getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


183 software options

Seqrite Centralized Security Management logo

Enhancing security with insight-led control

learn more
HawkkEye is a centralized security management platform that strengthens an organization's security posture through a unified dashboard. It offers enterprise-grade capabilities like threat intelligence, simplified investigation via real-time dashboards, consolidated management of endpoints, and advanced threat protection.

Read more about Seqrite Centralized Security Management

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Gain complete network security powered by a robust SIEM and 24/7 SOC.

Read more about Netsurion

Users also considered
SiteLock logo

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
SpyHunter logo

Malware detection and removal software for Windows and Mac

learn more
SpyHunter is an on-premise malware detection and removal tool for Windows and Mac designed to help businesses scan, identify, remove, and block potentially unwanted programs (PUPs) and malware. It lets users protect their system against the latest malware threats by removing ransomware, trojans, viruses, worms, adware, rootkits, and other objects.

Read more about SpyHunter

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
VGS logo

Secure collection, protection & exchange of sensitive data

learn more
VGS platform by Very Good Security enables users to securely collect, protect, and exchange sensitive data such as card details, personal finance data, identification documents, vacation rental payments, & credentials, using data redaction and alias value systems which cannot be reverse engineered

Read more about VGS

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
ManageEngine DDI Central logo

Unified DNS, DHCP, and IP Address Management (IPAM) software

learn more
Streamline your network with a security-first full-stack platform for DNS, DHCP, and IPAM (DDI), enhancing efficiency, control, visibility, resiliency, and security while providing real-time performance insights across distributed sites.

Read more about ManageEngine DDI Central

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
IBM Security zSecure logo

A suite of tools for security assurance and task automation

learn more
IBM Security zSecure is a suite of user authorization and compliance automation products designed to add new levels of security to a mainframe. It supports IBM Z hardware, software, virtualization, and standard enterprise security managers (ESMs). With audits, alerts, reporting, and authentication tools, this solution can enhance security while detecting internal and external threats.

Read more about IBM Security zSecure

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden helps you protect your network from unauthorized access and adopt zero-trust policies throughout your company.

Read more about Securden

Users also considered
Awake Security logo

Cloud-based network traffic analysis and security platform

learn more
Arista NDR is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking.

Read more about Awake Security

Users also considered
Strobes PTaaS logo

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Cisco Secure Network Analytics logo

Network traffic analysis software

learn more
Cisco Secure Network Analytics is a cloud-based and on-premise software, which helps businesses detect, manage, and respond to threats and conduct network traffic analysis. Using telemetry data, IT professionals can protect critical data and perform forensic analysis.

Read more about Cisco Secure Network Analytics

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
TokenEx is cloud-based data security, key and encryption management platform designed to help small to large businesses with tokenization, compliance regulations and cloud vaulting to protect sensitive data such as PII, PCI, PHI, and even information in unstructured formats.

Read more about TokenEx

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
SpamTitan Plus logo

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
CleanBrowsing logo

Creating family-friendly networks.

learn more
CleanBrowsing is a DNS-based content filtering service designed to create family-friendly online experiences.

Read more about CleanBrowsing

Users also considered
Area 1 logo

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1

Users also considered
DDoS-GUARD logo

Network security and website protection software

learn more
DDoS-GUARD is a network security software that helps businesses protect websites against various types of distributed denial-of-service (DDoS) attacks, including TCP SYN flood, Slowloris, and HTTP flood. The platform allows managers to optimize content and images across web pages to improve website performances.

Read more about DDoS-GUARD

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Fortmesa's network sensor is fully integrated allowing your team to identify non-authorized assets, map to business & operating units, and drive organizational compliance and governance

Read more about FortMesa

Users also considered