getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with Collaboration Tools (2026) - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


95 software options

Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
NetExplorer Workspace logo

Cloud-based file sharing and management software solution

learn more
NetExplorer is a cloud storage software in French and English with file management and collaboration tools. Key attributes include data migration, audit trail, backup & recovery, API, offline access, content & user management, data migration, digital signature, SSL security, and access control.

Read more about NetExplorer Workspace

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
Risk Ledger logo

Supply Chain Risk Management

learn more
Risk Ledger is a network of connected organisations working together to reduce risk in the supply chain. Clients can engage with their suppliers' security and risk teams to conduct assurance. Suppliers can easily share their single Risk Ledger profile with many clients.

Read more about Risk Ledger

Users also considered
Tenacy logo

Pilot your cybersecurity in a single platform.

learn more
Cybersecurity management processes centralized, measured and interconnected. Accelerate your compliance, build action and control plans, analyze and manage your risks, effectively report on your security posture.

Read more about Tenacy

Users also considered
Secyour Enterprise logo

Securing every aspect of your online presence

learn more
Penetration testing and cybersecurity platform designed to help businesses monitor and protect their online presence across the web.

Read more about Secyour Enterprise

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Tehama logo

Tehama Enclaves as a Service

learn more
Tehama is the industry’s most advanced enclave hosting platform. Tehama securely connects people to sensitive data and systems—without the complexity.
Through secure cloud-native Enclaves, Tehama delivers Zero Trust access, compliance, and governance in one unified platform. No more layering multip

Read more about Tehama

Users also considered
ASPIA logo

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
Cyberday logo

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
SecurityScorecard logo

The global leader in cybersecurity ratings

learn more
SecurityScorecard is the global leader in cybersecurity ratings, helping thousands of organizations of all types and sizes gain instant visibility into their own security posture and that of their third parties.

Read more about SecurityScorecard

Users also considered
Make IT Safe logo

Reduce risks and simplify your cybersecurity compliance.

learn more
Make IT Safe supports mid-sized and large companies across all sectors, fostering collaboration between management, CISOs, DPOs, and related business functions.

Read more about Make IT Safe

Users also considered
IRONSCALES logo

We catch the phish that others miss!

learn more
We ensure your inboxes are uncompromised and your team is unburdened.

Read more about IRONSCALES

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about Mend

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
No bullsh*t security for developers.
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Read more about Aikido Security

Users also considered
Vade logo

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
Nanitor logo

Vulnerability management solution

learn more
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Alyne logo

Cloud-based GRC platform that delivers data-driven insights

learn more
Alyne helps CISOs, Chief Risk Officers, Data Protection Officers and other decision-makers confidently implement compliance requirements, thoroughly assess & manage risk, gain detailed risk analytics, and make risk-aware decisions for their organization – helping to effectively reduce risk exposure.

Read more about Alyne

Users also considered
Intigriti logo

Global Bug Bounty, VDP & Pentesting Testing Platform

learn more
Intigriti is the trusted leader in crowdsourced security, empowering the world’s largest organizations to find and fix vulnerabilities

Read more about Intigriti

Users also considered
Reporter logo

Software for streamlining security tests

learn more
Reporter is a self-hosted pentest reporting platform designed for security teams to optimize their assessment workflow from testing to reporting. The platform features built-in templates, automatic PDF generation, client engagement tools, and collaborative functionality that allows team members to work together efficiently on security assessments.

Read more about Reporter

Users also considered
Exabeam New-Scale Fusion logo

Real Intelligence. Real Security. Real Fast.

learn more
A scalable, cloud-native architecture provides rapid data ingestion, hyper-fast query performance, powerful behavioral analytics & AI.

Read more about Exabeam New-Scale Fusion

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
SEKOIA.IO logo

Neutralize Cyber Threats Before Impact

learn more
SEKOIA.IO is a SecOps platform, designed to deliver comprehensive Detection and Response before impact.

Read more about SEKOIA.IO

Users also considered
The CyberStrong Platform logo

Automated, Intelligent Cyber Compliance and Risk Management

learn more
CISOs rely on CyberStrong to achieve real-time cyber/IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, patented AI, and executive reports to build cyber resilience through measurement and communication.

Read more about The CyberStrong Platform

Users also considered
Secureworks logo

Threat intelligence and cybersecurity software

learn more
Secureworks is a cybersecurity software designed to help businesses detect, investigate, and remediate threats and vulnerabilities. Key features of the platform include endpoint visibility, AI-based detections, context-based vulnerability prioritization, machine vulnerability scanning, and web application security testing.

Read more about Secureworks

Users also considered