getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 15

Last updated: April 2026

507 software options

Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
Vectra AI Platform logo

AI-driven network detection and response platform

learn more
Vectra AI detects and stops advanced cyberattacks that evade traditional security controls. Using AI-driven behavioral detection across hybrid environments, it identifies real attacker activity early, helping organizations reduce risk, prevent data exfiltration, and improve overall security outcomes

Read more about Vectra AI Platform

Users also considered
Arctic Wolf Managed Detection and Response logo

Security software for detecting and mitigating cyberattacks

learn more
Arctic Wolf Managed Detection and Response offers round-the-clock monitoring of networks, endpoints, and clouds to block cyberattacks. Integrating with existing tech, it identifies assets, gathers security data, and tracks threats continuously, allowing organizations to concentrate elsewhere. The system swiftly investigates and contains incidents, preventing escalation. It also aids in recovery, enhancing rules to bolster defenses against future threats.

Read more about Arctic Wolf Managed Detection and Response

Users also considered
Advisera logo

Web-based ISO compliance & document management solution

learn more
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards

Read more about Advisera

Users also considered
ThreatConnect TI Ops Platform logo

Built for operations, not just centralization.

learn more
TI Ops is the threat intelligence platform built for operations, not just centralization.

Read more about ThreatConnect TI Ops Platform

Users also considered
SpyWarrior logo

Anti-virus software

learn more
SpyWarrior is a comprehensive anti-malware solution designed to provide online protection and security against ransomware, viruses, trojans and other threats using AI algorithms and machine learning.

Read more about SpyWarrior

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches.

Read more about HTTPCS Cyber Vigilance

Users also considered
CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
Our fraud-prevention partner analyzes customers' PANs, purchase histories, locations, IP addresses, and payment origins to ensure no fraud occurs. TokenEx supports multiple, layered third-party integrations to combine tokenization with other services for maximum security and flexibility.

Read more about TokenEx

Users also considered
Google SecOps logo

Independent SOAR platform for security teams and engineers

learn more
Siemplify is an independent SOAR platform designed to help security teams manage case creation, investigation, remediation, and response processes to drive continuous improvement. It lets engineers automate repetitive processes related to the prevention, detection, and remediation of cyber threats using machine learning technology.

Read more about Google SecOps

Users also considered
SOAR+ logo

Security automation platform for the entire threat lifecycle

learn more
Security automation for the entire threat lifecycle.

Read more about SOAR+

Users also considered
Revulytics Compliance Intelligence logo

Cybersecurity tool for detecting compliance infringements

learn more
Revenera Compliance Intelligence is designed to help software providers detect software license compliance infringements. It enables IT professionals to gain actionable insights into the unpaid use of applications, create revenue generation strategies, and capture leads via a unified platform.

Read more about Revulytics Compliance Intelligence

Users also considered
Qostodian Recon logo

Scan, identify, and secure your sensitive data.

learn more
Qostodian Recon restores visibility and accelerates an organization’s ability to find and secure data even in the most remote locations. With Recon’s industry-leading scan times, security teams achieve immediate time to value and get contextualized results.

Read more about Qostodian Recon

Users also considered
zIPS logo

Software to manage secure access across mobile devices

learn more
Zimperium zIPS is a mobile threat defense (MTD) software designed to that helps enterprises provide and manage secure access to data and company systems across employees' mobile devices and applications.

Read more about zIPS

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
Area 1 logo

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
Agari Secure Email Cloud logo

Email security and cybersecurity software

learn more
Agari Secure Email Cloud is an email security and cybersecurity software that helps businesses in finance, healthcare, retail, legal, and IT industry segments identify and prevent spear phishing, account takeovers, and email compromise-based attacks. With the incident response functionality, staff members can prioritize tasks and conduct attachments, URLs, and sender forensics-based investigations.

Read more about Agari Secure Email Cloud

Users also considered
DEFENCE logo

Keep your business safe from cyber risks and compliant!

learn more
DEFENCE is the platform that allows you to fully manage cyber & IT security ensuring compliance with the highest standards in use.

Read more about DEFENCE

Users also considered
Volterra logo

Distributed cloud platform to deploy, secure and manage apps

learn more
Volterra is a cloud-based platform that helps businesses deploy, connect, secure, and operate applications across multiple clouds, hybrid, and edge environments. Features include network firewall, load balancing, single sign-on (SSO), bot management, team collaboration, and access control.

Read more about Volterra

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

With detailed visibility over user behavior, permissions, security states, and more, you can ensure your data is protected from internal and external threats.

Read more about Lepide Data Security Platform

Users also considered