getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


183 software options

Proton VPN logo

VPN with DNS filter function and Secure Core architecture.

visit website
Defend against cyberthreats with Proton VPN. Encrypt your network, block threats, segment access, and more with enterprise-grade security that is easy to use.

Read more about Proton VPN

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

visit website
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Isi-APP logo

Control your IT system with Isi-APP

learn more
Control your IT system with Isi-APP

Read more about Isi-APP

Users also considered
BlueFiles logo

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
Shieldoo logo

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
Predictive logo

Unified security and observability SaaS solution

learn more
Predictive is a cloud-based vulnerability management software crafted to fortify organizations against cyber threats, delivering informed insights for decisive action.

Read more about Predictive

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
ASPIA logo

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
Wiperapp logo

Data erasure solution

learn more
WIPERAPP is certified and secure data erasure software that complies with international standards like NIST 800-88. It securely erases data from HDD, SSD, NVMe, PC, and laptop drives to make data recovery impossible while allowing reuse of the drives. WIPERAPP offers centralized cloud management, lifetime licenses, and hot swap capability to erase multiple drives simultaneously.

Read more about Wiperapp

Users also considered
condignum logo

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE offers cellular SD-WAN and cybersecurity in an easily managed platform designed for agile businesses with small IT teams. It enables rapid network setup, integrates advanced zero trust security tools, and supports 4/5G traffic steering and network slicing capabilities.

Read more about Ericsson NetCloud Manager

Users also considered
Radiant Security logo

Cloud-based computer security tool for SOC teams.

learn more
Radiant Security is a cloud-based computer security solution that helps businesses detect and manage security incidents via artificial intelligence (AI). The solution helps automate the triage of alerts to ensure threat detection and response. It helps administrators investigate every alert, identify genuine incidents, delineate their root cause, and track attack paths. Radiant Security also provides incident analysis and response capabilities to manage the remediation process.

Read more about Radiant Security

Users also considered
Vulnerability Intelligence logo

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
Quantum Network Security logo

Network security suite for cyber attack threat prevention

learn more
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.

Read more about Quantum Network Security

Users also considered