getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 3

Last updated: April 2026

515 software options

INLYSE Malware.AI logo

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
BigID logo

Know Your Data: Privacy - Protection - Perspective

learn more
BigID is a modern data intelligence platform built with discovery-in-depth (classification, cataloging, cluster analysis and correlation), unmatched data coverage for all types of personal and sensitive data, and an app framework to take action on privacy, protection, and perspective.

Read more about BigID

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered
IntelliGRC logo

Simplifying CMMC Compliance

learn more
A governance, risk management, and compliance tool built by cybersecurity practitioners specializing in CMMC compliance to help defense.

Read more about IntelliGRC

Users also considered
PC Matic PRO logo

Endpoint security and detection solution

learn more
PC Matic Pro's whitelisting is a critical preventative layer of cyber-protection that
resides on top of other endpoint security solutions.

Read more about PC Matic PRO

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
UNGUESS logo

Unleash the power of the Crowd

learn more
AppQuality is the crowd-based digital platform that help to create proven and effective user-centered digital solutions unleashing the power of your most powerful resource: THE CROWD!

Read more about UNGUESS

Users also considered
Havoc Shield logo

All-in-one cybersecurity platform for financial services

learn more
Havoc Shield quickly removes the fear and risk of a lacking cybersecurity program by providing you an industry-compliant plan, expert guidance, and seamless implementation of cohesive tools in an all-in one-platform built for non-security leaders on a tight timeline.

Read more about Havoc Shield

Users also considered
DoveRunner logo

Number 1 App Shielding and Runtime App Security Solution

learn more
AppSealing is a cloud-based solution that automates application security with no-coding RASP protection. It lets users protect their apps with a SaaS-based security layer.

Read more about DoveRunner

Users also considered
Orna logo

SaaS Cyber Incident Response platform, SOAR

learn more
ORNA is a SaaS cyber incident response platform, designed to take old-fashioned PDF-based plans and playbooks, with seamless workflow management, process automation, instant reporting and risk management capabilities.

Read more about Orna

Users also considered
ChatMail logo

Engineered for Security. Designed for Privacy.

learn more
ChatMail is a custom-built secure communications app, with reinforced device security. ChatMail encrypts your calls, messages, group chats, photos, and notes.

Read more about ChatMail

Users also considered
FileWall logo

Protect M365 users against Ransomware, 0-day, and Malware

learn more
FileWall protects your Microsoft 365 users against Ransomware and Malware attacks, with Click Deployment, zero maintenance, and great value for money. FileWall complements EOP and Microsoft Defender, providing effective real-time protection against any unknown threat hidden in innocent-looking files from both external and internal sources.

Read more about FileWall

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
ComplyAssistant logo

GRC software/services solutions for any organization.

learn more
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare institutions of all sizes.

Read more about ComplyAssistant

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
BIMA logo

Unifying Cybersecurity, Simplifying Protection

learn more
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Read more about BIMA

Users also considered
Critical Insight logo

Threat detection & response software.

learn more
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Users also considered
Modshield SB logo

Cybersecurity platform to detect and remediate threats

learn more
Modshield SB is a web application firewall (WAF) designed to help organizations monitor traffic and protect hosting infrastructure and applications from unauthorized access and credential stuffing attacks. Features include bot protection, compliance metrics, raw logs, geo IP feeds & DoS protection.

Read more about Modshield SB

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Abnormal AI logo

A Fundamentally Different Approach to Email Security

learn more
Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

Read more about Abnormal AI

Users also considered
InboxGuard logo

Email phishing protection and fraud detection solution

learn more
InboxGuard (formerly Retruster) is a cloud-based phishing protection solution designed to help small to large organizations identify fake and malicious codes in incoming emails. Key features include data security, ransomware protection, identity theft prevention, background screening, and threat tracking.

Read more about InboxGuard

Users also considered
Quixxi logo

mobile app security solution

learn more
Quixxi is an intelligent and integrated end-to-end mobile app security solution​. This powerful tool is for developers to protect and monitor any mobile app in minutes.​

Read more about Quixxi

Users also considered