Explore a recommended list of Fyde alternatives for your business in 2019. Compare alternatives to Fyde side by side and find out what other people in your industry are using. Let GetApp help you determine if the competition offer better features or value for money.
1Password keeps you safe online by making it easy to create and use great passwords. Guard against data breaches and compromised logins with the Watchtower suite of security tools, and get the apps on every platform so your passwords are always with you when you need them.Read more about 1Password
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more… Read more about EventSentry
Vulnerability scanner that prevents security & data breaches
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.Read more about Intruder
Keyhub is a cloud-based certificate lifecycle management automation platform which discovers, organizes, and tracks all enterprise SSL/TLS certificates. Features include public & private certificates management, real-time automatic discovery, expiration date tracking, issue identification, and more.Read more about Keyhub
SolarWinds Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities… Read more about SolarWinds Passportal
Network security solution for small to large businesses
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.Read more about Netacea Bot Management
Managed EDR solution integrated with a SIEM platform and SOC
EventTracker is a managed SIEM (security information and event management), threat intelligence, and log management solution for IT security teams. The platform offers a range of products to help businesses manage their security orchestration and monitor threats and alerts in real time.Read more about EventTracker
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.Read more about ESET Endpoint Security
Skybox Vulnerability Control enables threat-centric vulnerability prioritization and scanless vulnerability assessments to address security challenges within large, complex networks. Get visibility of your attack surface to analyze, prioritize and remediate your riskiest vulnerabilities fast.Read more about Skybox Vulnerability Control
Centraleyezer is a vulnerability tracking solution which provides centralized dashboards and reporting, automated follow-ups, and escalation processes for tracking and managing vulnerabilities. The system is designed to facilitate collaboration between security analysts, managers, and asset owners.Read more about Centraleyezer
Kiuwan is a cloud-based 360-degree application security solution which combines automatic code scanning with automated management of open source components. The platform supports a range of technologies and integrates with a variety of tools such as build systems, bug tracking and code repositories.Read more about Kiuwan
Endpoint Protector is a data loss prevention tool which assists businesses of all sizes with data encryption and file scanning. Key features of the platform include compliance management and reporting, policy management, device control, and sensitive data identification.Read more about Endpoint Protector
Endpoint management for desktops, servers & mobile laptops
LogMeIn Central is an endpoint management solution which helps IT professionals to monitor, manage, and secure their organization's endpoint infrastructure including desktops, servers and laptops. Users can remotely deploy & automate routine IT tasks for any PC or Mac from anywhere, via any device.Read more about LogMeIn Central
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting.Read more about SolarWinds Threat Monitor
Cybersecurity management for on–prem & multi–cloud networks
Network Assurance illuminates complex network security and policy compliance interactions, giving you visible insights to reduce attack vectors and network disruptions. The solution works fast to find device configuration errors or troubleshoot access and connectivity issues in hybrid networks.Read more about Network Assurance
Third-party cyber risk management platform for enterprises
CyberGRX is a cloud-based cyber risk management platform which helps large enterprises with data collection and assessments. Key features include compliance, business process control, security engagement, vulnerability scanning, performance metrics, and a self service portal.Read more about CyberGRX
Perimeter 81 is a cloud-based network security solution, which assists small to large organizations with the deployment of dedicated and shared gateways. Key features include traffic encryption, threat detection, user management, and split tunneling.… Read more about Perimeter 81
Cloud or on-premise Identity-as-a-Container (IDaaC) platform
Avatier Identity Anywhere is a cloud-based or on-premise identity-as-a-container (IDaaC) software which helps enterprises manage business apps & employee assets securely through a single platform, and supports native login, portability, scalability, continuous delivery, recovery, and more… Read more about Avatier Identity Anywhere
Kaseya VSA is your comprehensive solution to providing IT services at scale, whether you're an in house IT department or an MSP. VSA offers the absolute best technician experience with Kaseya Live Connect, and supporting offerings in Patch, AV/AM, monitoring and more.Read more about Kaseya VSA
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.Read more about Dhound
Security information and event management solution
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.Read more about EventLog Analyzer
Data and device protection for businesses of all sizes
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.Read more about DriveStrike
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.
