getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software with Third-Party Integrations (2026) - Page 8

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

Arsen logo

Effective phishing training awareness platform

learn more
Arsen is a phishing training awareness SaaS allowing CISOs and cybersecurity expert to create realistic looking phishing simulations and improve their resiliency against phishing attacks.

Read more about Arsen

Users also considered
Claroty logo

Cybersecurity solution for protection from online threats

learn more
Claroty is a cybersecurity solution aimed at securing cyber-physical. With visibility, protection, and threat detection capabilities, it offers comprehensive solutions across various cyber-physical systems, including IoT, OT, BMS, IoMT, and more.

Read more about Claroty

Users also considered
Vectra AI Platform logo

AI-driven network detection and response platform

learn more
Vectra AI detects and stops advanced cyberattacks that evade traditional security controls. Using AI-driven behavioral detection across hybrid environments, it identifies real attacker activity early, helping organizations reduce risk, prevent data exfiltration, and improve overall security outcomes

Read more about Vectra AI Platform

Users also considered
StackRox logo

Container and Kubernetes security tool for detecting threats

learn more
StackRox is a container security platform designed to help government agencies and businesses protect cloud-based applications, detect threats, and manage vulnerabilities, compliance requirements, configurations, and more. Administrators can gain visibility into risks on a centralized dashboard.

Read more about StackRox

Users also considered
Veracode logo

Software for scanning & managing application vulnerabilities

learn more
Veracode is a static application security testing (SAST) software designed to help businesses review applications' source code to identify vulnerabilities. The platform allows software developers to conduct application analysis and receive automated security feedback in the IDE and CI/CD pipeline.

Read more about Veracode

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
Advisera logo

Web-based ISO compliance & document management solution

learn more
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards

Read more about Advisera

Users also considered
ThreatConnect TI Ops Platform logo

Built for operations, not just centralization.

learn more
TI Ops is the threat intelligence platform built for operations, not just centralization.

Read more about ThreatConnect TI Ops Platform

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Mitiga logo

Cloud & SaaS forensics for incident response and threat hunt

learn more
Mitiga’s modern IR2 platform and teams of cloud and SaaS forensics experts help you prepare for cloud and SaaS application breaches before they happen and recover in record time. We're dedicated to creating a whole new level of resilience for today's cloud and SaaS-driven enterprises.

Read more about Mitiga

Users also considered
Verosint logo

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
Nudge Security logo

Making security work for modern work

learn more
Nudge Security is a cybersecurity startup securing modern organizations through the power of the modern workforce. It helps businesses with SaaS discovery, identity and access, risk insights, attack surface, security nudges and more.

Read more about Nudge Security

Users also considered
Redamp.io logo

Simplified protection for mobile, desktop and server devices

learn more
Redamp.io revolutionizes digital safety, safeguarding endpoints, networks, and privacy. With our apps, users protect devices, ensure network security, and stay updated. We verify physical device security and monitor app safety.

Read more about Redamp.io

Users also considered
Virtual Desktops logo

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
TruOps logo

Experience the Ultimate in Risk Control.

learn more
Get holistic insight into your risk environment, improve resiliency, make smarter decisions, and streamline your internal processes.

Read more about TruOps

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
CalQRisk logo

An Integrated Modular Software Solution, Tailored to you

learn more
CalQRisk is a modular Governance, Risk & Compliance (GRC) software solution, with pick and choose modules and customisable risk registers to suit your business needs.


CalQRisk allows teams to focus on the important tasks, saving you time and money.

Read more about CalQRisk

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Ivanti Neurons for RBVM logo

Risk-based vulnerability management platform

learn more
Ivanti Neurons for RBVM is a patch management solution that helps organizations evolve vulnerability management strategy to a risk-based approach. The solution enables prioritization of vulnerabilities and weaknesses that pose the most risk, allowing organizations to protect against ransomware and other cyber threats.

Read more about Ivanti Neurons for RBVM

Users also considered
Yakabod Cyber Incident Manager logo

The best kept secret in case management

learn more
Yakabod's zero trust platform, facilitates secure collaboration without compromising sensitive data. The best kept secret in case management, tested and vetted for the past 17 years in securing sensitive data for insider threat, cyber incident management, counter-intelligence, and other use cases.

Read more about Yakabod Cyber Incident Manager

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to monitor, track, and manage cybersecurity risk across multiple environments.

Read more about Wiz

Users also considered