getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


153 software options

Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
Trellix Endpoint Security logo

Computer security and endpoint protection platform

learn more
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

Read more about Trellix Endpoint Security

Users also considered
Proofpoint Email Protection logo

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Citrix Workspace logo

Digital workspace & workflow management platform

learn more
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.

Read more about Citrix Workspace

Users also considered
ConnectWise Automate logo

Endpoint monitoring & automation software for MSPs

learn more
Don’t let security threats go undetected in your clients’ IT network. Deliver effective threat protection with best-in-class antivirus & anti-malware solutions.

Read more about ConnectWise Automate

Users also considered
Acronis Cyber Protect Cloud logo

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is AI-powered cyber protection for modern MSPs, natively integrating operations management, cybersecurity and data protection in one platform.

Read more about Acronis Cyber Protect Cloud

Users also considered
Avast Business CloudCare logo

Cybersecurity detection solution with threat diagnostics

learn more
Avast Business Cloudcare is a cloud-based security solution designed for small and midsize businesses (SMBs) that provides advanced protection against cyber threats. It features proactive malware detection, which monitors your network activities in real time to identify threats at an early stage of infection. The software also allows users to create policies and firewalls, allowing you to control employee behavior while they're accessing the internet.

Read more about Avast Business CloudCare

Users also considered
ManageEngine DataSecurity Plus logo

Software for managing data visibility and security

learn more
ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.

Read more about ManageEngine DataSecurity Plus

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls

Read more about FortMesa

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning continuous penetration testing platform helps businesses safeguard their systems and endpoints through ongoing, cost-effective assessments. With its self-service model, organizations can detect and remediate vulnerabilities before they impact device integrity or operational

Read more about Blacklock

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Establish holistic computer security, manage access to privileged applications and admin privileges on Windows and Mac endpoints with Securden - whether theyre in the network or operate remotely.

Read more about Securden

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
Cisdem AppCrypt logo

App and website access control solution

learn more
Cisdem AppCrypt is a security application that allows users to password-protect applications and block websites on their computers. The software enables scheduled blocking of distracting or inappropriate content during specific time periods, captures photos of unauthorized access attempts, and operates discreetly in the background with minimal system resource usage. Compatible with macOS 10.12 or later, AppCrypt provides privacy protection for personal, family, and business environments.

Read more about Cisdem AppCrypt

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
iBoostUp logo

Utility tool for optimizing, tuning & protecting Mac devices

learn more
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you.

Read more about iBoostUp

Users also considered
PDQ Connect logo

Cloud-based endpoint management

learn more
PDQ Connect is cloud-based, agent-based endpoint management for Windows and macOS. Patch, deploy software, and remediate vulnerabilities with event-driven automation, no VPN required. Built for sysadmins. Trusted by 30,000+ IT professionals. Free 14-day trial at pdq.com.

Read more about PDQ Connect

Users also considered
ControTask logo

ControTask: Enhance Productivity, Simplify Management.

learn more
ControTask: A cloud-based employee monitoring tool enhancing business efficiency through real-time activity tracking, detailed productivity analysis, and streamlined user management. Its intuitive interface and compatibility with multiple platforms make it ideal for hassle-free workforce optimizatio

Read more about ControTask

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about Securden Endpoint Privilege Manager

Users also considered