Kenna is an essential platform for anyone who performs vulnerability scans. It correlates active Internet breach data, exploit data, and industry-leading threat feeds with internal scan data, enabling security professionals to pinpoint "what to fix first" within their specific environment, across all of their groups of assets.Read more about Kenna
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks.Read more about LiveEnsure There are no complicated, ineffective tokens and cookies. Users can trust the site or application they are accessing cannot login under their identity without their permission. (Insider attack)
Live Ensure™ protects the site and/or application by guaranteeing that users authenticating are genuine, valid and trusted. Sites are secured against phishing, pharming, man-in-the-middle or man-in-the-browser/trojan/virus attacks outside of their control. Login is simplified, no need to write complicated authentication logic or sign up for a federated identity solution. Implementing Live Ensure™ means sites no longer need to capture store or use private authentication data .
Training & compliance solution for software developers
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Primarily designed to help development teams improve code quality and maintain compliance, HackEDU offers customized programs, certifications, progress tracking, and more.Read more about HackEDU
Securely manage and provision your company’s apps, users and passwords in one place.
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. We give organizations the ability to manage access to all of their web-based applications including Salesforce, Google Apps for Work, Office 365, Box, Slack and thousands of others.Read more about Bitium With white-glove onboarding and world-class customer service, Bitium is the ideal choice for companies looking for an easy-to-use solution that delivers increased flexibility and security.
Viruses can destroy your business in minutes. Endpoint Protection Small Business Edition protects it just as fast. Symantec Endpoint Protection Small Business Edition 2013 is a simple, fast, and effective solution that protects against viruses and malware, and sets up in just minutes.Read more about Symantec Solutions For Small Business You don’t need to install additional hardware, or any special IT staff or training to get up and running.
Code42's CrashPlan for Small Business is a global enterprise SaaS provider of endpoint data protection and security. Backup, restore and protect your data from anywhere with CrashPlan for Small Business. Read more about CrashPlan
Cyber security solution for protecting websites and web apps
SECURITY, the online Web Vulnerability Scanner allows you to detect vulnerabilities and scan security vulnerabilities of your Websites and Apps. Daily and without technical expertise, launch your Black box or Grey box automated Security Audits to secure your websites.Read more about HTTPCS Security
WhiteSource is a SaaS solution that integrates with your build process and automatically identifies all open source components in your product. It does this day in and day out, every time you run your build, and continuously provides you updated and accurate reports.Read more about WhiteSource Software
Static code analysis tool for web application security
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.Read more about RIPS
Virus protection solution for Linux, AIX, and IBM i
Powertech Antivirus is a cloud-based solution, which helps businesses provide malware protection to Linux, IBM i and AIX power servers from viruses, malware threats and worms. It lets users detect and resolve data privacy threats to save valuable IT resources, whilst ensuring enterprise compliance.Read more about Powertech Antivirus
Fiberlink, an IBM company, has over 20 years of experience in delivering enterprise mobility management and security solutions for organizations of all sizes. Thousands of customers rely on MaaS360 to accelerate deployment, reduce risk, increase employee productivity, and simplify mobile device management.Read more about IBM MaaS360
MaaS360 is an enterprise mobility management (EMM) platform that enables IT to deliver end-to-end security and management through the implementation of:
Mobile Device Management
Mobile Application Management
Mobile Content Management
Mobile Expense Management
SentinelOne is a next-generation, autonomous endpoint/server protection platform that protects organizations against attacks utilizing key features such as machine learning, behavioral attack detection, automated responses, and real-time forensics, with complete visibility into all activity… Read more about SentinelOne
"With its ability to optimize, protect and enhance just any site in a way that is both fast and cost-effective, Incapsula stands as one of these services that webmasters are bound to try out at one point or other in their lives." (killerstartups_com)
Incapsula gives any website the security and performance previously only available to the website… Read more about Imperva Incapsula elite. Through a simple DNS settings change, website traffic is seamlessly routed through Incapsula’s global network of high-powered servers allowing Incoming traffic to be intelligently profiled, in real-time, blocking even the latest web threats, ranging from sophisticated SQL injection attacks to malicious bots and intruding comment spammers. Meanwhile, outgoing traffic is accelerated and optimized for faster load times, keeping welcome visitors speeding through.
