getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


184 software options

Citrix Workspace logo

Digital workspace & workflow management platform

learn more
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.

Read more about Citrix Workspace

Users also considered
ConnectWise Automate logo

Endpoint monitoring & automation software for MSPs

learn more
Don’t let security threats go undetected in your clients’ IT network. Deliver effective threat protection with best-in-class antivirus & anti-malware solutions.

Read more about ConnectWise Automate

Users also considered
Acronis Cyber Protect Cloud logo

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is AI-powered cyber protection for modern MSPs, natively integrating operations management, cybersecurity and data protection in one platform.

Read more about Acronis Cyber Protect Cloud

Users also considered
Avast Business CloudCare logo

Cybersecurity detection solution with threat diagnostics

learn more
Avast Business Cloudcare is a cloud-based security solution designed for small and midsize businesses (SMBs) that provides advanced protection against cyber threats. It features proactive malware detection, which monitors your network activities in real time to identify threats at an early stage of infection. The software also allows users to create policies and firewalls, allowing you to control employee behavior while they're accessing the internet.

Read more about Avast Business CloudCare

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Bravura Privilege logo

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Bravura Privilege

Users also considered
ManageEngine DataSecurity Plus logo

Software for managing data visibility and security

learn more
ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.

Read more about ManageEngine DataSecurity Plus

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Clearswift SECURE Email Gateway logo

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
ControTask logo

ControTask: Enhance Productivity, Simplify Management.

learn more
ControTask: A cloud-based employee monitoring tool enhancing business efficiency through real-time activity tracking, detailed productivity analysis, and streamlined user management. Its intuitive interface and compatibility with multiple platforms make it ideal for hassle-free workforce optimizatio

Read more about ControTask

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning continuous penetration testing platform helps businesses safeguard their systems and endpoints through ongoing, cost-effective assessments. With its self-service model, organizations can detect and remediate vulnerabilities before they impact device integrity or operational

Read more about Blacklock

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
SpamTitan Plus logo

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Establish holistic computer security, manage access to privileged applications and admin privileges on Windows and Mac endpoints with Securden - whether theyre in the network or operate remotely.

Read more about Securden

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
CimTrak Integrity Suite logo

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about Securden Endpoint Privilege Manager

Users also considered
iPrism Web Security logo

Computer and network security management software

learn more
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs).

Read more about iPrism Web Security

Users also considered
Bravura Pass logo

Bravura Pass simplifies enterprise password management

learn more
Adaptive SSO Authentication & FIM Solution

Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo.

Read more about Bravura Pass

Users also considered