getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


183 software options

CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Clearswift SECURE Email Gateway logo

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Cerberus logo

Threat intelligence software

learn more
Cerberus is a powerful platform for uncovering and investigating criminal activity on the deep and dark web. Cerberus collates unstructured data from the dark web into meaningful intelligence to help investigators and intelligence officers combat threats safely and easily.

Read more about Cerberus

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Establish holistic computer security, manage access to privileged applications and admin privileges on Windows and Mac endpoints with Securden - whether theyre in the network or operate remotely.

Read more about Securden

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about Securden Endpoint Privilege Manager

Users also considered
Bravura Pass logo

Bravura Pass simplifies enterprise password management

learn more
Adaptive SSO Authentication & FIM Solution

Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo.

Read more about Bravura Pass

Users also considered
iPrism Web Security logo

Computer and network security management software

learn more
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs).

Read more about iPrism Web Security

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning continuous penetration testing platform helps businesses safeguard their systems and endpoints through ongoing, cost-effective assessments. With its self-service model, organizations can detect and remediate vulnerabilities before they impact device integrity or operational

Read more about Blacklock

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Risk Assistant logo

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
Evidian logo

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
iBoostUp logo

Utility tool for optimizing, tuning & protecting Mac devices

learn more
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you.

Read more about iBoostUp

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
ControTask logo

ControTask: Enhance Productivity, Simplify Management.

learn more
ControTask: A cloud-based employee monitoring tool enhancing business efficiency through real-time activity tracking, detailed productivity analysis, and streamlined user management. Its intuitive interface and compatibility with multiple platforms make it ideal for hassle-free workforce optimizatio

Read more about ControTask

Users also considered