App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 5

219 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

IObit Uninstaller logo
4.9
(10)

Eliminate programs and provide safe browsing

learn more
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup.

Read more about IObit Uninstaller

Users also considered
CyberArk Privileged Access Manager logo
4.3
(20)

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Manager

Users also considered
HiddenApp logo
4.7
(12)

Software for managing multiple devices

learn more
HiddenApp is a cloud-based solution designed to help businesses manage fleets of devices via a unified portal. It offers a host of features such as device monitoring, tracking, theft recovery, equipment tracing and locating, and more. Its anti-theft capability allows users to remotely lock and wipe devices.

Read more about HiddenApp

Users also considered
Mailinblack logo
4.7
(12)

Cloud-based & on-premise email protection software

learn more
Protecting businesses from malware, phishing, ransomware, and spam emails.

Read more about Mailinblack

Users also considered
USM Anywhere logo
4.4
(14)

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
TypingDNA ActiveLock logo
4.6
(11)

Customer identity and access management

learn more
ActiveLock continuously authenticates the workforce by the way they type to ensure only authorized users are accessing company endpoints. To secure the workforce, cybersecurity teams trust TypingDNA ActiveLock to ensure no one other than the authorized employee can ever access company devices, especially in remote environments.

Read more about TypingDNA ActiveLock

Users also considered
Indeni logo
4.5
(13)

The Automation Platform for IT

learn more
Indeni makes it easy to manage the infrastructure of digital businesses. Indeni Knowledge and Indeni Insight offers integrations to critical devices, built-in automation, and easy-to-read remediation instructions that allow IT users to move from reactive to proactive infrastructure management.

Read more about Indeni

Users also considered
Password Safe logo
4.7
(10)

Centralized management and control of all privileged account

learn more
BeyondTrust Password Safe combines privileged password and session management to discover, manage, and audit all privileged credential activity. Achieve complete control and accountability over privileged accounts

Read more about Password Safe

Users also considered
Qualys Cloud Platform logo
3.9
(27)

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Cortex XDR logo
4.4
(14)

Threat intelligence software for security teams

learn more
Cortex XDR (formerly Traps) is a threat intelligence software designed to help security teams integrate the system with network, endpoint, third-party, and cloud data to streamline investigations and prevent cyber attacks. The platform allows administrators to identify threats, isolate endpoints, and block malware across environments.

Read more about Cortex XDR

Users also considered
Kloudle logo
4.9
(8)

Automated Cloud Security for growing engineering teams

learn more
Kloudle automates the critical steps required for public cloud infrastructure. Engineers who use public cloud infra for their work get instant security capabilities.

Kloudle builds and maintains inventory, finds security misconfigs, and gives detailed steps to fix them.

Read more about Kloudle

Users also considered
ASPIA logo
5.0
(7)

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
Carbon Black Endpoint logo
5.0
(7)

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
ThreatAdvice Cybersecurity Education logo
4.3
(14)

Cybersecurity training platform

learn more
ThreatAdvice Cybersecurity Education is a software that helps businesses train employees about cyber threats. It includes courses for various aspects of cybersecurity, such as threat detection and prevention tactics and technologies, digital forensics investigations, privacy law compliance & more.

Read more about ThreatAdvice Cybersecurity Education

Users also considered
Cofense PhishMe logo
4.7
(9)

Security awareness training software for phishing attacks

learn more
Cofense PhishMe is a SaaS security awareness training software designed to help businesses educate employees about cyberattacks and threats through simulation. Executives can use board reports to gain insights into the company's performance and monitor the change in staff members' response towards phishing attacks.

Read more about Cofense PhishMe

Users also considered
AwareGO logo
4.5
(11)

Security awareness training for employees

learn more
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.

Read more about AwareGO

Users also considered
Barracuda Web Security Gateway logo
4.6
(9)

Cloud-based application protection solution

learn more
Barracuda Web Security Gateway is a cloud-based solution, which helps enterprises protect applications and social media platforms from various types of cyber threats, misused bandwidth issues, and malware, spyware, or virus attacks. Features include SSL filtering, traffic monitoring, tagging, and reporting.

Read more about Barracuda Web Security Gateway

Users also considered
Enginsight logo
5.0
(6)

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Liongard logo
4.6
(8)

Unleash teams to operate at 10X

learn more
Liongard gives MSPs an operational advantage that delivers both higher profits and an exceptional customer experience. Our Deep Data Platform unlocks the intelligence hidden deep within IT systems by transforming messy, hard-to-reach data into a unified, actionable source of intelligence.

Read more about Liongard

Users also considered
Jscrambler logo
4.4
(9)

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
JupiterOne logo
5.0
(5)

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
CWIS Antivirus Scanner logo
5.0
(5)

Web-based antivirus software for the IT industry

learn more
CWIS Antivirus Scanner is a web-based antivirus software that helps businesses in the IT industry streamline network security processes, such as website protection, vulnerability testing, and malware removal. It lets staff members fix hacked websites, detect spyware, perform blacklist checks, and more from a unified platform.

Read more about CWIS Antivirus Scanner

Users also considered
heylogin logo
5.0
(5)

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
Cisco Umbrella logo
4.4
(10)

Cloud-based cybersecurity and internet gateway software

learn more
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform.

Read more about Cisco Umbrella

Users also considered
Acronis Cyber Protect logo
4.7
(6)

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered