Cybersecurity Software

Personalize your search in 2 clicks

Select your company size

Select your industry

Personalize your search in 2 clicks

1. Select your company size2. Select your industry type
just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
31 apps
Filter results
0
Clear filters
Filters

Okta  

279
On-demand identity & access management for enterprise
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile d… Read more about Oktaevice, Okta helps IT become more secure, make people more productive, and maintain compliance.
On-demand identity & access management for enterprise
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile d… Read more about Oktaevice, Okta helps IT become more secure, make people more productive, and maintain compliance.

WebTitan   

186
DNS-based web content filtering & malware protection
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides web content control. Read more about WebTitan
DNS-based web content filtering & malware protection
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides web content control. Read more about WebTitan

Webroot®   

131
Smarter Cybersecurity® Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot®
Smarter Cybersecurity® Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot®

Netwrix Auditor   

128
Secure visibility platform for IT infrastructure
Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Read more about Netwrix Auditor
Secure visibility platform for IT infrastructure
Gain control over what's going on in your hybrid cloud IT environment to protect data regardless of its location. Read more about Netwrix Auditor

Teramind DLP   

52
Insider Threat Detection & Data Loss Prevention
Teramind DLP is user-behavior driven data loss prevention to protect against insider threats and monitor privileged users, contractors, employees to effectively prevent IP and data theft or loss. Read more about Teramind DLP
Insider Threat Detection & Data Loss Prevention
Teramind DLP is user-behavior driven data loss prevention to protect against insider threats and monitor privileged users, contractors, employees to effectively prevent IP and data theft or loss. Read more about Teramind DLP

Imperva Incapsula  

46
Safer, Faster Website
"With its ability to optimize, protect and enhance just any site in a way that is both fast and cost-effective, Incapsula stands as one of these services that webmasters are bound to try out at one point or other in their lives." (killerstartups_com) Incapsula gives any website the security and performance previously only available to the website… Read more about Imperva Incapsula elite. Through a simple DNS settings change, website traffic is seamlessly routed through Incapsula’s global network of high-powered servers allowing Incoming traffic to be intelligently profiled, in real-time, blocking even the latest web threats, ranging from sophisticated SQL injection attacks to malicious bots and intruding comment spammers. Meanwhile, outgoing traffic is accelerated and optimized for faster load times, keeping welcome visitors speeding through. In short, Incapsula keeps the good traffic flowing through fast and the bad traffic securely out. Pricing: Get your FREE 30-day trial today!
Safer, Faster Website
"With its ability to optimize, protect and enhance just any site in a way that is both fast and cost-effective, Incapsula stands as one of these services that webmasters are bound to try out at one point or other in their lives." (killerstartups_com) Incapsula gives any website the security and performance previously only available to the website… Read more about Imperva Incapsula elite. Through a simple DNS settings change, website traffic is seamlessly routed through Incapsula’s global network of high-powered servers allowing Incoming traffic to be intelligently profiled, in real-time, blocking even the latest web threats, ranging from sophisticated SQL injection attacks to malicious bots and intruding comment spammers. Meanwhile, outgoing traffic is accelerated and optimized for faster load times, keeping welcome visitors speeding through. In short, Incapsula keeps the good traffic flowing through fast and the bad traffic securely out. Pricing: Get your FREE 30-day trial today!

ESM Suite  

30
Strategic Planning and Balanced Scorecard Software
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel. Read more about ESM Suite
Strategic Planning and Balanced Scorecard Software
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel. Read more about ESM Suite

Acunetix   

31
Integrated vulnerability management & network security
Cyber security solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers solutions. Read more about Acunetix
Integrated vulnerability management & network security
Cyber security solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers solutions. Read more about Acunetix

Spinbackup  

13
Cloud Cybersecurity and Backup for G Suite & Office 365
Spinbackup provides comprehensive Cloud-to-Cloud Backup and Cybersecurity protection from data loss and leaks for G Suite or Office 365. Read more about Spinbackup
Cloud Cybersecurity and Backup for G Suite & Office 365
Spinbackup provides comprehensive Cloud-to-Cloud Backup and Cybersecurity protection from data loss and leaks for G Suite or Office 365. Read more about Spinbackup

MetaCompliance   

12
Cyber security & compliance awareness platform
MetaCompliance is a cyber security & training software designed to help organizations improve the compliance, security, phishing and policy awareness of staff. The solution helps companies keep staff safe online while securing digital assets and protecting their reputation and brand. Read more about MetaCompliance
Cyber security & compliance awareness platform
MetaCompliance is a cyber security & training software designed to help organizations improve the compliance, security, phishing and policy awareness of staff. The solution helps companies keep staff safe online while securing digital assets and protecting their reputation and brand. Read more about MetaCompliance

