App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software with Role-Based Permissions

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

26 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

LastPass logo
4.6
(2.7K)

Integrated Access and Authentication

learn more
Integrated access and authentication for complete control and visibility, an all-in-one solution to address your identity and access management needs.

Read more about LastPass

Users also considered
NinjaOne logo
4.8
(204)

The Easiest-to-Use Unified IT Operations Solution

learn more
NinjaOne is the world's easiest-to-use unified IT operations platform. IT leaders use Ninja to maintain infrastructure, manage endpoints, and support end-users in a single, seamless solution that improves technician efficiency, enables automation, and improves end-user satisfaction.

Read more about NinjaOne

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess creates a secure network infrastructure that hides your business systems, assets and resources from the internet. In 10 minutes you create a private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Action1 logo
4.9
(95)

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
Passportal logo
4.4
(89)

Encrypted cloud-based, automated password protection

learn more
N-able Passportal + Documentation Manager is a cloud-based password protection solution designed for managed service providers (MSPs), which offers password change automation, credential injection, auditing, reporting, and privileged client documentation capabilities

Read more about Passportal

Users also considered
ConnectWise Automate logo
4.1
(126)

IT Automation for Today’s IT World

learn more
Don’t let security threats go undetected in your clients’ IT network. Deliver effective threat protection with best-in-class antivirus & anti-malware solutions.

Read more about ConnectWise Automate

Users also considered
Conecta Suite logo
4.8
(45)

Connect management to technology

learn more
Cloud-based email signatures platform that helps businesses of all sizes and industries that use Google Workspace. It includes several functions such as creating email signatures, editing absence messages, creating custom groups, and more. Avoid labor lawsuits and data breaches.

Read more about Conecta Suite

Users also considered
GateKeeper Enterprise logo
5.0
(26)

Proximity password, OTP, and 2FA wireless token.

learn more
GateKeeper Enterprise is an access management software which helps businesses in healthcare, manufacturing, and other industries handle proximity-based authentication for PCs and websites. It enables organizations to automatically lock employees’ unattended devices and securely store passwords.

Read more about GateKeeper Enterprise

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
Computer security implementation with NordLayer enables protection measures of computer systems and information within the network. NordLayer solution established security procedures to monitor and control identity access and authorized use of company systems.

Read more about NordLayer

Users also considered
ManageEngine ADAudit Plus logo
4.3
(43)

Active Directory change audit and reporting software

learn more
ManageEngine ADAudit Plus is a change audit software that provides detailed reports for changes made in Windows Active Directory and real-time compliance audits

Read more about ManageEngine ADAudit Plus

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
RG System logo
4.8
(13)

French unified IT management platform for MSP and IT pros

learn more
RG System's SaaS IT management portal offers MSPs, IT professionals and Office automation company complementary RMM, Microsoft 365 Data backup and recovery, cybersecurity and remote control functions in a single portal.

Read more about RG System

Users also considered
Specops Password Policy logo
4.8
(12)

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
BlueFiles logo
5.0
(10)

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
CAST Highlight logo
5.0
(3)

The control tower for your application portfolio.

learn more
CAST Highlight is a SaaS software intelligence product for rapid application portfolio analysis and Software Composition Analysis (SCA).

Read more about CAST Highlight

Users also considered
VaultCore logo
5.0
(3)

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
Shieldoo logo
5.0
(2)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
Secure Remote Worker logo
5.0
(1)

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
ManageEngine Key Manager Plus logo
(0)

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
Trend Micro Cloud One logo
(0)

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
Cyberelements logo
(0)

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Securden logo
(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
EmpowerID logo
(0)

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
tbIAM logo
(0)

Cloud-based identity access management (IAM) software

learn more
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles and reset passwords.

Read more about tbIAM

Users also considered