App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software with PCI Compliance

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

24 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

ConnectWise SIEM logo
4.6
(44)

Threat detection and response management software

visit website
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts.

Read more about WebTitan

Users also considered
Conecta Suite logo
4.8
(45)

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense is a leading USEM solution designed to help SecOps departments, MSPs, and IT professionals in organizations with 100-100,000 endpoints manage and secure their environment.

Read more about Syxsense

Users also considered
ThreatLocker logo
4.9
(38)

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
GateKeeper Enterprise logo
5.0
(26)

Proximity password, OTP, and 2FA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
EventSentry logo
5.0
(22)

Real-time log & event log hybrid SIEM monitoring solution

learn more
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more

Read more about EventSentry

Users also considered
Heimdal Threat Prevention logo
4.8
(25)

Advanced DNS Filtering for Your Perimeter and Endpoints.

learn more
A comprehensive DNS security solution that leverages cutting-edge technology to prevent future cyber-threats with unparalleled accuracy. Proprietary detection technologies power it to stop ransomware, data leaks, and network malware in their tracks.

Read more about Heimdal Threat Prevention

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
Probely logo
4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
HackEDU logo
4.5
(6)

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about HackEDU

Users also considered
ManageEngine EventLog Analyzer logo
4.8
(4)

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Holm Security VMP logo
4.4
(5)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
CloudJacketXi logo
5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketXi

Users also considered
Ace Managed Security Services logo
5.0
(1)

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
Fyde logo
5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Secure Remote Worker logo
5.0
(1)

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
DarkSight logo
(0)

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
RedShield logo
(0)

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered
Trend Micro Cloud One logo
(0)

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
Securden logo
(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
Cornerstone MFT Server logo
(0)

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
tbIAM logo
(0)

Cloud-based identity access management (IAM) software

learn more
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles and reset passwords.

Read more about tbIAM

Users also considered