getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 10

Last updated: May 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


360 software options

SpinOne logo

All-in-One SaaS Security for Mission-Critical SaaS Apps

learn more
Spinbackup provides comprehensive Cloud-to-Cloud Backup and Cybersecurity protection from data loss and leaks for Google Workspace (formerly G Suite) or Office 365.

Read more about SpinOne

Users also considered
Incapsula logo

Safer, Faster Website

learn more
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.

Read more about Incapsula

Users also considered
SEKOIA.IO logo

Neutralize Cyber Threats Before Impact

learn more
SEKOIA.IO is a SecOps platform, designed to deliver comprehensive Detection and Response before impact.

Read more about SEKOIA.IO

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
Cyberday logo

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome is dedicated to empowering businesses with robust cybersecurity solutions, ensuring the safeguarding of sensitive data and critical operations. It establishes secure encrypted connections, and ensures secure remote access, shielding communications from potential threats.

Read more about PureDome

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
ThreatCop logo

Cloud-based security awareness training platform

learn more
Threatcop Security Awareness Training (TSAT) is a cloud-based security awareness training platform, designed to help organizations monitor the cybersecurity threat posture, create simulated attack campaigns, and train employees over multiple awareness modules.

Read more about ThreatCop

Users also considered
Office Protect logo

Be your client’s security hero without the heavy lifting.

learn more
Office Protect is a service that’s designed to help you secure your Microsoft 365 tenant. An exclusive Sherweb product, it provides best practice security settings, live monitoring, alerts & reporting.

Read more about Office Protect

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
Cisco Secure Cloud Analytics logo

Network security software for on-premise & cloud environment

learn more
Cisco Secure Cloud Analytics is a network security software, designed to help businesses automatically track threats across on-premises and cloud environments. It allows users to monitor internal and external threats, malware, policy violations, misconfigured cloud assets, blacklisted communication, and user misuse.

Read more about Cisco Secure Cloud Analytics

Users also considered
PhishER logo

Web-based phishing emergency platform

learn more
PhishER is a web-based Security Orchestration, Automation and Response (SOAR) platform designed to help security teams automate the prioritization of emails and respond to various threats. It groups and categorizes emails based on rules, tags and actions, allowing users to process user-reported suspicious and phishing emails in mailboxes across the entire organization.

Read more about PhishER

Users also considered
ManageEngine Key Manager Plus logo

Web-based SSH key and SSL certificate management solution

learn more
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Panther logo

Cloud-based security information and event management tool

learn more
Panther offers security event analysis and information management tools to assist IT experts in identifying potential threats and resolving security incidents. Key features include real-time monitoring, log management, access control, database security, malware detection, and alert tools.

Read more about Panther

Users also considered
Quick Heal AntiVirus Pro logo

AI-powered defense against viruses and malware

learn more
Quick Heal AntiVirus Pro is an AI-enabled antivirus software that provides cloud-based predictive malware hunting technology for protection against advanced cyber threats. It features multi-layered protection against zero-day attacks, viruses, phishing, and malware. Quick Heal AntiVirus Pro also includes external drive protection to block malware from external drives, firewall protection to secure networks, and browsing protection for safe web surfing.

Read more about Quick Heal AntiVirus Pro

Users also considered
Silverfort logo

Unify all enterprise identity protection

learn more
Silverfort is a unified identity protection platform providing automated service account discovery and protection without password rotation. It extends multi-factor authentication (MFA) to on-premises and cloud resources, including legacy systems and command-line tools. Silverfort detects identity threats in real-time and enforces adaptive MFA to stop attacks.

Read more about Silverfort

Users also considered
Endpoint Detection and Response logo

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
Pareto Security logo

Computer security software

learn more
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac.

Read more about Pareto Security

Users also considered
Rzilient logo

IT management solution

learn more
Rzilient, the next-generation IT management partner for small and medium-sized businesses to simplify, automate and secure your IT management.

Read more about Rzilient

Users also considered
SpectralOps logo

Code security software for code and cloud

learn more
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.

Read more about SpectralOps

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock is a cloud-based software that helps businesses in the German market manage security processes across multiple IT systems, including hard drives and mobile devices. DriveLock ensures that cyber attacks don't even make it into your IT. They stay where they belong: outside!

Read more about DriveLock

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
CylanceENDPOINT logo

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about CylanceENDPOINT

Users also considered

Popular cybersecurity comparisons