App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Computer Security Software - Page 8

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

229 software options

Sponsored

Filter results




Pricing model




User rating


Personalize your search

Any industry

Any business size

Predictive logo

Unified security and observability SaaS solution

learn more
Predictive is a cloud-based vulnerability management software crafted to fortify organizations against cyber threats, delivering informed insights for decisive action.

Read more about Predictive

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Wiperapp logo

Data erasure solution

learn more
WIPERAPP is certified and secure data erasure software that complies with international standards like NIST 800-88. It securely erases data from HDD, SSD, NVMe, PC, and laptop drives to make data recovery impossible while allowing reuse of the drives. WIPERAPP offers centralized cloud management, lifetime licenses, and hot swap capability to erase multiple drives simultaneously.

Read more about Wiperapp

Users also considered
Dolphin Anty logo

Antidetect browser for multi-accounting

learn more
Manage any number of accounts for advertising platforms and social networks, Whitelist, Airdrop, Retrodrop, Web-scraping, Affiliate and more

Read more about Dolphin Anty

Users also considered
Qustodio for Schools logo

Information management and security for schools

learn more
Protect students across Mac, Windows, Chromebook, iOS, Kindle ad Android with dynamic web filtering and intelligent reporting.

Read more about Qustodio for Schools

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Anti-Executable logo

Platform to block unauthorized programs

learn more
Faronics Anti-Executable provides security beyond an antivirus by blocking unauthorized programs whether malicious, unlicensed or simply unwanted from ever executing.

Read more about Anti-Executable

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Bravura Privilege logo

Multi-Cloud PAM Software for Enterprises

learn more
Hitachi ID Bravura Privilege cloud architected PAM & PSM solution secures access to elevated privileges including administrator accounts & security groups.

Read more about Bravura Privilege

Users also considered
Clearswift SECURE Email Gateway logo

Computer security and secure email gateway software

learn more
Clearswift SECURE Email Gateway is a computer security software that helps busiensses manage data encryption, compliance, threat protection, and other operations on a centralized platform. It enables staff members to utilize the inspection engine to disassemble communication and manage data security across zip files and embedded documents.

Read more about Clearswift SECURE Email Gateway

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Risk Assistant logo

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
Blacklock logo

Effortless vulnerability scanner and pen-testing platform.

learn more
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner.

Read more about Blacklock

Users also considered
CimTrak Integrity Suite logo

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
EdgeConnect SD-WAN logo

Network and bandwidth management software

learn more
Aruba SD-WAN is a network management solution designed to help businesses streamline application performance, bandwidth, and SD-WAN orchestration operations. It allows companies to control their network traffic across any type of connection and can be used in conjunction with existing routers.

Read more about EdgeConnect SD-WAN

Users also considered
Bravura Pass logo

Bravura Pass simplifies enterprise password management

learn more
Adaptive SSO Authentication & FIM Solution

Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo.

Read more about Bravura Pass

Users also considered
Virtual Desktops logo

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
LiveEnsure logo

Four factor user authentication

learn more
Live Ensure protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks.

Read more about LiveEnsure

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
oneFirewall logo

Join The OneFirewall Alliance

learn more
By sharing CTI data and insights from over 90 security vendors in real time the OneFirewall Alliance is able to increase the overall levels of Security for all parties.
The portal allows users to manage risk and automatically block threats that existing defences were not aware of.

Read more about oneFirewall

Users also considered
BitRaser logo

Wiping drives for secure data destruction.

learn more
BitRaser Drive Eraser is a certified tool for permanent data deletion from storage devices, ensuring compliance with data privacy laws like EU GDPR, GLBA, SOX, HIPAA, ISO27001, PCI DSS. It supports erasure from Laptops, Desktops, Macs (M1, M2, T2), and all drive types. The software provides a 100% tamper-proof erasure certificate and features a cloud console for user and license management, plus a repository for reports and certificates.

Read more about BitRaser

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Netwrix Threat Manager (formerly StealthDEFEND) logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager (formerly StealthDEFEND)

Users also considered