getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 20

Last updated: April 2026

507 software options

Panzura logo

Award-winning hybrid, multi-cloud data management

learn more
Award-winning hybrid, multi-cloud data management platform. Panzura's cloud product suite includes CloudFS, Data Services, Smart Apps, and Global Services. Panzura solves all your most critical cloud data management challenges.

Read more about Panzura

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
YesWeHack logo

Global Bug Bounty and VDP Platform

learn more
YesWeHack is a global Bug Bounty and Vulnerability Management Platform that connects organizations to tens of thousands of ethical hackers worldwide. The aim is to uncover and patch vulnerabilities in websites, mobile apps, connected devices, and digital infrastructure, bolstering cyber defense strategies.

Read more about YesWeHack

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Cyqur logo

Password manager

learn more
Cyqur helps empower businesses with hacking prevention, 24x7 access, location control, and DLT proof of record for sensitive data like passwords, access credentials, and notes. The patented tech encrypts and fragments data across multiple user-owned cloud locations, rendering it useless if breached.

Read more about Cyqur

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
The Marvelous APS Software logo

The Marvelous APS Software for Production Capacity Planning

learn more
The Marvelous APS is an Advanced Production Capacity Planning & Production Scheduling Software

Read more about The Marvelous APS Software

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
MailGuard logo

Speed Matters. MailGuard stops threats 2- 48hrs faster.

learn more
MailGuard anticipates, predicts and learns from emerging zero-day threats like ransomware, phishing, spear-phishing, Business Email Compromise and similar malicious email-borne attacks, protecting email users from harm.

Read more about MailGuard

Users also considered
Verosint logo

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Yakabod Cyber Incident Manager logo

The best kept secret in case management

learn more
Yakabod's zero trust platform, facilitates secure collaboration without compromising sensitive data. The best kept secret in case management, tested and vetted for the past 17 years in securing sensitive data for insider threat, cyber incident management, counter-intelligence, and other use cases.

Read more about Yakabod Cyber Incident Manager

Users also considered
Insights logo

Threat Intelligence protects from attacks before disclosure

learn more
Leverage InQuest Threat Intelligence services to reduce time spent performing manual threat research. Improve your ability to predict, prevent, detect, prevent, hunt, and respond to emerging threats targeting your organization.

Read more about Insights

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Dasera logo

Automate, Govern, Secure: Protect Your Data with Dasera

learn more
Dasera is a cloud-based data discovery and management solution that provides organizations with the tools needed to navigate the complexities of data environments.

Read more about Dasera

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
Fingerprint logo

Identify fraud before it happens.

learn more
Fingerprint offers a comprehensive user profiling solution for both web and mobile platforms. Recognize 99.5% of returning visitors, and get the full view of your users behavior.

Read more about Fingerprint

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
Senteon logo

Cloud-based cybersecurity tool for managed service providers

learn more
Senteon is a cloud-based cybersecurity solution that helps managed service providers (MSPs) automate security configuration on a centralized interface. The platform utilizes artificial intelligence (AI) technology to help users conduct system evaluations and review non-compliant settings. Additionally, Senteon also provides compliance mappings, drift monitoring, remediation management, threat tracking, change history tracking, reporting, and more.

Read more about Senteon

Users also considered