Netsparker Security Scanner   

11
Security scanning & vulnerability management
Netsparker Security Scanner automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services. Read more about Netsparker Security Scanner
Security scanning & vulnerability management
Netsparker Security Scanner automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services. Read more about Netsparker Security Scanner

Indeni   

12
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.
The Automation Platform for IT
Indeni makes it easy to manage the infrastructure of digital businesses. With Indeni Knowledge and Indeni Insight, companies can create an infrastructure that is adaptable to change. Our deep set of integrations to critical devices, built-in automation, and easy to read remediation instructions arm IT with the knowledge they need to move from reacti… Read more about Indenive to proactive infrastructure management. By analyzing billions of data points per day and gathering knowledge from thousands of IT professionals, Indeni minimizes business disruption and maximizes their contribution.

VENDEFENSE  

7
Vendor risk management tool
VENDEFENSE is a vendor risk management tool designed to help organizations streamline their third-party information security risk management program with an automated workflow, including automated vendor list import, vendor relationship management, future renewal scheduling, & more… Read more about VENDEFENSE
Vendor risk management tool
VENDEFENSE is a vendor risk management tool designed to help organizations streamline their third-party information security risk management program with an automated workflow, including automated vendor list import, vendor relationship management, future renewal scheduling, & more… Read more about VENDEFENSE

Resolver   

7
Corporate Security Software Solutions
Resolver's corporate security solutions encompass incident management and reporting, investigations and case management, command center, and ESRM. Read more about Resolver
Corporate Security Software Solutions
Resolver's corporate security solutions encompass incident management and reporting, investigations and case management, command center, and ESRM. Read more about Resolver

Jscrambler  

4
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler
Leader in JavaScript Protection and Webpage Monitoring
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code. Read more about Jscrambler

CyberArk Privileged Account Security  

3
Secure & protect privileged account credentials
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies. Read more about CyberArk Privileged Account Security
Secure & protect privileged account credentials
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies. Read more about CyberArk Privileged Account Security

CipherCloud  

3
Ensuring cloud security, compliance & control
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks. Read more about CipherCloud
Ensuring cloud security, compliance & control
CipherCloud enables companies to securely adopt cloud applications while ensuring data privacy & overcoming regulatory compliance and security risks. Read more about CipherCloud

SolarWinds Threat Monitor   

2
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor

Cryptosense Analyzer   

1
Automated cryptographic security auditing for applications
Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Read more about Cryptosense Analyzer
Automated cryptographic security auditing for applications
Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Read more about Cryptosense Analyzer

Horangi   

1
Cyber security, security appliances & incident response
Horangi is a cyber security platform that delivers incident response & threat detection for businesses who lack the time / expertise to monitor these internally. Read more about Horangi
Cyber security, security appliances & incident response
Horangi is a cyber security platform that delivers incident response & threat detection for businesses who lack the time / expertise to monitor these internally. Read more about Horangi

Identity Services  

1
Next Dimension Security. Where security follows identity
Centrify Identity Services offer secure single sign-on (SSO) for business apps from any device. User provisioning, MFA & mobility management comes included. Read more about Identity Services
Next Dimension Security. Where security follows identity
Centrify Identity Services offer secure single sign-on (SSO) for business apps from any device. User provisioning, MFA & mobility management comes included. Read more about Identity Services

Conformio  

1
Web-based ISO compliance & document management solution
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards. Read more about Conformio
Web-based ISO compliance & document management solution
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards. Read more about Conformio

Intego Flextivity Secure  

1
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure

CloudSploit  

0
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit

HTTPCS Cyber Vigilance  

0
Cyber watch tool for anticipating cyber attacks in real time
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches. Read more about HTTPCS Cyber Vigilance
Cyber watch tool for anticipating cyber attacks in real time
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches. Read more about HTTPCS Cyber Vigilance
Cybersecurity Software Buyers Guide

Cybersecurity Software Comparison

Use GetApp to find the best Cybersecurity software and services for your needs. Our intuitive directory allows you to make an easy online Cybersecurity software comparison in just a few minutes by filtering by deployment method (such as Web-based, Cloud Computing or Client-Server), operating system (including Mac, Windows, Linux, iOS, Android), pricing (including Free and Subscription), platform (including Google Apps, Salesforce, Intuit, NetSuite, SAP) and supported location.

Filter by
Avg. User review

Best Comparison List of Vendor Applications & Tools