getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 8

Last updated: May 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


360 software options

Arsen logo

Effective phishing training awareness platform

learn more
Arsen is a phishing training awareness SaaS allowing CISOs and cybersecurity expert to create realistic looking phishing simulations and improve their resiliency against phishing attacks.

Read more about Arsen

Users also considered
Havoc Shield logo

All-in-one cybersecurity platform for financial services

learn more
Havoc Shield quickly removes the fear and risk of a lacking cybersecurity program by providing you an industry-compliant plan, expert guidance, and seamless implementation of cohesive tools in an all-in one-platform built for non-security leaders on a tight timeline.

Read more about Havoc Shield

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
ChatMail logo

Engineered for Security. Designed for Privacy.

learn more
ChatMail is a custom-built secure communications app, with reinforced device security. ChatMail encrypts your calls, messages, group chats, photos, and notes.

Read more about ChatMail

Users also considered
Modshield SB logo

Cybersecurity platform to detect and remediate threats

learn more
Modshield SB is a web application firewall (WAF) designed to help organizations monitor traffic and protect hosting infrastructure and applications from unauthorized access and credential stuffing attacks. Features include bot protection, compliance metrics, raw logs, geo IP feeds & DoS protection.

Read more about Modshield SB

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Versa SASE logo

Connect. Protect. Simplify.

learn more
Versa focuses on helping enterprises simplify how you protect users, devices, sites and connect them to workloads & applications, anywhere, anytime.

Read more about Versa SASE

Users also considered
Argon logo

Holistic security for CI/CD pipeline

learn more
Argon connects to development environments and tools. It protects the entire CI/CD pipeline from code manipulation misconfigurations, code leaks, and vulnerabilities. This solution enables smooth AppSec orchestration by providing a unified view, full visibility, security, and code integrity.

Read more about Argon

Users also considered
Silent Armor logo

AI-Powered Perimeter Defense

learn more
Silent Armor leverages advanced artificial intelligence to safeguard your digital assets 24/7/365. By analyzing hundreds of security metrics across your attack surface, our AI predicts and prevents breaches before they happen - keeping your organization secure with intelligent, real-time defense.

Read more about Silent Armor

Users also considered
Secure Remote Worker logo

Secure Endpoints for Remote & In-Office Environments

learn more
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.

Read more about Secure Remote Worker

Users also considered
VMware Carbon Black Cloud logo

Cloud security solution

learn more
VMware Carbon Black Cloud is a cloud-based workload, endpoint and container protection platform that enables organizations to automatically detect threats, remediate vulnerabilities and more.

Read more about VMware Carbon Black Cloud

Users also considered
Staff.Wiki logo

Policy and Procedure Intelligence Platform

learn more
Staff.Wiki is your Policies & Procedures platform for distributing policies to users and clients, w/ approval workflow, attestation, quizzes, training, checklists, and AI generation!

Read more about Staff.Wiki

Users also considered
Universal SSH Key Manager logo

Cybersecurity and key management software

learn more
Universal SSH Key Manager is a cybersecurity software that helps businesses automate governing of SSH keys according to compliance and security standards. It allows teams to create new SSH keys, import existing ones, generate new ones for each server, and export them in different formats such as OpenSSH format and JSON format.

Read more about Universal SSH Key Manager

Users also considered
ManageEngine Application Control Plus logo

Endpoint protection tool for security teams.

learn more
ManageEngine Application Control Plus is a cloud-based and on-premise software that enables businesses to gain control over software usage and mitigate security risks.

Read more about ManageEngine Application Control Plus

Users also considered
Specops Secure Service Desk logo

Authentication solution for advance IT security

learn more
Specops Secure Service Desk hels businesses enforce and track user authentication at the service desk to guarantee that information, password resets and other sensitive credentials are not offered to unauthorized users. An additional layer of security with the Secure Service Desk is the ability to verify callers using authentication methods that remove opportunity for impersonation, as these can be completed remotely without access to biometrics.

Read more about Specops Secure Service Desk

Users also considered
Defendify logo

All-in-one cybersecurity platform

learn more
Defendify offers comprehensive cybersecurity protection with layers of security including threat detection, security awareness training, assessments, and incident response support. Backed by automation and expert guidance, the platform aims to strengthen security posture across people, processes, and technology.

Read more about Defendify

Users also considered
Ace Managed Security Services logo

Tech-enabled managed security services

learn more
ACE Managed Security Services offers a suite of next-generation security solutions, including Managed EDR, SIEM, DNS Filtering, Email Security, and Vulnerabiity Assessment.

Read more about Ace Managed Security Services

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE, for agile enterprises, integrates cellular SD-WAN and zero trust security in a centrally managed solution that enables rapid network setup. It offers CASB, SWG, RBI, CDR, and ZTNA to prevent web exploits, ransomware, and data loss, all managed via the NetCloud Manager portal.

Read more about Ericsson NetCloud Manager

Users also considered
Venn logo

Secure Remote Workspace

learn more
Venn secures remote work on any unmanaged or BYOD computer with a radically simplified and less costly solution than VDI.

Read more about Venn

Users also considered
Cryptosense logo

Automated cryptographic security auditing for applications

learn more
Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures.

Read more about Cryptosense

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
IDA Pro logo

A powerful disassembler and a versatile debugger.

learn more
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.

Read more about IDA Pro

Users also considered
GeoEdge logo

Ensure A Safe and Engaging Ad Experience

learn more
GeoEdge offers Ad Security/Quality solutions for Web, In-App, and CTV, enhancing user experience by filtering malicious and unwanted ads. It features robust filters for offensive content and tailored blocking policies for publishers, platforms, and developers, ensuring a smooth ad experience.

Read more about GeoEdge

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered

Popular cybersecurity comparisons