App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 4

220 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

UserLock logo
4.5
(31)

Multi-Factor Authentication and Access Management

learn more
UserLock allows businesses to verify the identity of all Active Directory users with strong multi-factor authentication and access management on Windows logon, Remote Desktop (RDP & RD Gateway), IIS, VPN, and Cloud Applications.

Read more about UserLock

Users also considered
Acunetix logo
4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
BLACKbox logo
4.4
(32)

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
Lockwell logo
4.6
(25)

Cloud-based cybersecurity platform

learn more
Lockwell is a cybersecurity platform designed to safeguard businesses from various cyber threats, such as phishing, malware, and ransomware. It caters to businesses of all sizes and manages time and resource consumption.

Read more about Lockwell

Users also considered
Specops Password Auditor logo
4.8
(19)

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
DriveStrike logo
4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
ManageEngine Vulnerability Manager Plus logo
4.7
(23)

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
INLYSE Malware.AI logo
5.0
(14)

VISUAL AI BASED MALWARE DETECTION

learn more
INLYSE Malware.AI is a revolutionary visual AI-based malware detection solution that utilizes cutting-edge technology to convert files into graphical representations and analyze them comprehensively for any signs of malware.

Read more about INLYSE Malware.AI

Users also considered
Proofpoint Email Protection logo
4.2
(36)

Secure email gateway management and threat intelligence tool

learn more
Proofpoint Email Protection is a computer security management software designed to help businesses identify and block threats using AI-enabled tools. It offers an advanced business email compromise (BEC) defense feature, which enables administrators to analyze various attributes including message header and senders’ IP address.

Read more about Proofpoint Email Protection

Users also considered
Invicti logo
4.7
(18)

Security scanning & vulnerability management

learn more
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Apex One logo
4.4
(25)

Endpoint protection and threat intelligence software

learn more
Apex One is an endpoint detection and response software designed to help businesses detect and investigate threats and protect the system against fileless and ransomware attacks. The platform offers a host-based intrusion prevention system (HIPS), which enables administrators to virtually patch vulnerabilities.

Read more about Apex One

Users also considered
Bitium logo
4.6
(18)

Cloud-based identity management software

learn more
Bitium is a cloud-based identity platform that includes single sign-on, password management, and analytics for companies of all sizes. It provides the ability to manage access to various web-based applications including Salesforce, Google Apps for Work, Office 365, and Slack.

Read more about Bitium

Users also considered
Black Duck logo
4.2
(29)

Build secure, high-quality software faster.

learn more
Black Duck is an open source management software for DevSecOps teams to discover, monitor, and manage open source security vulnerabilities and license compliance. This complex and thorough solution seamlessly integrates into your development processes in order to identify and fix critical risks.

Read more about Black Duck

Users also considered
ManageEngine Password Manager Pro logo
4.4
(23)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
Probely logo
4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
Nfina Technologies logo
5.0
(11)

Nfina is an IT infrastructure platform provider.

learn more
A platform for IT infrastructure called Nfina offers cyber resilience for business continuity. Edge, computer servers, HCI appliances, hybrid cloud, storage, IaaS, HaaS, STaaS, and DRaaS are just a few of our solutions and data security services.

Read more about Nfina Technologies

Users also considered
Advanced SystemCare Ultimate logo
4.5
(17)

Antivirus system for real-time Windows protection.

learn more
Advanced SystemCare Ultimate is an antivirus solution for Windows PCs that provides real-time browsing protection and prevents threats such as Trojans, ransomware, and spyware from invading the user's machine and putting their privacy and data at risk.

Read more about Advanced SystemCare Ultimate

Users also considered
RG System logo
4.8
(13)

French unified IT management platform for MSP and IT pros

learn more
RG System's SaaS IT management portal offers MSPs, IT professionals and Office automation company complementary RMM, Microsoft 365 Data backup and recovery, cybersecurity and remote control functions in a single portal.

Read more about RG System

Users also considered
Elastic Security logo
4.8
(13)

Security at the speed of Elastic

learn more
Unify SIEM, endpoint security, and cloud security
Elastic Security modernizes security operations

Read more about Elastic Security

Users also considered
Specops Password Policy logo
4.8
(12)

Software for creating and managing password policies

learn more
Specops Password Policy is a cloud-based software designed to help organizations ensure password security in the Active Directory environment. The platform allows users to create and establish multiple password policies and group policies. Users can configure rules by GPO level, group, user, or computer with custom password complexity, dictionaries, and passphrase settings.

Read more about Specops Password Policy

Users also considered
BlueFiles logo
5.0
(10)

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Aruba AirWave logo
4.6
(14)

Software for managing wireless networks

learn more
Aruba AirWave is a cloud-based software designed to help organizations discover, configure and monitor their entire wireless network. The platform allows users to utilize multiple monitoring screens to view real-time data and trend reports for every user, device, and segment across their network.

Read more about Aruba AirWave

Users also considered
Avast Business CloudCare logo
4.1
(28)

Cybersecurity detection solution with threat diagnostics

learn more
Avast Business Cloudcare is a cloud-based security solution designed for small and midsize businesses (SMBs) that provides advanced protection against cyber threats. It features proactive malware detection, which monitors your network activities in real time to identify threats at an early stage of infection. The software also allows users to create policies and firewalls, allowing you to control employee behavior while they're accessing the internet.

Read more about Avast Business CloudCare

Users also considered
Cisco Secure Endpoint logo
4.7
(13)

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered