getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Phished Logo

Help us to build the human firewall

visit website

Phished Alternatives & Competitors (2026)

Top 2 free alternatives

Filter results

Features


Pricing model


Devices supported


User rating


Organization types


Integrated with


Industry


Company size


Acronis Cyber Protect logo

Integrated data protection and cybersecurity in one solution

visit website
logo
Acronis Cyber Protect
logo
Phished

0.5

4.2

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.3

Functionality

4.5

Vulnerability Scanning

5/5

Compliance Management

5/5

Data Security

4.5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

visit website
logo
ManageEngine Key Manager Plus
logo
Phished

1.2

3.5

Value for money

4.7
475
per feature/per year

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

4.0

Functionality

4.5

Activity Tracking

5/5

Access Controls/Permissions

5/5

Activity Dashboard

4.5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

visit website
logo
Fidelis Elevate
logo
Phished

0.3

5.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

5.0

Functionality

4.5

Threat Response

5/5

Threat Intelligence

5/5

Reporting/Analytics

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Fortra's Cloud Email Protection logo

Defend against advanced phishing attacks.

visit website
logo
Fortra's Cloud Email Protection
logo
Phished

0.4

4.3

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.3

4.8

Functionality

4.5

Email Filtering

4.8/5

Threat Protection

4.6/5

Phishing Protection

N/A

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

ManageEngine PAM360 logo

Privileged access management software

visit website
logo
ManageEngine PAM360
logo
Phished

0.3

5.0

Value for money

4.7
7995
flat rate

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.3

4.8

Functionality

4.5

Remote Monitoring & Management

5/5

Secure Data Storage

5/5

Self Service Portal

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Rzilient logo

IT management solution

learn more
logo
Rzilient
logo
Phished

0.7

4.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

4.0

Functionality

4.5

Cost Tracking

N/A

Compliance Tracking

N/A

Support Ticket Management

N/A

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Cohesity logo

Server backup and data management software

learn more
logo
Cohesity
logo
Phished

0.2

4.5

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.1

4.6

Functionality

4.5

VM Backup

5/5

Backup Log

5/5

Multiple Programming Languages Supported

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Phishing Tackle logo

Simulated phishing and security awareness training platform

learn more
logo
Phishing Tackle
logo
Phished

0.2

4.9

Value for money

4.7
30
/per month

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.7

Functionality

4.5

Risk Assessment

5/5

Alerts/Notifications

5/5

Reporting & Statistics

4.9/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Abnormal AI logo

A Fundamentally Different Approach to Email Security

learn more
logo
Abnormal AI
logo
Phished

0.3

5.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

5.0

Functionality

4.5

Threat Response

5/5

Spam Detection

5/5

Spam Blocker

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Exabeam New-Scale Fusion logo

Real Intelligence. Real Security. Real Fast.

learn more
logo
Exabeam New-Scale Fusion
logo
Phished

0.7

4.0

Value for money

4.7
75000
usage based/per year

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.3

Functionality

4.5

Real-Time Notifications

4/5

Compliance Tracking

N/A

Role-Based Permissions

N/A

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
logo
DriveLock
logo
Phished

0.8

3.9

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.1

4.4

Functionality

4.5

Secure Login

5/5

Incident Management

5/5

Event Analysis

4.7/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
logo
Secure Remote Worker
logo
Phished

0.3

5.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

5.0

Functionality

4.5

Screen Sharing

5/5

Remote Monitoring & Management

5/5

Remote Access/Control

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Orna logo

SaaS Cyber Incident Response platform, SOAR

learn more
logo
Orna
logo
Phished

0.3

5.0

Value for money

4.7
833
flat rate/per month

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

5.0

Functionality

4.5

Process/Workflow Automation

N/A

Prioritization

N/A

Incident Reporting

N/A

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

VMware Carbon Black Cloud logo

Cloud security solution

learn more
logo
VMware Carbon Black Cloud
logo
Phished

0.7

4.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.5

5.0

Functionality

4.5

Threat Intelligence

5/5

Reporting/Analytics

5/5

Cloud Application Security

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
logo
CODA Footprint
logo
Phished

0.3

5.0

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.7

Functionality

4.5

Security Auditing

5/5

Real-Time Reporting

5/5

Real-Time Monitoring

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Flashstart logo

DNS filtering software provider

learn more
logo
Flashstart
logo
Phished

0.1

4.8

Value for money

4.7
10
per user/per year

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.7

Functionality

4.5

Threat Protection

4.8/5

Whitelisting/Blacklisting

4.7/5

Anti Spam

4.6/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

1Fort logo

Cyber insurance made seamless

learn more
logo
1Fort
logo
Phished

0.3

5.0

Value for money

4.7
19
per user/per month

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.2

4.7

Functionality

4.5

Patch Management

N/A

Endpoint Protection

N/A

Data Security

N/A

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
logo
Jscrambler
logo
Phished

0.9

3.8

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.1

4.4

Functionality

4.5

Data Visualization

2/5

Compliance Management

1/5

Application Security

1/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Darktrace logo

AI-enabled network and cybersecurity solution

learn more
logo
Darktrace
logo
Phished

0.8

3.9

Value for money

4.7
Empty state illustration for "No pricing info"

No pricing info

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.1

4.4

Functionality

4.5

Whitelisting/Blacklisting

5/5

Monitoring

5/5

Data Security

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5

Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
logo
Red Sentry
logo
Phished
4.7

Value for money

4.7
4200
flat rate

Starting price

Empty state illustration for "No pricing info"

No pricing info

0.1

4.6

Functionality

4.5

API

5/5

Vulnerability Management

5/5

Third-Party Integrations

5/5

Top Features

Threat Intelligence

5/5

User Management

5/5

Risk Scoring

5/5