getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 21

Last updated: May 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


516 software options

CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Nudge Security logo

Making security work for modern work

learn more
Nudge Security is a cybersecurity startup securing modern organizations through the power of the modern workforce. It helps businesses with SaaS discovery, identity and access, risk insights, attack surface, security nudges and more.

Read more about Nudge Security

Users also considered
Gordon AI SOC logo

AI threat detection and automated response system

learn more
Gordon AI SOC is an AI-powered cybersecurity platform that delivers 24/7 threat detection, automated response, and MITRE ATT&CK-mapped kill chain reconstruction. CERT-In compliant, India-first, and built to protect enterprises without requiring a full in-house SOC team.

Read more about Gordon AI SOC

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
CybelAngel logo

Secure Your Digital World

learn more
CybelAngel is the world leading Digital Risk Protection Platform to detect & resolve threats before they cause harm. We find leaks others don't. Zero false positives. Always actionable intelligence. Avoid breaches, fraud, ransomware, compliance failures and loss of reputation with CybelAngel.

Read more about CybelAngel

Users also considered
Dasera logo

Automate, Govern, Secure: Protect Your Data with Dasera

learn more
Dasera is a cloud-based data discovery and management solution that provides organizations with the tools needed to navigate the complexities of data environments.

Read more about Dasera

Users also considered
Wultra In-App Protection logo

The Most Feature-Rich In-App Protection Solution For Apps

learn more
In-App Protection is a cybersecurity solution that helps businesses with real-time monitoring, runtime library injection, external screen sharing, and more

Read more about Wultra In-App Protection

Users also considered
Phalanx GRC logo

Built, manage and maintain your compliance program.

learn more
Phalanx is a GRC platform that can help your team effectively build, manage, and maintain your compliance program. With Phalanx, you not only get access to the software itself but also have a dedicated team of security and compliance professionals who are there to help you every step of the way.

Read more about Phalanx GRC

Users also considered
Shield Sphere logo

Cybersecurity with SIEM & SOAR automation

learn more
Shield Sphere is a unified cybersecurity platform that consolidates SIEM, SOAR, threat intelligence, and compliance automation into a single command center. It features real-time threat detection, automated incident response, dark web monitoring, and an AI-powered query builder for transforming natural language into structured security searches. Shield Sphere supports compliance frameworks like ISO 27001, PCI DSS, HIPAA, and GDPR with automated evidence collection and audit-ready documentation.

Read more about Shield Sphere

Users also considered
Ivanti Neurons for RBVM logo

Risk-based vulnerability management platform

learn more
Ivanti Neurons for RBVM is a patch management solution that helps organizations evolve vulnerability management strategy to a risk-based approach. The solution enables prioritization of vulnerabilities and weaknesses that pose the most risk, allowing organizations to protect against ransomware and other cyber threats.

Read more about Ivanti Neurons for RBVM

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
Exein logo

Open-source cybersecurity solution for IoT & SCADA firmware

learn more
Exein is a cloud-based and open-source cybersecurity framework for IoT and SCADA firmware systems, which runs autonomously on any running device and helps businesses identify existing threats or suspicious behavior.

Read more about Exein

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
PKI Spotlight logo

Real-time PKI monitoring and alerting

learn more
PKI Spotlight is public key infrastructure software that provides real-time monitoring and control for enterprise cybersecurity environments.

Read more about PKI Spotlight

Users also considered
Guardey logo

Your Plug & Play Cyber Security Solution

learn more
Guardey is a plug & play cyber security solution offering protection for sensitive data, secure remote work, real-time threat detection, and cyber awareness training.

Read more about Guardey

Users also considered
Qostodian Recon logo

Scan, identify, and secure your sensitive data.

learn more
Qostodian Recon restores visibility and accelerates an organization’s ability to find and secure data even in the most remote locations. With Recon’s industry-leading scan times, security teams achieve immediate time to value and get contextualized results.

Read more about Qostodian Recon

Users also considered