getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software with Activity Dashboard (2026) - Page 4

Last updated: March 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


107 software options

MacKeeper logo

Antivirus and computer security solution for Mac users

learn more
MacKeeper is an antivirus solution that helps Mac users protect networks and digital assets from targeted attacks, malware, and other online threats. The application enables IT teams to block viruses, schedule scans, inspect files, and remove spyware, adware, and ransomware from systems.

Read more about MacKeeper

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

learn more
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
Isi-APP logo

Control your IT system with Isi-APP

learn more
Control your IT system with Isi-APP

Read more about Isi-APP

Users also considered
CloudConnexa logo

Cloud-delivered VPN service to connect private networks

learn more
CloudConnexa offers businesses a cloud-delivered VPN service integrating virtual networking and essential security functions. It enables Zero Trust access across private and SaaS applications, simplifies remote workforce connectivity, and negates the need for complex, hardware-based network management solutions.

Read more about CloudConnexa

Users also considered
Pareto Security logo

Computer security software

learn more
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac.

Read more about Pareto Security

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
Predictive logo

Unified security and observability SaaS solution

learn more
Predictive is a cloud-based vulnerability management software crafted to fortify organizations against cyber threats, delivering informed insights for decisive action.

Read more about Predictive

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE offers cellular SD-WAN and cybersecurity in an easily managed platform designed for agile businesses with small IT teams. It enables rapid network setup, integrates advanced zero trust security tools, and supports 4/5G traffic steering and network slicing capabilities.

Read more about Ericsson NetCloud Manager

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
Evidian logo

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
Securden Endpoint Privilege Manager logo

Endpoint privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about Securden Endpoint Privilege Manager

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Establish holistic computer security, manage access to privileged applications and admin privileges on Windows and Mac endpoints with Securden - whether theyre in the network or operate remotely.

Read more about Securden

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls

Read more about FortMesa

Users also considered
UnderDefense MAXI logo

One platform. All things cybersecurity.

learn more
UnderDefense MAXI allows businesses of all sizes to get full threat context delivered in 2 minutes, mean-time-to-contain reduced to 15 minutes, and 90% reduction in false positives. It unifies your existing stack to deliver confirmed threats with clear, actionable remediation steps.

Read more about UnderDefense MAXI

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered