getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 3

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


213 software options

Wiperapp logo

Data erasure solution

learn more
WIPERAPP is certified and secure data erasure software that complies with international standards like NIST 800-88. It securely erases data from HDD, SSD, NVMe, PC, and laptop drives to make data recovery impossible while allowing reuse of the drives. WIPERAPP offers centralized cloud management, lifetime licenses, and hot swap capability to erase multiple drives simultaneously.

Read more about Wiperapp

Users also considered
Avast Essential Business Security logo

IT management and computer security software for SMB

learn more
Avast Essential Business Security helps deliver device security for small businesses that want remote visibility and centrally controlled protection against viruses, phishing, ransomware, and advanced cyberattacks. 

Read more about Avast Essential Business Security

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
Specops Password Policy logo

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
Kloudle logo

Automated Cloud Security for growing engineering teams

learn more
Kloudle automates the critical steps required for public cloud infrastructure. Engineers who use public cloud infra for their work get instant security capabilities.

Kloudle builds and maintains inventory, finds security misconfigs, and gives detailed steps to fix them.

Read more about Kloudle

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
CWIS Antivirus Scanner logo

Web-based antivirus software for the IT industry

learn more
CWIS Antivirus Scanner is a web-based antivirus software that helps businesses in the IT industry streamline network security processes, such as website protection, vulnerability testing, and malware removal. It lets staff members fix hacked websites, detect spyware, perform blacklist checks, and more from a unified platform.

Read more about CWIS Antivirus Scanner

Users also considered
heylogin logo

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
Senturo logo

Senturo: Secure, Track, & Manage Your IT Fleet

learn more
Senturo protects Android, Apple, Chromebook & Windows devices with advanced security tools: location tracking, geofencing, & IP whitelisting. Track your fleet in real-time, enforce geo-compliance, & send urgent device alerts - all from a unified platform, ensuring ulimate IT fleet control.

Read more about Senturo

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
Two-way TLS authentication and encryption to third-party assessments and independent audits (e.g. Type 1 SOC)

Read more about JumpCloud Directory Platform

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
SpyShelter logo

Detect and stop hidden spyware.

learn more
SpyShelter is a powerful antispyware tool for Windows PCs, offering real-time protection against a broad spectrum of malware, spyware, and online threats.

Read more about SpyShelter

Users also considered
Coro logo

Cybersecurity management software

learn more
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and handle access for confidential and practice data via a unified portal.

Read more about Coro

Users also considered
Aruba AirWave logo

Software for managing wireless networks

learn more
Aruba AirWave is a cloud-based software designed to help organizations discover, configure and monitor their entire wireless network. The platform allows users to utilize multiple monitoring screens to view real-time data and trend reports for every user, device, and segment across their network.

Read more about Aruba AirWave

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered
Bitium logo

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
condignum logo

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Password Safe logo

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
CipherCloud logo

Ensuring cloud security, compliance & control

learn more
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks.

Read more about CipherCloud

Users also considered
PA File Sight logo

Windows-based ransomware protection & access auditing tool

learn more
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access.

Read more about PA File Sight

Users also considered