In short, Incapsula keeps the good traffic flowing through fast and the bad traffic securely out.
Pricing: Get your FREE 30-day trial today!
BIOWRAP is a patented data encryption service that leverages the cloud to eliminate the complexities of encryption and offer an immediate impact solution to certify, protect, track and control all types of electronic information, at all times (at rest and in motion).Read more about BIOWRAP
•Immediate deployment: No costly technical requirement to build/manage the solution.
•Compliance: Meet the stringent requirements to protect and track sensitive electronic information at rest and in motion.
•Data Independent: Works with all file types.
•Trusted Information: Encrypted files are stamped with the level of identity used to create the authoritative unalterable information (biometric, PKI certificate, username/password).
•Improved Information Controls: Specify precisely who is authorized to gain access to protected information AND track all activity, including unauthorized access attempts, in real-time.
•Audit Protection: Detailed and customized reports for all activity.
+ Plus much more
Encrypt your data and securely share it with others
SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data. Read more about SmartCryptor
Alertsec Xpress offers Full Disk Encryption from Check Point (former Pointsec) as a fully managed service. We support Windows and Mac, and offer 24/7 helpdesk. Alertsec Xpress is used in all organisations that have recognized the need to protect their information.Read more about Alertsec Xpress Full Disk Encryption
Stop worrying about sensitive information falling in the wrong hands. Maintain security and compliance and even stop forwards in their tracks with ForwardFreeze®. With guaranteed delivery and real time tracking, you can now regain control of electronic communication.Read more about email2 All with customizable features (large file transfers, true message recall, etc.) enabled within existing email programs users are so familiar with: Microsoft Outlook®, Webmail, Blackberry®, etc.
- Unique non-invasive technology allows seamless secure communications with thousands of internal and external users.
- Enable security and unique productivity features within existing email programs that users are familiar with, deployed within minutes with minimal training and no user workflow changes.
- Allow secure messages sent in error to be completely recalled and removed from the recipient’s local email programs at any point during the life cycle of the conversation, even if the message has already been read.
McAfee cloud security software offers a scalable solution for IT teams in small and medium-sized companies. McAfee offer a number of SaaS products that provide desktop, email and web security for small businesses. Some of the McAfee for Small Business security products include: McAfee Email Protection, McAfee Web Protection, McAfee Total Protection… Read more about McAfee Cloud Securityfor Data Loss Prevention, McAfee Database Activity Monitoring, as well an integrated suite of products called McAfee Content Security Suite.
Panda Cloud Office Protection is cloud-based antivirus and endpoint protection that helps you forget security headaches – complexity, overhead, and threats. No servers needed - deploy and manage corporate antivirus and endpoint protection from anywhere via a web browser.Read more about Panda Cloud Office Protection Eliminate antivirus software-related system slowdowns.
Combine security from the cloud with traditional endpoint security to protect against the latest and most dangerous threats faster.
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.Read more about Security Event Manager
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.Read more about ManageEngine Log360
Remote access tool for individuals & small businesses
LogMeIn Pro is a remote access tool for individuals and small businesses which enables users to remotely control their computer from any location, and get full access to the desktop as well as all applications, files and information from another computer or mobile device.Read more about LogMeIn Pro
Keep track of everything that’s happening on your network – from when a user installs a piece of software they shouldn’t have, to when your printer’s toner level gets low! Spiceworks lets you monitor and receive alerts on all the network happenings you care about most!… Read more about Spiceworks
GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users.
Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews.
At GetApp, our comprehensive software listings, verified user reviews, product comparison pages, articles and AppFinder, our assistive tool, will empower you to make confident and well-informed purchase decisions.
Sign up / Sign in
Both new and existing users can sign in with LinkedIn.