getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with AI/Machine Learning (2026) - Page 7

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


190 software options

Atomic ModSecurity Rules logo

Cybersecurity system for securing web servers & applications

learn more
Atomic ModSecurity Rules is designed to help businesses ensure protection against cyber attacks using various web application firewall (WAF) rules. The application enables IT professionals to prevent unauthorized access and monitor organizations’ network traffic based on predetermined security rules.

Read more about Atomic ModSecurity Rules

Users also considered
S2ME logo

Free security assessment software

learn more
S2ME is a free cloud-based security assessment software that uses statistical measurements of risk. Users are given an overall score one the evaluation is completed. The scores are divided into categories, demographic comparison and come with recommendations for improvements.

Read more about S2ME

Users also considered
Exein logo

Open-source cybersecurity solution for IoT & SCADA firmware

learn more
Exein is a cloud-based and open-source cybersecurity framework for IoT and SCADA firmware systems, which runs autonomously on any running device and helps businesses identify existing threats or suspicious behavior.

Read more about Exein

Users also considered
Crowdsec logo

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
Reblaze logo

Complete online security for web applications & API servers

learn more
Reblaze is a complete web security solution that is deployed as a reverse proxy on a virtual private cloud. It’s designed to protect web applications and API servers. Reblaze routes, scrubs, and blocks malicious incoming traffic without the need for downtime that can affect business. With full bot mitigation capabilities, it blocks hostile traffic from protected networks.

Read more about Reblaze

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
BluBracket Code Security Suite logo

Code security softare

learn more
BluBracket Code Security Suite is a cloud-based code security software for companies of all sizes.

Read more about BluBracket Code Security Suite

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
Asimily Insight logo

Healing the Devices that Heal

learn more
Asimily is athje leading risk management platform for IoT devices and web-connected equipment.

Read more about Asimily Insight

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
VYUH CISO Dashboard logo

Cyber security software

learn more
VYUH CISO Dashboard provides a one-stop shop solutions for all your cyber security needs from Assessment to Operations. We are the leading cyber security company, having handled 100+ projects for startups and enterprises over the last 5 years. The Most Trusted Cyber Security Service Provider in USA and India.

Read more about VYUH CISO Dashboard

Users also considered
SpamTitan Plus logo

Zero-day threat protection and intelligence

learn more
SpamTitan Plus is an anti-phishing solution, which provides features such as URL inspection, malicious link neutralizing, URL rewriting, and time-of-click analysis.

Read more about SpamTitan Plus

Users also considered
Verosint logo

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
Nudge Security logo

Making security work for modern work

learn more
Nudge Security is a cybersecurity startup securing modern organizations through the power of the modern workforce. It helps businesses with SaaS discovery, identity and access, risk insights, attack surface, security nudges and more.

Read more about Nudge Security

Users also considered
Gradient Cyber logo

Cybersecurity platform for small and midsize businesses

learn more
Gradient Cyber offers extended detection and response (XDR), managed risk, and threat assessment using the SecOps Delivery Platform. It helps businesses gain insights into cybersecurity maturity and improvement.

Read more about Gradient Cyber

Users also considered
The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
ThreatDefence XDR Platform logo

On-premise & cloud-based XDR tool for developers.

learn more
ThreatDefence XDR Platform is a cloud-based and on-premise cybersecurity solution, which helps businesses in legal services, education, finance, and other sectors manage threat detection and response across servers, cloud environments, endpoints, and more. The platform provides various features such as vulnerability management, dark web monitoring, activity tracking, risk protection, root cause analysis, cloud asset management, and reporting.

Read more about ThreatDefence XDR Platform

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered
Arkose Labs logo

Stop online account attacks in hours, permanently

learn more
Arkose Labs is a global online account security and bot detection and prevention company that works with the largest enterprises in the world to stop SMS toll fraud, credential stuffing, account takeovers, fake account registration, inventory hoarding, malicious scraping, genAI abuse, and more.

Read more about Arkose Labs

Users also considered
Alice logo

Safety, security, and governance for GenAI systems

learn more
Alice is a trust, safety, and security platform built for the AI era. It helps organizations govern and protect GenAI systems, agents, and communicative platforms across their lifecycle, using adversarial intelligence to prevent harm, detect drift, and operate AI responsibly at scale.

Read more about Alice

Users also considered
Integrite logo

Digital Risk Monitoring and Threat Intelligence

learn more
SaaS-based AI-powered digital risk monitoring platform helps you to do a 360-degree posturing on digital assets and prevent risks.

Read more about Integrite

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
ArkAngel logo

Technology-agnostic cybersecurity software

learn more
ArkAngel is a web-based cybersecurity software designed to help businesses across various industries get a 360-degree view of their IT risk and security environment. The platform lets teams continuously monitor and manage risk levels to defined standards.

Read more about ArkAngel

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches.

Read more about HTTPCS Cyber Vigilance

Users also considered