getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


183 software options

Forcepoint Web Security logo

Network security system for finance, retail & other sectors

learn more
Forcepoint Web Security is a network security software designed to help businesses in finance, healthcare, retail, and other sectors gain visibility and control of cloud applications and data using CASB functionality.

Read more about Forcepoint Web Security

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Snort logo

Intrusion Prevention System

learn more
Snort is an open sourced Intrusion Prevention System using packet sniffing and packet logging to detect malicious activity on a network and threats. Configurable for business and personal use.

Read more about Snort

Users also considered
Norton Secure VPN logo

Virtual private network proxy and security application

learn more
Norton Secure VPN is a virtual private network that helps businesses of all sizes encrypt the internet connection on public networks to protect personal data including passwords, bank account details, and credit card information.

Read more about Norton Secure VPN

Users also considered
LogMeIn Pro logo

Remote access tool for individuals & small businesses

learn more
LogMeIn Pro by GoTo is a remote access tool for individuals and small businesses which enables users to remotely control their computer from any location, and get full access to the desktop as well as all applications, files and information from another computer or mobile device.

Read more about LogMeIn Pro

Users also considered
AVG Internet Security Business Edition logo

Cybersecurity platform for small and midsize businesses

learn more
AVG Internet Security Business Edition is a complete protection solution that helps small and midsize businesses keep their systems and devices safe from external threats.

Read more about AVG Internet Security Business Edition

Users also considered
ManageEngine Password Manager Pro logo

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
Reveal(x) logo

Cloud-based network detection and response solution

learn more
With cloud-native security, ExtraHop Reveal(x) detects all threats and intelligently responds using deep context and automated workflows. Businesses can streamline response workflows and proactively secure enterprise environments, whilst ensuring compliance.

Read more about Reveal(x)

Users also considered
Practice Protect logo

Network security & identity management

learn more
PracticeProtect is a cloud security solution designed especially for accountants to manage passwords, control access & protect data online

Read more about Practice Protect

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Black Duck logo

Build secure, high-quality software faster.

learn more
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.

Read more about Black Duck

Users also considered
Xcitium Endpoint Detection & Resonse logo

Gain full context of a ransomware attack

learn more
Xcitium's Endpoint Detection and Response (EDR) platform, also referred to within the cybersecurity industry as Endpoint Detection and Threat Response (EDTR), represents an advanced endpoint solution designed for the continuous monitoring of endpoint devices. This solution aims to detect and respond effectively to a wide array of major threats, including but not limited to malware and ransomware.

Read more about Xcitium Endpoint Detection & Resonse

Users also considered
Ivanti Security Controls logo

Automated patch management & application control

learn more
Ivanti Security Controls streamlines security with unified, automated techniques against major attack vectors. It offers patch management and application control, allowing organizations to find, inventory, and patch servers, VMs, and templates, regardless of power or network status.

Read more about Ivanti Security Controls

Users also considered
SPAMfighter Exchange Module logo

Anti-spam and network security solution

learn more
SPAMfighter Exchange Module is an anti-spam solution designed to help businesses identify and prevent spam messages, email fraud, and phishing attacks. The centralized dashboard allows users to deploy updates, blacklist suspicious emails, generate custom reports, and handle data encryption processes.

Read more about SPAMfighter Exchange Module

Users also considered
ConnectWise Automate logo

Endpoint monitoring & automation software for MSPs

learn more
ConnectWise Automate is a remote monitoring and management (RMM) solution designed for MSPs seeking granular control over IT environments. The software provides customizable monitoring, automated patching, and deep automation capabilities that resolve routine issues before users notice them. ConnectWise Automate features AI-assisted scripting, data views for quick environment insights, and background troubleshooting tools that minimize end-user disruption while supporting Windows endpoints.

Read more about ConnectWise Automate

Users also considered
Cisco ACI logo

Secure & comprehensive SDN solution for modern data centers

learn more
Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.

Read more about Cisco ACI

Users also considered
BelkaVPN logo

BelkaVPN is designed to help businesses securely access web

learn more
BelkaVPN proxy - is a fast VPN proxy service that ensures internet privacy and security for everyone. Unblock media streaming, protect your data, shun away snoopers and hackers, and enjoy the full palette of online experiences with our VPN extension.

Read more about BelkaVPN

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
ITarian logo

IT and remote access management solution

learn more
ITarian remote access & IT management solution that helps companies connect and communicate with clients & employees, facilitating remote file access, system monitoring, troubleshooting, and operations management. Users can create multiple groups & define roles to provide secure access to resources.

Read more about ITarian

Users also considered
Electric AI logo

IT management software for managed software providers (MSP)

learn more
Electric is an IT management software designed to help businesses monitor network security and manage applications, operating systems, databases, and more. It allows IT teams to automate provisioning and de-provisioning of devices, monitor network inventories, launch upgrades, and review policies.

Read more about Electric AI

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Trellix Network Security logo

Network security platform for detecting & resolving threats

learn more
Trellix Network Security is an on-premise and cloud-based network security platform, which helps midsize to large businesses detect and resolve cyber threats or advanced, targeted, and other evasive attacks using Multi-Vector Virtual Execution (MVX), artificial intelligence (AI), and machine learning (ML) technologies. Administrators can receive alerts about critical issues and prioritize or contain targeted and newly discovered attacks based on real-time evidence.

Read more about Trellix Network Security

Users also considered