getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


17 software options

AwareGO logo

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
JumpCloud Directory Platform logo

A cloud directory platform for secure access to resources

learn more
Two-way TLS authentication and encryption to third-party assessments and independent audits (e.g. Type 1 SOC)

Read more about JumpCloud Directory Platform

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Vade logo

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
NordLayer logo

Cloud-based network security platform for businesses

learn more
Computer security implementation with NordLayer enables protection measures of computer systems and information within the network. NordLayer solution established security procedures to monitor and control identity access and authorized use of company systems.

Read more about NordLayer

Users also considered
heylogin logo

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Bitium logo

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
Beyond DLP logo

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
Iru logo

Collapse the IT stack with Iru.

learn more
AI-powered platform that unifies identity, endpoints, and compliance—giving IT teams time and control back.

Read more about Iru

Users also considered
Conecta Suite logo

Manage your company's Google and Microsoft users all in one

learn more
Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.

Read more about Conecta Suite

Users also considered
Radiant Security logo

Cloud-based computer security tool for SOC teams.

learn more
Radiant Security is a cloud-based computer security solution that helps businesses detect and manage security incidents via artificial intelligence (AI). The solution helps automate the triage of alerts to ensure threat detection and response. It helps administrators investigate every alert, identify genuine incidents, delineate their root cause, and track attack paths. Radiant Security also provides incident analysis and response capabilities to manage the remediation process.

Read more about Radiant Security

Users also considered
UnderDefense MAXI logo

One platform. All things cybersecurity.

learn more
UnderDefense MAXI allows businesses of all sizes to get full threat context delivered in 2 minutes, mean-time-to-contain reduced to 15 minutes, and 90% reduction in false positives. It unifies your existing stack to deliver confirmed threats with clear, actionable remediation steps.

Read more about UnderDefense MAXI

Users also considered
Citrix Workspace logo

Digital workspace & workflow management platform

learn more
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.

Read more about Citrix Workspace

Users also considered

Popular computer security comparisons