getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with Third-Party Integrations (2026) - Page 6

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

Naq Cyber logo

Revolutionise healthcare. We'll will handle the compliance.

learn more
Naq automates compliance with healthcare's most essential frameworks, including DTAC, DCB0 129, ISO 13485, ISO 27001, and more.

Read more about Naq Cyber

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
Exabeam New-Scale Fusion logo

Real Intelligence. Real Security. Real Fast.

learn more
A scalable, cloud-native architecture provides rapid data ingestion, hyper-fast query performance, powerful behavioral analytics & AI.

Read more about Exabeam New-Scale Fusion

Users also considered
UpGuard logo

Cloud-based cybersecurity tool for vendor risk management.

learn more
UpGuard is a cloud-based risk and attack surface management platform that provides organizations visibility and control over their cyber risk. The solution provides a suite of features that enable security teams to identify, assess, and remediate risks across their entire vendor ecosystem and external attack surface.

Read more about UpGuard

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Tanium logo

Autonomous IT. Unstoppable Business.

learn more
The Tanium Autonomous IT Platform equips organizations with real-time visibility and control across their endpoint environments to make their business unstoppable.

Read more about Tanium

Users also considered
SEKOIA.IO logo

Neutralize Cyber Threats Before Impact

learn more
SEKOIA.IO is a SecOps platform, designed to deliver comprehensive Detection and Response before impact.

Read more about SEKOIA.IO

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered
DoveRunner logo

Number 1 App Shielding and Runtime App Security Solution

learn more
AppSealing is a cloud-based solution that automates application security with no-coding RASP protection. It lets users protect their apps with a SaaS-based security layer.

Read more about DoveRunner

Users also considered
TRaViS logo

AI-Driven Attack Surface Management & Threat Intelligence

learn more
TRaViS is an AI-powered External Attack Surface Management (EASM) platform that identifies, evaluates, and manages security risks across an organization's digital attack surface. It provides continuous threat exposure management, external attack surface management, and attack surface management capabilities to help organizations discover, monitor, and secure their digital assets.

Read more about TRaViS

Users also considered
The CyberStrong Platform logo

Automated, Intelligent Cyber Compliance and Risk Management

learn more
CISOs rely on CyberStrong to achieve real-time cyber/IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, patented AI, and executive reports to build cyber resilience through measurement and communication.

Read more about The CyberStrong Platform

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered
Hook Security logo

Security Awareness Training your employees will love

learn more
Hook Security provides phishing testing and security awareness training that creates a positive and healthy security culture for your company, mitigating risk while being humorous and memorable.

Read more about Hook Security

Users also considered
ThreatSTOP DNS Defense logo

SaaS automated protective DNS security (PDNS)

learn more
ThreatSTOP DNS Defense enables true protective DNS (PDNS) with continuous updates from 900+ threat intelligence sources. DNS Defense turns existing DDI/IPAM or DNS Servers into security enforcement points that stop dangerous and unwanted traffic before damage is done.

Read more about ThreatSTOP DNS Defense

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Abnormal AI logo

A Fundamentally Different Approach to Email Security

learn more
Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

Read more about Abnormal AI

Users also considered
ReaQta-Hive logo

Experience Security Without Complexity

learn more
ReaQta, an IBM company, is an AI Autonomous Detection & Response platform built by AI/ML researchers and cyber security experts. ReaQta allows companies to eliminate extremely advanced endpoint threats in real-time.

Read more about ReaQta-Hive

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered
DoveRunner logo

Number 1 App Shielding and Runtime App Security Solution

learn more
AppSealing is a cloud-based solution that automates application security with no-coding RASP protection. It lets users protect their apps with a SaaS-based security layer.

Read more about DoveRunner

Users also considered
TRaViS logo

AI-Driven Attack Surface Management & Threat Intelligence

learn more
TRaViS is an AI-powered External Attack Surface Management (EASM) platform that identifies, evaluates, and manages security risks across an organization's digital attack surface. It provides continuous threat exposure management, external attack surface management, and attack surface management capabilities to help organizations discover, monitor, and secure their digital assets.

Read more about TRaViS

Users also considered
DNIF HYPERCLOUD logo

SIEM and log management solution for organizations

learn more
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.

Read more about DNIF HYPERCLOUD

Users also considered
QSEC logo

Governance, risk and compliance platform

learn more
QSEC - the comprehensive solution for the sustainable and efficient establishment and operation of compliance, GRC, ISMS and data protection based on national and international standards such as ISO 27001, ISO 27005, BSI IT-Grundschutz and EU-DSGVO.

Read more about QSEC

Users also considered