App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 6

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

223 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Beyond DLP logo
4.8
(5)

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
PA File Sight logo
4.8
(5)

Windows-based ransomware protection & access auditing tool

learn more
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access.

Read more about PA File Sight

Users also considered
Guardz logo
5.0
(4)

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
HackEDU logo
4.5
(6)

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about HackEDU

Users also considered
WhiteSource logo
4.3
(7)

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about WhiteSource

Users also considered
MacKeeper logo
4.6
(5)

Antivirus and computer security solution for Mac users

learn more
MacKeeper is an antivirus solution that helps Mac users protect networks and digital assets from targeted attacks, malware, and other online threats. The application enables IT teams to block viruses, schedule scans, inspect files, and remove spyware, adware, and ransomware from systems.

Read more about MacKeeper

Users also considered
ManageEngine EventLog Analyzer logo
4.8
(4)

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Holm Security VMP logo
4.4
(5)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
CODA Footprint logo
5.0
(3)

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
condignum logo
5.0
(3)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Cynet 360 logo
5.0
(3)

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
CAST Highlight logo
5.0
(3)

The control tower for your application portfolio.

learn more
CAST Highlight is a SaaS software intelligence product for rapid application portfolio analysis and Software Composition Analysis (SCA).

Read more about CAST Highlight

Users also considered
VaultCore logo
5.0
(3)

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
SpyShelter logo
5.0
(3)

Detect and stop hidden spyware.

learn more
SpyShelter is a powerful antispyware tool for Windows PCs, offering real-time protection against a broad spectrum of malware, spyware, and online threats.

Read more about SpyShelter

Users also considered
Hitachi ID Bravura Identity logo
4.2
(5)

Identity administration & access governance with automation

learn more
Bravura Identity is an integrated solution for managing identities, groups and security entitlements across systems and applications. It ensures that users are granted access quickly, that entitlements are appropriate to business need and that access is revoked once no longer needed.

Read more about Hitachi ID Bravura Identity

Users also considered
Tanium Endpoint Platform logo
4.3
(4)

Endpoint and computer security software

learn more
Tanium Endpoint Platform is an on-premise and cloud-based computer security software that helps businesses manage incidents, track asset inventory, handle vulnerability, and more from within a unified platform

Read more about Tanium Endpoint Platform

Users also considered
Isi-APP logo
5.0
(2)

Control your IT system with Isi-APP

learn more
Control your IT system with Isi-APP

Read more about Isi-APP

Users also considered
Quantum Network Security logo
5.0
(2)

Network security suite for cyber attack threat prevention

learn more
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.

Read more about Quantum Network Security

Users also considered
Shieldoo logo
5.0
(2)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
ISS logo
4.3
(3)

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
Stellar Data Recovery Professional logo
2.9
(12)

Effective Data Recovery Software to retrieve any lost data

learn more
Stellar Data Recovery Professional is an ingenious and effective data recovery solution to recover any file type lost in any situation. It retrieves data from corrupted, formatted, or encrypted drive partitions and volumes. It effectively reclaims data from optical media like CD/DVD, etc.

Read more about Stellar Data Recovery Professional

Users also considered
Cisco Cloudlock logo
4.5
(2)

Cloud access security broker

learn more
Cisco Cloudlock is an API-based cloud access security broker (CASB) that helps accelerate use of the cloud. It secures identities, data, and apps, and combats account compromises, breaches, and cloud app ecosystem risks.

Read more about Cisco Cloudlock

Users also considered
CySight logo
4.5
(2)

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Pareto Security logo
4.5
(2)

Computer security software

learn more
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac.

Read more about Pareto Security

Users also considered
Rzilient logo
4.5
(2)

IT management solution

learn more
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management.

Read more about Rzilient

Users also considered