getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cybersecurity Software with Whitelisting blacklisting - Page 4

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


150 software options

Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
PureDome logo

Secure. Reliable. Quick.

learn more
PureDome is dedicated to empowering businesses with robust cybersecurity solutions, ensuring the safeguarding of sensitive data and critical operations. It establishes secure encrypted connections, and ensures secure remote access, shielding communications from potential threats.

Read more about PureDome

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
GoDMARC logo

GoDMARC is a leading SaaS solution.

learn more
Maximize your email security by proactively blocking phishing attempts, while also enhancing email deliverability and gaining greater visibility into your email ecosystem.

Read more about GoDMARC

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
AppTrana logo

Application Security Management Solution

learn more
AppTrana’s Cybersecurity portfolio keeps your web apps and APIs secure by enabling you to block common attack patterns and control bot

Read more about AppTrana

Users also considered
Defend logo

Full-day, real-time identity—without extra hardware.

learn more
Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.

Read more about Defend

Users also considered
Phished logo

Help us to build the human firewall

learn more
Predict and prevent cyber incidents by changing employee behaviour with holistic training 

Read more about Phished

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
calQrisk logo

One Platform. Total Control.

learn more
Unified GRC and ESG platform delivering risk, resilience, compliance and sustainability insight through one connected system

Read more about calQrisk

Users also considered
Open Bridge logo

AI-based tool for data collection, integration & management

learn more
Open Bridge is an on-premise and cloud-based data management software that provides businesses with tools to extract, collect, and integrate enterprise data on a centralized platform. Supervisors can use the dashboard to schedule operational workflows and configure access permissions.

Read more about Open Bridge

Users also considered
Vade logo

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
Alert Logic MDR logo

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered
Jscrambler logo

Leader in JavaScript Protection and Webpage Monitoring

learn more
Jscrambler provides the most advanced JavaScript polymorphic obfuscation techniques combined with code locks, self-defending capabilities, and threat monitoring. Jscrambler's Webpage Integrity provides real-time visibility of client-side attacks, with precise and actionable detail of injected code.

Read more about Jscrambler

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Banyan Security logo

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
SpyWarrior logo

Anti-virus software

learn more
SpyWarrior is a comprehensive anti-malware solution designed to provide online protection and security against ransomware, viruses, trojans and other threats using AI algorithms and machine learning.

Read more about SpyWarrior

Users also considered
LogRhythm SIEM logo

Self-hosted security information and event management

learn more
LogRhythm SIEM is a self-hosted security information and event management solution featuring Machine Data Intelligence Fabric that contextualizes data at ingestion. The platform includes over one thousand out-of-the-box correlation rules mapped to the MITRE ATT&CK framework, embedded SOAR capabilities, and twenty-eight compliance modules for standards like ISO 27001 and GDPR. The system offers a unified interface for streamlined threat detection, investigation, and response workflows.

Read more about LogRhythm SIEM

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Ivanti Security Controls logo

Automated patch management & application control

learn more
Ivanti Security Controls streamlines security with unified, automated techniques against major attack vectors. It offers patch management and application control, allowing organizations to find, inventory, and patch servers, VMs, and templates, regardless of power or network status.

Read more about Ivanti Security Controls

Users also considered
BLACKbox logo

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
Jamf Protect logo

Endpoint protection software for MacOS users

learn more

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Users also considered
DNIF HYPERCLOUD logo

SIEM and log management solution for organizations

learn more
DNIF HYPERCLOUD is a cloud-based security information and event management (SIEM) solution, which assists small to large organizations with threat detection and incident response. Key features include data parsing, user behavior analysis, workflow automation, data recovery, and performance metrics.

Read more about DNIF HYPERCLOUD

Users also considered
SpamTitan logo

Anti-spam filter for business email. Vital email security.

learn more
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support

Read more about SpamTitan

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered