getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cybersecurity Software with Risk assessment - Page 5

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


239 software options

MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
IDA Pro logo

A powerful disassembler and a versatile debugger.

learn more
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.

Read more about IDA Pro

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
CipherBox logo

Endpoint detection and response and cybersecurity software

learn more
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to monitor, track, and manage cybersecurity risk across multiple environments.

Read more about Wiz

Users also considered
D3 SOAR logo

Cybersecurity and SOAR software

learn more
D3’s Smart SOAR is the industry's #1 vendor-agnostic SOAR platform, combining automation and orchestration across unlimited integrated tools with an event pipeline that reduces event volume by 90%. D3’s codeless playbooks make it easy to build, modify, and scale SecOps workflows.

Read more about D3 SOAR

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Controllo logo

AI-enabled governance, risk & compliance solution

learn more
AI GRC tool that can automate compliance for Cloud Security, Cyber Security, Privacy and AI Security.

Read more about Controllo

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
Picus Security logo

Real-time security validation, threat mitigation

learn more
Picus Security Validation Platform helps organizations prioritize critical security issues across siloed data sources and validate exposures in real-time. The platform simulates real-world cyber threats to identify exploitable vulnerabilities, enabling security teams to focus on truly critical exposures rather than theoretical threats. It integrates with existing security tools to strengthen defenses across multiple layers of an organization's environment.

Read more about Picus Security

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
Wallarm WAF logo

Application security platform for businesses

learn more
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis.

Read more about Wallarm WAF

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
SpinOne logo

All-in-One SaaS Security for Mission-Critical SaaS Apps

learn more
Spinbackup provides comprehensive Cloud-to-Cloud Backup and Cybersecurity protection from data loss and leaks for Google Workspace (formerly G Suite) or Office 365.

Read more about SpinOne

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
Cyberday logo

Your ISMS for cyber compliance and defence management

learn more
Cyberday as your modern turnkey solution: No matter if you want to improve your cyber defence, be certification ready, or comply with legal regulation, everything is managed under one roof - in a single solution. Our software works directly as app in your trusted MS Teams environment.

Read more about Cyberday

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
ThreatCop logo

Cloud-based security awareness training platform

learn more
Threatcop Security Awareness Training (TSAT) is a cloud-based security awareness training platform, designed to help organizations monitor the cybersecurity threat posture, create simulated attack campaigns, and train employees over multiple awareness modules.

Read more about ThreatCop

Users also considered
Myra Security logo

We protect what matters. In the digital world.

learn more
Myra Security is a cloud-based cybersecurity platform that safeguards businesses against DDoS attacks, data leaks, and other cyber threats. With GDPR-compliant IT security solutions, Myra ensures the protection of critical digital applications and infrastructures at all times.

Read more about Myra Security

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
Endpoint Detection and Response logo

Endpoint detection and response software

learn more
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
Pareto Security logo

Computer security software

learn more
Pareto Security is an app that regularly checks Mac's security configuration. With Pareto Security for business, managers can non-intrusively check that team has correctly configured security on Mac.

Read more about Pareto Security

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Reporter logo

Software for streamlining security tests

learn more
Reporter is a self-hosted pentest reporting platform designed for security teams to optimize their assessment workflow from testing to reporting. The platform features built-in templates, automatic PDF generation, client engagement tools, and collaborative functionality that allows team members to work together efficiently on security assessments.

Read more about Reporter

Users also considered