getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Cybersecurity Software with Large enterprises - Page 12

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


295 software options

CryptoSpike logo

Bug tracking tool to detect ransomware in storage systems.

learn more
CryptoSpike is a data transparency and cybersecurity solution that helps businesses detect malicious software and manage remediation from a centralized interface. The platform monitors real-time transactions in the storage for abnormalities relating to file extensions or user behavior.

Read more about CryptoSpike

Users also considered
HighGround logo

Governance, risk & compliance (GRC) solution

learn more
HighGround offers a suite of functionality and services that enables businesses to manage and control all elements of their cyber security providing what they need and when they need it. HighGround provides management dashboards with KPIs for IT teams and business leaders to measure their cyber posture in a way the board understands and with easy-to-action solutions.

Read more about HighGround

Users also considered
IBM i Security Suite logo

Cloud-based software for security and compliance

learn more
IBM i Security Suite from Fresche Solutions is a comprehensive security designed to enhance data protection for IBM i systems. It focuses on mitigating risks and ensuring compliance by providing multiple layers of defense.

Read more about IBM i Security Suite

Users also considered
Redamp.io logo

Simplified protection for mobile, desktop and server devices

learn more
Redamp.io revolutionizes digital safety, safeguarding endpoints, networks, and privacy. With our apps, users protect devices, ensure network security, and stay updated. We verify physical device security and monitor app safety.

Read more about Redamp.io

Users also considered
Kikimora Agent logo

AI-powered cybersecurity platform

learn more
Kikimora Agent is a ai-powered vulnerability management solution. The agent allows for conversational management of complex security tasks across your infrastructure.

Read more about Kikimora Agent

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
S2ME logo

Free security assessment software

learn more
S2ME is a free cloud-based security assessment software that uses statistical measurements of risk. Users are given an overall score one the evaluation is completed. The scores are divided into categories, demographic comparison and come with recommendations for improvements.

Read more about S2ME

Users also considered
AirCISO logo

Extended detection and response (XDR) software

learn more
AirCISO is an XDR software that connects in to your devices and provides actionable insights and intelligence.

Read more about AirCISO

Users also considered
NOVA DRIM logo

AI-powered cyber risk quantification platform

learn more
NOVA AI is a cyber risk intelligence platform that quantifies security risks in financial terms through real-time analysis. The platform ingests data from six security domains including external attack surface monitoring, third-party risk management, governance and compliance, and vulnerability management to generate audit-ready risk scorecards. It features a dual-layer confidence engine that separates detection reliability from quantification reliability.

Read more about NOVA DRIM

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Gordon AI SOC logo

AI threat detection and automated response system

learn more
Gordon AI SOC is an AI-powered cybersecurity platform that delivers 24/7 threat detection, automated response, and MITRE ATT&CK-mapped kill chain reconstruction. CERT-In compliant, India-first, and built to protect enterprises without requiring a full in-house SOC team.

Read more about Gordon AI SOC

Users also considered
Wultra In-App Protection logo

The Most Feature-Rich In-App Protection Solution For Apps

learn more
In-App Protection is a cybersecurity solution that helps businesses with real-time monitoring, runtime library injection, external screen sharing, and more

Read more about Wultra In-App Protection

Users also considered
Phalanx GRC logo

Built, manage and maintain your compliance program.

learn more
Phalanx is a GRC platform that can help your team effectively build, manage, and maintain your compliance program. With Phalanx, you not only get access to the software itself but also have a dedicated team of security and compliance professionals who are there to help you every step of the way.

Read more about Phalanx GRC

Users also considered
Shield Sphere logo

Cybersecurity with SIEM & SOAR automation

learn more
Shield Sphere is a unified cybersecurity platform that consolidates SIEM, SOAR, threat intelligence, and compliance automation into a single command center. It features real-time threat detection, automated incident response, dark web monitoring, and an AI-powered query builder for transforming natural language into structured security searches. Shield Sphere supports compliance frameworks like ISO 27001, PCI DSS, HIPAA, and GDPR with automated evidence collection and audit-ready documentation.

Read more about Shield Sphere

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
Exein logo

Open-source cybersecurity solution for IoT & SCADA firmware

learn more
Exein is a cloud-based and open-source cybersecurity framework for IoT and SCADA firmware systems, which runs autonomously on any running device and helps businesses identify existing threats or suspicious behavior.

Read more about Exein

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
Guardey logo

Your Plug & Play Cyber Security Solution

learn more
Guardey is a plug & play cyber security solution offering protection for sensitive data, secure remote work, real-time threat detection, and cyber awareness training.

Read more about Guardey

Users also considered