getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


190 software options

SpamTitan logo

Anti-spam filter for business email. Vital email security.

learn more
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support

Read more about SpamTitan

Users also considered
Barracuda Web Security Gateway logo

Cloud-based application protection solution

learn more
Barracuda Web Security Gateway is a cloud-based solution, which helps enterprises protect applications and social media platforms from various types of cyber threats, misused bandwidth issues, and malware, spyware, or virus attacks. Features include SSL filtering, traffic monitoring, tagging, and reporting.

Read more about Barracuda Web Security Gateway

Users also considered
OpenVPN Access Server logo

A self-hosted VPN solution engineered for SMBs

learn more
Secure remote access solution to your private network, in the cloud or on-prem.

Read more about OpenVPN Access Server

Users also considered
Malwarebytes for Teams logo

Advanced malware protection for small businesses.

learn more
Malwarebytes for Teams is a behavior-based antivirus platform that provides advanced threat detection and prevention capabilities against malware,
ransomware, and hackers.

Read more about Malwarebytes for Teams

Users also considered
Avira Antivirus Pro logo

Comprehensive virus protection for PCs and smartphones

learn more
Avira Antivirus Pro is a comprehensive antivirus program that protects the identity and personal data of its users against malware. It is available for PCs and smartphones. The aim of the platform is to help users achieve the highest level of security while maintaining unimpaired device performance.

Read more about Avira Antivirus Pro

Users also considered
TunnelBear logo

Virtual Private Network Service Solution

learn more
TunnelBear is a virtual private network (VPN) system that helps businesses generate encrypted tunnels for routing corporate data and maintaining confidentiality. The software protects organizations by converting browsing history into an unreadable format so hackers cannot access it.

Read more about TunnelBear

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
EaseUS Partition Master Pro logo

Best Tool to Simplify Your PC Disk Management

learn more
EaseUS Partition Master is a software that can partition hard drives and reorganize disk space for better performance. It allows users to resize, move, merge, and create partitions for Windows 11/10/8/7/Vista/XP. The software is designed for individual users and offers an all-in-one solution for managing disk partitions.

Read more about EaseUS Partition Master Pro

Users also considered
Dhound logo

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
SAINT Security Suite logo

Cybersecurity and vulnerability assessment solution

learn more
SAINT Security Suite is a cybersecurity solution that helps businesses uncover, assess, and mitigate security risks across the entire security infrastructure. The platform provides granular, tailored reports that facilitate informed decision-making.

Read more about SAINT Security Suite

Users also considered
Rzilient logo

IT management solution

learn more
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management.

Read more about Rzilient

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
AppSec Education Platform logo

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about AppSec Education Platform

Users also considered
IPVanish logo

Software to establish and manage virtual private network

learn more
IPVanish is a virtual private network (VPN) software designed to help individuals and businesses of all sizes secure internet connections and protect private data from online theft and unauthorized access. The platform enables organizations to encrypt internet traffic and networks and establish anonymous IP addresses to safely access websites and online media.

Read more about IPVanish

Users also considered
OpenText Core Endpoint Protection​ logo

Smarter Cybersecurity Services & Solutions

learn more
OpenText™ Core Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about OpenText Core Endpoint Protection​

Users also considered
Jamf Protect logo

Endpoint protection software for MacOS users

learn more

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Users also considered
Intercept X Endpoint logo

Endpoint protection software for security analysts

learn more
Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks across networks. The software allows managers to identify and stop malicious encryption operations to protect the system against master boot record (MBR) ransomware.

Read more about Intercept X Endpoint

Users also considered
Mailinblack logo

Cloud-based & on-premise email protection software

learn more
Protecting businesses from malware, phishing, ransomware, and spam emails.

Read more about Mailinblack

Users also considered
BlueCat logo

Centralized, automated, and secure DDI

learn more
BlueCat helps enterprises achieve their network modernization objectives by delivering innovative products and services that enable networking, security, and DevOps teams to deliver change-ready networks with improved flexibility, automation, resiliency, and security.

Read more about BlueCat

Users also considered
AwareGO logo

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
CrashPlan logo

Easy, secure, & cost-effective backup and recovery

learn more
CrashPlan serves SMBs and enterprises seeking reliable endpoint, server, Google workspace and Microsoft 365 backup to safeguard data, ensure compliance, and enable fast recovery.

Read more about CrashPlan

Users also considered
Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered