getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security

Filter results

25 software options

ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Establish holistic computer security, manage access to privileged applications and admin privileges on Windows and Mac endpoints with Securden - whether theyre in the network or operate remotely.

Read more about Securden

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
DriveStrike logo

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
BlueCat logo

Centralized, automated, and secure DDI

learn more
BlueCat helps enterprises achieve their network modernization objectives by delivering innovative products and services that enable networking, security, and DevOps teams to deliver change-ready networks with improved flexibility, automation, resiliency, and security.

Read more about BlueCat

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Keeper Security logo

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about Securden Endpoint Privilege Manager

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Malwarebytes for Teams logo

Advanced malware protection for small businesses.

learn more
Malwarebytes for Teams is a behavior-based antivirus platform that provides advanced threat detection and prevention capabilities against malware,
ransomware, and hackers.

Read more about Malwarebytes for Teams

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Splunk Enterprise logo

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

learn more
NinjaOne Endpoint Management enables IT organizations of all sizes and experience levels to take a more proactive approach to IT management, which yields significant efficiency gains, improved user satisfaction and a stronger security posture.

Read more about NinjaOne

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered
ManageEngine ADAudit Plus logo

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits.

Read more about ManageEngine ADAudit Plus

Users also considered
ManageEngine Password Manager Pro logo

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
UnderDefense MAXI logo

One platform. All things cybersecurity.

learn more
UnderDefense MAXI allows businesses of all sizes to get full threat context delivered in 2 minutes, mean-time-to-contain reduced to 15 minutes, and 90% reduction in false positives. It unifies your existing stack to deliver confirmed threats with clear, actionable remediation steps.

Read more about UnderDefense MAXI

Users also considered
Citrix Workspace logo

Digital workspace & workflow management platform

learn more
Citrix Workspace is a cloud-based platform designed to help businesses streamline work for employees by offering collaboration across different systems & devices. Key features include endpoint management, session performance tracking, multi-factor authentication, microapp creation, & monitoring.

Read more about Citrix Workspace

Users also considered
EmpowerID logo

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
ThreatLocker logo

Zero trust cybersecurity platform for enterprise

learn more
ThreatLocker is a Zero Trust cybersecurity platform using a deny-by-default approach. It features application allowlisting to block unauthorized software, Ringfencing™ to contain trusted apps and prevent exploitation, and Network Control to manage port access and block rogue devices. Organizations can ensure compliance with regulations while protecting against threats like ransomware and zero-day vulnerabilities.

Read more about ThreatLocker

Users also considered

Popular computer security comparisons