App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 6

182 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

ManageEngine PAM360 logo

ManageEngine PAM360

5.0
(2)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
Quantum Network Security logo

Quantum Network Security

5.0
(2)

Network security suite for cyber attack threat prevention

learn more
Quantum Network Security is a scalable suite of solutions that protect against Gen V cyber attacks across networks, endpoints, clouds, data centers, and more. The suite provides a unified management platform, SandBlast threat prevention, hyper-scale networking, plus VPN and IoT security. Quantum Network Security also offers security gateway appliances that can be installed in-office.

Read more about Quantum Network Security

Users also considered
heylogin logo

heylogin

5.0
(2)

Password manager without a master password for business

learn more
The easiest password manager you've ever used. Using a smartphone instead of a master password makes heylogin 2-factor secure by design. Just one swipe and you're logged in to any website.

Read more about heylogin

Users also considered
Tanium Endpoint Platform logo

Tanium Endpoint Platform

4.3
(3)

Endpoint and computer security software

learn more
Tanium Endpoint Platform is an on-premise and cloud-based computer security software that helps businesses manage incidents, track asset inventory, handle vulnerability, and more from within a unified platform

Read more about Tanium Endpoint Platform

Users also considered
Cisco Cloudlock logo

Cisco Cloudlock

4.5
(2)

Cloud access security broker

learn more
Cisco Cloudlock is an API-based cloud access security broker (CASB) that helps accelerate use of the cloud. It secures identities, data, and apps, and combats account compromises, breaches, and cloud app ecosystem risks.

Read more about Cisco Cloudlock

Users also considered
Pareto Security logo

Pareto Security

4.5
(2)

Computer security software

learn more
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac.

Read more about Pareto Security

Users also considered
CySight logo

CySight

4.5
(2)

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
IObit Uninstaller logo

IObit Uninstaller

4.5
(2)

Eliminate programs and provide safe browsing

learn more
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup.

Read more about IObit Uninstaller

Users also considered
Dhound logo

Dhound

5.0
(1)

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
SaaS Vulnerability Scanner logo

SaaS Vulnerability Scanner

5.0
(1)

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about SaaS Vulnerability Scanner

Users also considered
condignum logo

condignum

5.0
(1)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
IDA Pro logo

IDA Pro

5.0
(1)

A powerful disassembler and a versatile debugger.

learn more
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.

Read more about IDA Pro

Users also considered
CloudJacketX logo

CloudJacketX

5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketX

Users also considered
SYSVOOT Antivirus Pro logo

SYSVOOT Antivirus Pro

5.0
(1)

Your Freedom From Computer Viruses

learn more
Great protection with real time support. All at one price.

Read more about SYSVOOT Antivirus Pro

Users also considered
Fyde logo

Fyde

5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Shieldoo logo

Shieldoo

5.0
(1)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
Cyber Hawk logo

Cyber Hawk

4.0
(1)

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Anti-Executable logo

Anti-Executable

4.0
(1)

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
Hitachi ID Bravura Privilege logo

Hitachi ID Bravura Privilege

4.0
(1)

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Hitachi ID Bravura Privilege

Users also considered
StackRox logo

StackRox

4.0
(1)

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Clearswift SECURE Email Gateway logo

Clearswift SECURE Email Gateway

3.0
(1)

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
Qustodio for Schools logo

Qustodio for Schools

(0)

Information management and security for schools

learn more
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting.

Read more about Qustodio for Schools

Users also considered
Risk Assistant logo

Risk Assistant

(0)

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
ManageEngine Key Manager Plus logo

ManageEngine Key Manager Plus

(0)

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
SSI Kit logo

SSI Kit

(0)

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about SSI Kit

Users also considered