getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cybersecurity Software with Freelancers - Page 3

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


452 software options

EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
Cyber Security Suite logo

Managed Detection and Response 24/7

learn more
CYBEROO's MDR (Managed Detection & Response) service,
combines Artificial Intelligence, Machine Learning and the analysis of over 50 cyber security specialists. To protect you from the most advanced cyber threats. 24 hours a day. 365 days a year.

Read more about Cyber Security Suite

Users also considered
Google Cloud logo

Modular platform for computing, hosting, storage and more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
Cloudflare logo

Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare

Users also considered
Specops Password Auditor logo

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
Libraesva Email Archiver logo

Secure Email Archiving

learn more
Protect business information, simplify compliance, and improve efficiency by using Libraesva Email Archiver to automatically save a copy of every email sent or received by businesses. Libraesva's Resilient Archive technology stores every email in highly secure and digitally signed archives.

Read more about Libraesva Email Archiver

Users also considered
LogPoint logo

Accelerate threat detection and response with SIEM and UEBA

learn more
LogPoint's SIEM platform helps businesses secure data from threats & respond to cyberattacks in compliance with regulatory norms.

Read more about LogPoint

Users also considered
Carbon Black Endpoint logo

Protect endpoints and workloads from advanced threats

learn more
VMware Carbon Black Endpoint platform empowers security teams to detect and respond to advanced threats with less operational friction.

Read more about Carbon Black Endpoint

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
Tricent logo

Automate compliance in Google Workspace or Microsoft 365

learn more
Audit and cleanup your shared data in Microsoft 365 or Google Workspace with compliance automation.

Tricent helps you
1. Identify and revoke data shared with external users
2. Mitigate ongoing sharings through automated compliance policies
3. Involve the employees in the cleanup processes

Read more about Tricent

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
Fast cybersecurity protection for business with 250+ employees, multiplatform cyber risk management and 24/7 ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
LogicGate Risk Cloud logo

Cloud-based compliance solution for GRC.

learn more
LogicGate Risk Cloud is a no-code governance, risk, and compliance (GRC) platform that scales and adapts to your changing business needs and regulatory requirements. It combines a suite of purpose-built applications with intuitive technology that allows risk professionals to form, evolve, and communicate a market-leading risk strategy.

Read more about LogicGate Risk Cloud

Users also considered
NetExplorer Workspace logo

Cloud-based file sharing and management software solution

learn more
NetExplorer is a cloud storage software in French and English with file management and collaboration tools. Key attributes include data migration, audit trail, backup & recovery, API, offline access, content & user management, data migration, digital signature, SSL security, and access control.

Read more about NetExplorer Workspace

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered
IncMan SOAR logo

Security orchestration, automation and response platform

learn more
IncMan SOAR is a cloud-based and on-premise platform, which enables enterprises to manage, evaluate, and plan various security operation tasks such as threat hunting and investigation, triage and escalation, incident qualification, and more using machine learning and automation capabilities.

Read more about IncMan SOAR

Users also considered
INFIMA logo

Software for managing security awareness training

learn more
INFIMA is a cloud-based security awareness training software designed to help businesses of all sizes create, launch, and manage multiple training programs to update employees about best practices, cybersecurity, compliance guidelines, and other security protocols via a unified portal. The platform enables organizations to provide cyber knowledge, establish data handling processes, and instill safe online behavior across teams, departments, and employees.

Read more about INFIMA

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
FastPass IVM logo

Identity Verification Solution for help desks - add-on ITSM

learn more
FastPass Identity Verification Manager (IVM) secures the IT service desk with role-based, context-aware workforce identity verification. Integrated with ITSM tools like ServiceNow, it replaces common sense checks with structured, policy-driven workflows that stop social engineering attacks.

Read more about FastPass IVM

Users also considered
NG Firewall logo

Network management and protection

learn more
NG Firewall is a cloud-based network management and protection solution that includes network security, content filtering, user management, and performance optimization tools. The modular software is designed for organizations with limited budgets and IT resources.

Read more about NG Firewall

Users also considered
Beyond Identity logo

Unphishable Multi-Factor Authentication

learn more
Unphishable, passwordless, multi-factor authentication to eliminate credential attacks and secure your workforce and customer identities.

Read more about Beyond Identity

Users also considered
Secyour Enterprise logo

Securing every aspect of your online presence

learn more
Penetration testing and cybersecurity platform designed to help businesses monitor and protect their online presence across the web.

Read more about Secyour Enterprise

Users also considered