getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with Third-Party Integrations (2026) - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

LogicGate Risk Cloud logo
Category Leaders

Cloud-based compliance solution for GRC.

learn more
LogicGate Risk Cloud is a no-code governance, risk, and compliance (GRC) platform that scales and adapts to your changing business needs and regulatory requirements. It combines a suite of purpose-built applications with intuitive technology that allows risk professionals to form, evolve, and communicate a market-leading risk strategy.

Read more about LogicGate Risk Cloud

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Cyberattacks are increasingly more sophisticated, but Orca makes it easy to remediate at-risk sensitive data in the cloud. Agentless statistical scanning reduces the noise, while contextual analysis helps prioritize risk so security teams can focus on what truly matters.

Read more about Orca Security

Users also considered
usecure logo

Transform employees into a cybersecurity asset.

learn more
usecure is the automated Human Risk Management (HRM) platform that transforms employees into a cybersecurity asset through user-tailored training programs.

Read more about usecure

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Libraesva Email Security logo

Exceptional Email Security

learn more
Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine.

Read more about Libraesva Email Security

Users also considered
CrowdStrike logo
Category Leaders

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
GitGuardian logo

Automated Secrets Detection and Remediation

learn more
GitGuardian leads the way in Non-Human Identity security, offering end-to-end solutions from secrets detection in code, productivity tools and environments to strong remediation, governance and proactive prevention of leaks

Read more about GitGuardian

Users also considered
ConnectWise SIEM logo

Threat detection and response management software

learn more
ConnectWise SIEM is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks & connected devices via a unified portal.

Read more about ConnectWise SIEM

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Sense Defence AI logo
Category Leaders

Firewall software

learn more
Sense Defence AI WAF is an AI-powered Web Application Firewall (WAF) solution offering real-time threat detection, intelligent traffic analysis, and proactive attack blocking.

Read more about Sense Defence AI

Users also considered
Commvault Cloud logo

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
ESM+Strategy logo

Strategic Planning and Balanced Scorecard Software

learn more
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel.

Read more about ESM+Strategy

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
IPinfo logo

IP address data for users around the globe.

learn more
IPinfo powers accurate IP address data for users around the globe. Businesses use IPinfo's reliable data to power various use cases including, secure online transactions, web personalization, data enrichment, fraud prevention, content restrictions, lead generation, and more.

Read more about IPinfo

Users also considered
PortSwigger logo

Secure web apps with advanced testing tools.

learn more
PortSwigger offers a comprehensive web application security testing toolkit. It offers a range of tools for identifying and exploiting vulnerabilities, including a web vulnerability scanner, manual testing capabilities, and advanced features for DevSecOps and bug bounty hunting.

Read more about PortSwigger

Users also considered
GlobalSuite logo

Cloud-based GRC solution for threat control.

learn more
GlobalSuite is a cloud-based governance, risk, and compliance (GRC) solution that helps organizations optimize their security, business continuity, and audit processes. The software features optimized management and automation capabilities that allow organizations to focus on what truly matters and keep threats under control. GlobalSuite also offers traceability in all actions and continuous monitoring.

Read more about GlobalSuite

Users also considered
PhishingBox logo

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered
BooleBox logo

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Huntress logo

Cloud-based cybersecurity platform

learn more
Huntress is a cloud-based cybersecurity platform, which helps organizations track threats, vulnerabilities, and exploits. With its dashboard, security professionals can monitor active incidents, review investigations, receive custom incident reports, and respond to threats in an automated manner.

Read more about Huntress

Users also considered
Kamaé logo

Gamified cybersecurity awareness platform

learn more
Kamaé is a cybersecurity awareness platform that helps organizations develop a strong security culture and engage their employees in the long run. The platform offers gamified micro-learnings, phishing simulations, and quick reference guides to ensure employees have the right cybersecurity and GDPR reflexes in all situations, ultimately boosting their productivity.

Read more about Kamaé

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Acunetix logo

All-in-one automated web application security solution

learn more
Cyber security solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers solutions.

Read more about Acunetix

Users also considered
IPQS logo

Fraud prevention solution for proactively detecting fraud

learn more
IPQS, an unparalleled fraud prevention solution powered by fresh data. Detect fraud in real-time, score mobile traffic, identify high-risk users, and block abusive behavior. Ensure lead quality with data verification. Choose IPQS for proactive fraud prevention and a frictionless user experience.

Read more about IPQS

Users also considered