App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software with Workflow Management

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

80 software options

Sponsored

1 filter applied


Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

TRAC logo
4.8
(29)

Compliance. Simplified.

visit website
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.

With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to

Read more about TRAC

Users also considered
NordPass Business logo
4.5
(27)

Business password manager for advanced cybersecurity.

visit website
NordPass takes the password load off your employees and lets them focus on what matters by offering a single, secure location for storing and accessing passwords on any device. Additionally, with NordPass, you can set a password policy at the administrative level.

Read more about NordPass Business

Users also considered
Alyne logo
5.0
(2)

Cutting-Edge GRC Platform that Delivers Data-Driven Insights

visit website
Alyne helps CISOs, Chief Risk Officers, Data Protection Officers and other decision-makers confidently implement compliance requirements, thoroughly assess & manage risk, gain detailed risk analytics, and make risk-aware decisions for their organization – helping to effectively reduce risk exposure.

Read more about Alyne

Users also considered
Apptega logo
4.8
(21)

Cybersecurity and Compliance Made Easy

visit website
Apptega is a cloud-based cybersecurity solution that assists IT and compliance teams with managing cybersecurity operations. Key features include framework mapping, compliance management, collaboration, budgeting, vendor management, data synchronization, and predefined templates.

Read more about Apptega

Users also considered
Google Cloud logo
4.7
(1.7K)

Modular platform for computing, hosting, storage & more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud

Users also considered
JumpCloud Directory Platform logo
4.7
(206)

A cloud directory platform for secure access to resources

learn more
Cloud-forward identity security and endpoint protection

Read more about JumpCloud Directory Platform

Users also considered
LogicGate Risk Cloud logo
4.7
(66)

Risk Management Without Limits.

learn more
Risk Cloud® is a no-code governance, risk, and compliance (GRC) platform that scales and adapts to your changing business environment.

Read more about LogicGate Risk Cloud

Users also considered
ThreatLocker logo
4.9
(36)

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
Onehub logo
4.6
(40)

Secure enterprise file sharing made easy.

learn more
Onehub provides secure, easy-to-use file sharing for business. More than 1 million business users trust Onehub for file sharing, client portal and virtual data room needs.

Read more about Onehub

Users also considered
Ncontracts logo
4.8
(25)

Experience the freedom of knowing it's right.

learn more
Automate the FFIEC CAT and NCUA ACET while ensuring accurate responses and gain a clearer picture of your cybersecurity risk.

Read more about Ncontracts

Users also considered
MetaCompliance logo
4.6
(34)

Make it Personal.

learn more
Minimise the risk of cyber security threats and compliance failure. We make cyber security and data protection easier for your employees.

Read more about MetaCompliance

Users also considered
PhishingBox logo
4.8
(26)

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered
vRx logo
4.9
(19)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Phished logo
4.5
(25)

Help us to build the human firewall

learn more
Predict and prevent cyber incidents by changing employee behaviour with holistic training 

Read more about Phished

Users also considered
EcoTrust logo
4.9
(14)

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
Blumira logo
4.9
(12)

Automated SIEM + XDR for IT Teams

learn more
Blumira’s cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others.

Read more about Blumira

Users also considered
Nfina Technologies logo
5.0
(11)

Nfina is an IT infrastructure platform provider.

learn more
A platform for IT infrastructure called Nfina offers cyber resilience for business continuity. Edge, computer servers, HCI appliances, hybrid cloud, storage, IaaS, HaaS, STaaS, and DRaaS are just a few of our solutions and data security services.

Read more about Nfina Technologies

Users also considered
CyberArk Privileged Access Manager logo
4.3
(20)

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Manager

Users also considered
Tricent logo
5.0
(9)

Automate compliance in Google Workspace or Microsoft 365

learn more
Audit and cleanup your shared data in Microsoft 365 or Google Workspace with compliance automation.

Tricent helps you
1. Identify and revoke data shared with external users
2. Mitigate ongoing sharings through automated compliance policies
3. Involve the employees in the cleanup processes

Read more about Tricent

Users also considered
Tenacy logo
4.7
(11)

Pilot your cybersecurity in a single platform.

learn more
Cybersecurity management processes centralized, measured and interconnected. Accelerate your compliance, build action and control plans, analyze and manage your risks, effectively report on your security posture.

Read more about Tenacy

Users also considered
Darktrace logo
4.4
(14)

AI-enabled network and cybersecurity solution

learn more
Darktrace Cyber AI Loop helps users reduce risk and harden security. The Darktrace Cyber AI Loop is built on continuous feedback and an interconnected understanding of the enterprise. Darktrace monitors and protects people and digital assets across the IT ecosystem.

Read more about Darktrace

Users also considered
ASPIA logo
5.0
(7)

Security assessment and vulnerability management solution

learn more
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.

Read more about ASPIA

Users also considered
SecurityScorecard logo
4.4
(9)

The global leader in cybersecurity ratings

learn more
SecurityScorecard is the global leader in cybersecurity ratings, helping thousands of organizations of all types and sizes gain instant visibility into their own security posture and that of their third parties.

Read more about SecurityScorecard

Users also considered
Netsurion logo
3.6
(23)

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered