getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 3

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


274 software options

DSRAZOR for Windows logo

Reporting for Active Directory and Windows File System

learn more
DSRAZOR for Windows is an Active Directory management, reporting and administration tool. It can be used by IT professionals to audit file system permissions, group membership, OUs and organizational units within an Active Directory environment. DSRAZOR also provides printable reports from these audits in Microsoft excel format.

Read more about DSRAZOR for Windows

Users also considered
Cisco AnyConnect logo

Virtual private network (VPN) to secure remote access

learn more
Cisco AnyConnect is a virtual private network (VPN) software designed to provide remote workforce with secure enterprise-wide network access across multiple locations and devices. Administrators can utilize the platform to identify network usage details.

Read more about Cisco AnyConnect

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
LogPoint logo

Accelerate threat detection and response with SIEM and UEBA

learn more
LogPoint's SIEM platform helps businesses secure data from threats & respond to cyberattacks in compliance with regulatory norms.

Read more about LogPoint

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
NG Firewall logo

Network management and protection

learn more
NG Firewall is a cloud-based network management and protection solution that includes network security, content filtering, user management, and performance optimization tools. The modular software is designed for organizations with limited budgets and IT resources.

Read more about NG Firewall

Users also considered
NordVPN logo

#1 VPN

learn more
NordVPN is a VPN cloud security service which encrypts all internet traffic to ensure confidential business data is protected from third parties

Read more about NordVPN

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Radware DDoS Protection logo

The Next Level of DDOS Protection

learn more
DefensePro provides automated DDoS protection from fast-moving, high-volume, encrypted or very-short-duration threats. It defends against IoT-based, Burst, DNS and TLS/SSL attacks and secures against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, phantom floods and more.

Read more about Radware DDoS Protection

Users also considered
Lookout logo

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
WP Ghost by AISQ logo

Cloud-based vulnerability management platform

learn more
WP Ghost by AISQ adds an extra security layer to WordPress websites by disguising WP specific weaknesses from hacker bots. It safeguards against frequent threats like SQL injection and brute force attacks by masking folders and files without actually modifying them on the server.

Read more about WP Ghost by AISQ

Users also considered
Secomea logo

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
What to do if the attacker has got behind the firewall or there are no patches available for vulnerabilities? No problem with the intrusion detection and prevention system from Enginsight. It recognises attacks and anomalies on every client and server and blocks them automatically.

Read more about Enginsight

Users also considered
Timus SASE logo

cybersecurity, zero trust network access, msp-focused

learn more
Timus serves MSPs and their business clients by providing a layered security offering built on the principles of Zero Trust Network Access.

Leveraging the foundational principles of SASE and ZTNA, Timus ensures that users, regardless of their location, remain connected and protected.

Read more about Timus SASE

Users also considered
Rublon logo

Workforce Multi-Factor Authentication for SMB and Enterprise

learn more
Secure local and remote access to networks, servers and applications using multi-factor authentication (MFA) with hardware and software authentication methods like U2F/WebAuthn Security Keys, Mobile Push, Mobile Passcode (TOTP), SMS Passcode and Email Link. Use Active Directory as Identity Provider.

Read more about Rublon

Users also considered
Netskope Active Platform logo

Safe cloud enablement solution

learn more
Netskope is an application designed to help companies secure their complete cloud app infrastructure.

Read more about Netskope Active Platform

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
Cato Networks Suite logo

A cloud-native secure access service edge (SASE) platform

learn more
Cato Networks Suite is a SASE platform for companies. It is tasked to connect branch locations, physical data centers, cloud assets, and mobile users into a secure and centrally managed global network. It optimizes access via the cloud and transforms WAN without substantial IT resources.

Read more about Cato Networks Suite

Users also considered
PhishingBox logo

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered
Ezeelogin logo

On-premises SSH jump server solution.

learn more
Ezeelogin is an on-premises SSH jump server solution designed to securely manage access to Linux servers, routers, switches and cloud instances. It offers various features including two-factor authentication, SAML authentication, SSH session recording, identity and access management (IAM), privileged access management (PAM), SSH key rotation, and root password management.

Read more about Ezeelogin

Users also considered
Darktrace logo

AI-enabled network and cybersecurity solution

learn more
Darktrace, founded in 2013 in Cambridge, UK, is a leader in AI cybersecurity, protecting 10,000+ global customers from evolving threats

Read more about Darktrace

Users also considered
CertHat logo

Tools to streamline Microsoft PKI management

learn more
Certhat is a comprehensive solution for managing and monitoring digital certificates in Microsoft Active Directory Certificate Services (AD CS) environments. This tool helps PKI managers become more productive by providing features such as certificate expiration alerts, full certificate visibility, and the ability to create expiration notifications for certificate groups.

Read more about CertHat

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Biocoded logo

Cloud-based platform for managing secured communication

learn more
Biocoded is a cloud-based security platform that allows businesses to securely share messages and files via a unified portal. It offers features like encrypted private messaging, group chat, voice and video conferencing, self-destructing messages, secure file sharing, and tamper-proof IoT access, and more.

Read more about Biocoded

Users also considered