App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 7

219 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

ManageEngine DataSecurity Plus logo
4.0
(2)

Software for managing data visibility and security

learn more
ManageEngine DataSecurity Plus is a comprehensive platform designed to provide organizations with unified data visibility and security to help businesses protect their sensitive data and mitigate risks effectively.

Read more about ManageEngine DataSecurity Plus

Users also considered
Sentinel logo
4.0
(2)

Cloud-based SIEM solution

learn more
Sentinel is a plug-and-play Security Information and Event Management (SIEM) solution offered by Micro Focus that simplifies security monitoring and seamlessly integrates identity intelligence. It is a full-featured and adaptable solution that streamlines the day-to-day use of SIEM.

Read more about Sentinel

Users also considered
Dhound logo
5.0
(1)

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
CyberCAST logo
5.0
(1)

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Specops Secure Service Desk logo
5.0
(1)

Authentication solution for advance IT security

learn more
Specops Secure Service Desk hels businesses enforce and track user authentication at the service desk to guarantee that information, password resets and other sensitive credentials are not offered to unauthorized users. An additional layer of security with the Secure Service Desk is the ability to verify callers using authentication methods that remove opportunity for impersonation, as these can be completed remotely without access to biometrics.

Read more about Specops Secure Service Desk

Users also considered
Vulnerability Intelligence logo
5.0
(1)

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
IDA Pro logo
5.0
(1)

A powerful disassembler and a versatile debugger.

learn more
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.

Read more about IDA Pro

Users also considered
SYSVOOT Antivirus Pro logo
5.0
(1)

Your Freedom From Computer Viruses

learn more
Great protection with real time support. All at one price.

Read more about SYSVOOT Antivirus Pro

Users also considered
CloudJacketXi logo
5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketXi

Users also considered
SpyShelter logo
5.0
(1)

Detect and stop hidden spyware

learn more
SpyShelter is a Windows PC antispyware tool designed to safeguard users in real-time from a wide array of malware, spyware, and online threats, especially those aiming to capture keystrokes or gain access to confidential information.

Read more about SpyShelter

Users also considered
Ace Managed Security Services logo
5.0
(1)

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
Fyde logo
5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
Secure Remote Worker logo
5.0
(1)

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
east-tec Eraser logo
5.0
(1)

Securely delete Internet and PC activity traces.

learn more
By using east-tec Eraser as privacy protection software in your day-to-day activities, your data will be safe, and your offline and online privacy will be fully protected.

Read more about east-tec Eraser

Users also considered
Teleport logo
5.0
(1)

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Qustodio for Schools logo
4.0
(1)

Information management and security for schools

learn more
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting.

Read more about Qustodio for Schools

Users also considered
Cyber Hawk logo
4.0
(1)

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Anti-Executable logo
4.0
(1)

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
StackRox logo
4.0
(1)

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Hitachi ID Bravura Privilege logo
4.0
(1)

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Hitachi ID Bravura Privilege

Users also considered
Clearswift SECURE Email Gateway logo
3.0
(1)

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
SSI Kit logo
(0)

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about SSI Kit

Users also considered
Risk Assistant logo
(0)

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
Stellar Data Recovery Professional logo
3.1
(11)

Effective Data Recovery Software to retrieve any lost data

learn more
Stellar Data Recovery Professional is an ingenious and effective data recovery solution to recover any file type lost in any situation. It retrieves data from corrupted, formatted, or encrypted drive partitions and volumes. It effectively reclaims data from optical media like CD/DVD, etc.

Read more about Stellar Data Recovery Professional

Users also considered