App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 8

205 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Aruba SD-WAN logo

Aruba SD-WAN

(0)

Network and bandwidth management software

learn more
Aruba SD-WAN is a network management solution designed to help businesses streamline application performance, bandwidth, and SD-WAN orchestration operations. It allows companies to control their network traffic across any type of connection and can be used in conjunction with existing routers.

Read more about Aruba SD-WAN

Users also considered
Virtual Desktops logo

Virtual Desktops

(0)

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
CimTrak Integrity Suite logo

CimTrak Integrity Suite

(0)

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
iBoostUp logo

iBoostUp

(0)

Utility tool for optimizing, tuning & protecting Mac devices

learn more
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you.

Read more about iBoostUp

Users also considered
Trend Micro Cloud One logo

Trend Micro Cloud One

(0)

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
BroShield logo

BroShield

(0)

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
Systancia Cleanroom logo

Systancia Cleanroom

(0)

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
Cyberelements logo

Cyberelements

(0)

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
Verimatrix Code Shield logo

Verimatrix Code Shield

(0)

Secure your code with an enterprise grade security toolkit

learn more
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process.

Read more about Verimatrix Code Shield

Users also considered
FortMesa logo

FortMesa

(0)

Cybersecurity software

learn more
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls

Read more about FortMesa

Users also considered
Securden logo

Securden

(0)

Remote monitoring and management software

learn more
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Users also considered
PerimeterX logo

PerimeterX

(0)

Online platform for automated attack protection & mitigation

learn more
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital skimming and Magecart, skewed analytics, and other types of threats.

Read more about PerimeterX

Users also considered
RedShield logo

RedShield

(0)

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered
EmpowerID logo

EmpowerID

(0)

Identity management & cloud security suite of tools with MFA

learn more
EmpowerID is an identity management and cloud security suite of tools designed to help businesses in healthcare, manufacturing, retail, banking, finance, and other industries manage passwords, groups, risks, permissions, roles, and more to access cloud and on-premise applications.

Read more about EmpowerID

Users also considered
SpamTitan Plus logo

SpamTitan Plus

(0)

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
Cornerstone MFT Server logo

Cornerstone MFT Server

(0)

Network security and managed file transfer solution

learn more
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption.

Read more about Cornerstone MFT Server

Users also considered
GetSecured logo

GetSecured

(0)

Trace vulnerabilities, Assets and Data Breaches

learn more
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues.

Read more about GetSecured

Users also considered
Evidian logo

Evidian

(0)

Identity and access management platform

learn more
Evidian is a cloud-based and on-premise identity and access management suite that helps enterprises across government, telecommunication, healthcare, and various other industries securely manage and authenticate user identities.

Read more about Evidian

Users also considered
Polar Security logo

Polar Security

(0)

See, follow and protect cloud-native data

learn more
A software solution that helps businesses automate data security and compliance through discovery, mapping, labeling, risk mitigation, and protecting data assets.

Read more about Polar Security

Users also considered
Prove logo

Prove

(0)

Phone-Centric Identity Platform

learn more
Prove's Phone-Centric Identity platform helps companies mitigate fraud while accelerating revenue and reducing OPEX across mobile, desktop, tablet, contact center, and in-store channels.

Read more about Prove

Users also considered
tbIAM logo

tbIAM

(0)

Cloud-based identity access management (IAM) software

learn more
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles and reset passwords.

Read more about tbIAM

Users also considered
CloudPassage Halo logo

CloudPassage Halo

(0)

Instant Visibility, Continuous Protection

learn more
CloudPassage® Halo® is the world’s leading security and compliance automation platform that provides instant visibility and continuous protection for servers.

Read more about CloudPassage Halo

Users also considered
AdsPower logo

AdsPower

(0)

Anti-detection browser for multi-account eCommerce marketing

learn more
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints.

Read more about AdsPower

Users also considered
EndPoint Privilege Manager logo

EndPoint Privilege Manager

(0)

Privilege access management solution

learn more
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.

Read more about EndPoint Privilege Manager

Users also considered
iPrism Web Security logo

iPrism Web Security

(0)

Computer and network security management software

learn more
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs).

Read more about iPrism Web Security

Users also considered