getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


111 software options

Sealit logo

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
CipherCloud logo

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered
Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
Elastic Security logo

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
Password Depot  logo

The oustanding password manager.

learn more
Password Depot is a password management solution that helps businesses ensure optimal protection for sensitive data. The application allows users to safeguard passwords, documents, identities, debit or credit cards, and more with AES Rijndael 256 double encryption. It generates secure passwords and automates data entry, eliminating the need for manual typing. Users can access their passwords across multiple devices, including Windows, Mac, iOS, and Android.

Read more about Password Depot

Users also considered
1Password logo

Password manager for businesses and families

learn more
1Password protects all company secrets such as passwords, security tokens, 2FA codes, documents, and passkeys to centralize and simplify the sign-in experience. Developers have access to features that help secure secrets and speed up workflows throughout the software development life cycle.

Read more about 1Password

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

learn more
NinjaOne Endpoint Management enables IT organizations of all sizes and experience levels to take a more proactive approach to IT management, which yields significant efficiency gains, improved user satisfaction and a stronger security posture.

Read more about NinjaOne

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
Password Safe logo

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
Senturo logo

Senturo: Secure, Track, & Manage Your IT Fleet

learn more
Senturo protects Android, Apple, Chromebook & Windows devices with advanced security tools: location tracking, geofencing, & IP whitelisting. Track your fleet in real-time, enforce geo-compliance, & send urgent device alerts - all from a unified platform, ensuring ulimate IT fleet control.

Read more about Senturo

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
Lockwell logo

Secure Your Small Business to Build Trust and Drive Revenue

learn more
Lockwell is the AI-managed cybersecurity platform for small teams. Protect devices, ensure compliance, and stay ahead of threats—all without the need for an IT team. Fast, affordable, and built to help you build trust and drive revenue.

Read more about Lockwell

Users also considered
CleanMyMac logo

An app for all Mac situations.

learn more
CleanMyMac is the Apple-notarized way to tidy up your Mac. All the tools for essential computer care, in a sleek interface that makes cleaning actually fun.

Read more about CleanMyMac

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
Cofense PhishMe logo

Security awareness training software for phishing attacks

learn more
Cofense PhishMe is a SaaS security awareness training software designed to help businesses educate employees about cyberattacks and threats through simulation. Executives can use board reports to gain insights into the company's performance and monitor the change in staff members' response towards phishing attacks.

Read more about Cofense PhishMe

Users also considered
Lookout logo

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
ESET Endpoint Security logo

Network security, network monitoring & endpoint protection

learn more
In the computer security category, ESET Endpoint Security offers top-tier cybersecurity for organizations with 250+ employees.

Read more about ESET Endpoint Security

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered
TypingDNA ActiveLock logo

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
LastPass logo

Integrated Access and Authentication

learn more
Integrated access and authentication for complete control and visibility, an all-in-one solution to address your identity and access management needs.

Read more about LastPass

Users also considered
Avast Essential Business Security logo

IT management and computer security software for SMB

learn more
Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks. 

Read more about Avast Essential Business Security

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
Computer security implementation with NordLayer enables protection measures of computer systems and information within the network. NordLayer solution established security procedures to monitor and control identity access and authorized use of company systems.

Read more about NordLayer

Users also considered
NordVPN logo

#1 VPN

learn more
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties

Read more about NordVPN

Users also considered