App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Computer Security Software - Page 5

Last updated: February 2025

Filter results



Integrated with


Pricing model




User rating


231 software options

Cortex XDR logo

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
IObit Uninstaller logo

Eliminate programs and provide safe browsing

learn more
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup.

Read more about IObit Uninstaller

Users also considered
BlueFiles logo

File encryption and transfer for confidential data

learn more
BlueFiles is a Managed File Transfer (MFT) solution based on end-to-end encryption.

BlueFiles enables users to send encrypted files securely. BlueFiles is secure, easy to use, and allows users 100% privacy in their file exchanges.

Read more about BlueFiles

Users also considered
Cisco Secure Endpoint logo

Endpoint Detection and Response Security Solution

learn more
Cisco Secure Endpoint is a detection and response security solution that provides XDR capabilities, endpoint investigations, incident management, and more to prevent cyber attacks. With integrated vulnerability management and built in ThreatX hunting, Cisco Scure Endpoint pinpoints the origin of attacks to keep systems functional while thwarting harmful malware.

Read more about Cisco Secure Endpoint

Users also considered
Senturo logo

Senturo: Secure, Track, & Manage Your IT Fleet

learn more
Senturo protects Android, Apple, Chromebook & Windows devices with advanced security tools: location tracking, geofencing, & IP whitelisting. Track your fleet in real-time, enforce geo-compliance, & send urgent device alerts - all from a unified platform, ensuring ulimate IT fleet control.

Read more about Senturo

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Specops uReset logo

Sel-service password reset solution

learn more
Our enterprise self-service password reset solution allows users to securely reset their Active Directory passwords themselves. The product can be used for the purpose of updating local cached credentials, even when they are off VPN. This can be done by initiating the reset process right from the Windows logon screen on their workstations. With security features like multi-factor authentication and geo-blocking, Specops uReset is a perfect fit for organizations that take security very seriously.

Read more about Specops uReset

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
TypingDNA ActiveLock logo

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
BlueCat logo

Centralized, automated, and secure DDI

learn more
BlueCat helps enterprises achieve their network modernization objectives by delivering innovative products and services that enable networking, security, and DevOps teams to deliver change-ready networks with improved flexibility, automation, resiliency, and security.

Read more about BlueCat

Users also considered
Mailinblack logo

Cloud-based & on-premise email protection software

learn more
Mailinblack is a cloud-based and on-premise email protection software, which helps organizations check incoming emails for spam or viruses and automatically sort them in inboxes. Features include anti-spear phishing, newsletter categorization, notifications, reporting and analytics.

Read more about Mailinblack

Users also considered
Password Safe logo

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
Kloudle logo

Automated Cloud Security for growing engineering teams

learn more
Kloudle automates the critical steps required for public cloud infrastructure. Engineers who use public cloud infra for their work get instant security capabilities.

Kloudle builds and maintains inventory, finds security misconfigs, and gives detailed steps to fix them.

Read more about Kloudle

Users also considered
Cisco Umbrella logo

Cisco DNS security is proven and deploys fast.

learn more
With 30,000+ customers, our DNS-layer security is proven and deploys fast. Processing 600+ billion requests daily, Umbrella ranks #1 in DNS security in GigaOM's new study. Also, Miercom ranks us #1 in SSE threat efficacy.

Read more about Cisco Umbrella

Users also considered
ASPIA logo

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
Wiperapp logo

Data erasure solution

learn more
WIPERAPP is certified and secure data erasure software that complies with international standards like NIST 800-88. It securely erases data from HDD, SSD, NVMe, PC, and laptop drives to make data recovery impossible while allowing reuse of the drives. WIPERAPP offers centralized cloud management, lifetime licenses, and hot swap capability to erase multiple drives simultaneously.

Read more about Wiperapp

Users also considered
ThreatAdvice Cybersecurity Education logo

Cybersecurity training platform

learn more
ThreatAdvice Cybersecurity Education is a software that helps businesses train employees about cyber threats. It includes courses for various aspects of cybersecurity, such as threat detection and prevention tactics and technologies, digital forensics investigations, privacy law compliance & more.

Read more about ThreatAdvice Cybersecurity Education

Users also considered
Liongard logo

Unleash teams to operate at 10X

learn more
Liongard gives MSPs an operational advantage that delivers both higher profits and an exceptional customer experience. Our Deep Data Platform unlocks the intelligence hidden deep within IT systems by transforming messy, hard-to-reach data into a unified, actionable source of intelligence.

Read more about Liongard

Users also considered
Cofense PhishMe logo

Security awareness training software for phishing attacks

learn more
Cofense PhishMe is a SaaS security awareness training software designed to help businesses educate employees about cyberattacks and threats through simulation. Executives can use board reports to gain insights into the company's performance and monitor the change in staff members' response towards phishing attacks.

Read more about Cofense PhishMe

Users also considered
AwareGO logo

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Barracuda Web Security Gateway logo

Cloud-based application protection solution

learn more
Barracuda Web Security Gateway is a cloud-based solution, which helps enterprises protect applications and social media platforms from various types of cyber threats, misused bandwidth issues, and malware, spyware, or virus attacks. Features include SSL filtering, traffic monitoring, tagging, and reporting.

Read more about Barracuda Web Security Gateway

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered