getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software for Windows - Page 6

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


161 software options

Rzilient logo

IT management solution

learn more
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management.

Read more about Rzilient

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
ManageEngine DataSecurity Plus logo

Software for managing data visibility and security

learn more
ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.

Read more about ManageEngine DataSecurity Plus

Users also considered
east-tec Eraser logo

Securely delete Internet and PC activity traces.

learn more
By using east-tec Eraser as privacy protection software in your day-to-day activities, your data will be safe, and your offline and online privacy will be fully protected.

Read more about east-tec Eraser

Users also considered
RestoreX360 logo

Windows Repair Tool

learn more
RestoreX360 is an all-in-one software solution designed to help users maintain, repair, and optimize Windows operating systems. With its comprehensive toolkit, RestoreX360 targets a range of common system issues and provides solutions to maintain performance, system stability, and overall user experience.

Read more about RestoreX360

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
AdsPower logo

Anti-detection browser for multi-account eCommerce marketing

learn more
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints.

Read more about AdsPower

Users also considered
CloudJacket MDR logo

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
In today's digital landscape, organizations face an ever-evolving array of cyber threats. Secnap's CloudJacket MDR offers a comprehensive, AI-augmented security solution that combines advanced technology with 24/7 expert monitoring, delivering robust protection.

Read more about CloudJacket MDR

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE offers cellular SD-WAN and cybersecurity in an easily managed platform designed for agile businesses with small IT teams. It enables rapid network setup, integrates advanced zero trust security tools, and supports 4/5G traffic steering and network slicing capabilities.

Read more about Ericsson NetCloud Manager

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Bravura Privilege logo

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Bravura Privilege

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
Clearswift SECURE Email Gateway logo

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
ControTask logo

ControTask: Enhance Productivity, Simplify Management.

learn more
ControTask: A cloud-based employee monitoring tool enhancing business efficiency through real-time activity tracking, detailed productivity analysis, and streamlined user management. Its intuitive interface and compatibility with multiple platforms make it ideal for hassle-free workforce optimizatio

Read more about ControTask

Users also considered
Virtual Desktops logo

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
BitRaser logo

Wiping drives for secure data destruction.

learn more
BitRaser Drive Eraser is a certified tool for permanent data deletion from storage devices, ensuring compliance with data privacy laws like EU GDPR, GLBA, SOX, HIPAA, ISO27001, PCI DSS. It supports erasure from Laptops, Desktops, Macs (M1, M2, T2), and all drive types. The software provides a 100% tamper-proof erasure certificate and features a cloud console for user and license management, plus a repository for reports and certificates.

Read more about BitRaser

Users also considered
Cornerstone MFT Server logo

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
RedShield logo

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered