality of delivered reports.

Read more about Cyver Core

Users also considered
The Marvelous APS Software logo

The Marvelous APS Software for Production Capacity Planning

learn more
The Marvelous APS is an Advanced Production Capacity Planning & Production Scheduling Software

Read more about The Marvelous APS Software

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
MetaDefender Storage Security logo

Multi-layered data storage protection platform

learn more
MetaDefender Storage Security enables teams to ensure data protection across on-premises, hybrid, and cloud environments in a single platform. It allows managers to combine metascan multiscanning, deep CDR, and proactive DLP to detect and remove threats in stored files. The solution integrates with storage platforms, such as AWS S3, Microsoft Azure, NetApp, and SharePoint, enabling secure file collaboration and regulatory compliance.

Read more about MetaDefender Storage Security

Users also considered
Digital Armor logo

Cybersecurity solution for securing mobile applications

learn more
Digital Armor is a cybersecurity solution that helps businesses secure and harden mobile applications at runtime.

Read more about Digital Armor

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
ThreatDefence XDR Platform logo

On-premise & cloud-based XDR tool for developers.

learn more
ThreatDefence XDR Platform is a cloud-based and on-premise cybersecurity solution, which helps businesses in legal services, education, finance, and other sectors manage threat detection and response across servers, cloud environments, endpoints, and more. The platform provides various features such as vulnerability management, dark web monitoring, activity tracking, risk protection, root cause analysis, cloud asset management, and reporting.

Read more about ThreatDefence XDR Platform

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service platform delivers continuous, scalable, and cost-effective penetration testing — empowering businesses to identify and address security vulnerabilities in real time.

Read more about Blacklock

Users also considered
S2ME logo

Free security assessment software

learn more
S2ME is a free cloud-based security assessment software that uses statistical measurements of risk. Users are given an overall score one the evaluation is completed. The scores are divided into categories, demographic comparison and come with recommendations for improvements.

Read more about S2ME

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
Attack Surface logo

Affordable, easy to use Attack Surface tool.

learn more
Risk Cognizance's Attack Surface Platform provides comprehensive vulnerability management across digital environments, including external assets, internal networks, cloud services, and third-party vendors. The platform integrates NIST CSF and OWASP guidelines to identify critical assets, assess risks, and implement security measures through continuous monitoring and threat detection capabilities.

Read more about Attack Surface

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
Magnet AXIOM Cyber logo

Digital forensics and incident response software

learn more
Magnet AXIOM Cyber is a cloud-based incident response and digital forensics software.

Read more about Magnet AXIOM Cyber

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered