getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


220 software options

VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Timus SASE logo

cybersecurity, zero trust network access, msp-focused

learn more
Timus serves MSPs and their business clients by providing a layered security offering built on the principles of Zero Trust Network Access.

Leveraging the foundational principles of SASE and ZTNA, Timus ensures that users, regardless of their location, remain connected and protected.

Read more about Timus SASE

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
NetWitness logo

Threat Detection & Response platform for cybersecurity teams

learn more
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.

Read more about NetWitness

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE integrates cellular-centric SD-WAN and zero-trust cybersecurity into a unified, cloud-delivered solution, enabling rapid network deployment. Integrated CASB, SWG, RBI, CDR, and ZTNA protect against web exploits, phishing, ransomware, and data loss to Gen AI and other web tools.

Read more about Ericsson NetCloud Manager

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
GateKeeper Enterprise logo

Shared PC authentication, proximity, 2FA/MFA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
UTunnel VPN logo

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
EventSentry logo

Real-time log & event log hybrid SIEM monitoring solution

learn more
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more

Read more about EventSentry

Users also considered
RoboShadow logo

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
Hackrate logo

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Red Sift OnDMARC logo

Automated DMARC software to stop phishing & spoofing attacks

learn more
Red Sift OnDMARC shuts down the exact impersonation of email-sending domains used in cyber attacks, phishing, and scam emails. It also increases the deliverability of authorized emails and protects brand reputations.

Read more about Red Sift OnDMARC

Users also considered
Blumira logo

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
runZero logo

Asset inventory and network visibility for security and IT.

learn more
runZero provides asset inventory and network visibility for security and IT teams.

Read more about runZero

Users also considered
ThreatLocker logo

Zero Trust Platform

learn more
ThreatLocker is a Zero Trust platform that blocks unknowns, enforces least privilege, and protects endpoints from cyber threats.

Read more about ThreatLocker

Users also considered
GoodAccess logo

Zero Trust Architecture as a Service

learn more
Cybersecurity platform (SASE/SSE) that enables easy Zero Trust Architecture implementation for medium enterprises, any scale.

Read more about GoodAccess

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Constellix logo

Modernized Managed DNS at the Edge

learn more
Constellix is a modernized DNS management solution that offers DNS traffic management with integrated network monitoring services for enterprise-level organizations.

Read more about Constellix

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
Panorama logo

Cloud-based network security management tool

learn more
Panorama is a cloud-based network security management platform designed to help businesses create security policies and determine potential threats across enterprise networks. Supervisors can use the centralized console to manage policy deployments and configure rules for sandboxing, threat prevention, URL filtering, firewalls, application awareness, and more.

Read more about Panorama

Users also considered
DSRAZOR for Windows logo

Reporting for Active Directory and Windows File System

learn more
DSRAZOR for Windows is an Active Directory management, reporting and administration tool. It can be used by IT professionals to audit file system permissions, group membership, OUs and organizational units within an Active Directory environment. DSRAZOR also provides printable reports from these audits in Microsoft excel format.

Read more about DSRAZOR for Windows

Users also considered