App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Applications for Android

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

85 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

NordPass Business logo
4.5
(27)

Business password manager for advanced cybersecurity.

visit website
NordPass takes the password load off your employees and lets them focus on what matters by offering a single, secure location for storing and accessing passwords on any device. Additionally, with NordPass, you can set a password policy at the administrative level.

Read more about NordPass Business

Users also considered
DNSFilter logo
4.8
(83)

Cloud-based cybersecurity and network monitoring platform

visit website
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

Users also considered
Malwarebytes for Business logo
4.7
(2.4K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
ESET Endpoint Security logo
4.7
(1.1K)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
Keeper Security logo
4.7
(481)

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
Splunk Enterprise logo
4.6
(221)

Machine data management and analytics

learn more
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Users also considered
Bitdefender GravityZone logo
4.6
(208)

Security & risk analytics platform with threat intelligence

learn more
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.

Read more about Bitdefender GravityZone

Users also considered
GoTo Resolve logo
4.4
(197)

All-in-one IT support

learn more
Designed with today's SMBs in mind, GoTo Resolve is an all-in-one IT support software built to help IT professionals streamline their help desk by bringing together the tools they need to engage, identify problems, and fix issues faster.

Read more about GoTo Resolve

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
ManageEngine Firewall Analyzer logo
4.5
(146)

Empower firewall intelligence for seamless security manageme

learn more
ManageEngine Firewall Analyzer is a network security device management solution that helps optimize firewall performance, enforce compliance, proactively manage threats, monitor traffic and bandwidth consumption, and streamline firewall management for enhanced network protection.

Read more about ManageEngine Firewall Analyzer

Users also considered
UTunnel VPN logo
5.0
(68)

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
Perimeter 81 logo
4.8
(70)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.

Read more about Perimeter 81

Users also considered
Flashstart logo
4.8
(73)

DNS filtering software provider

learn more
FlashStart is at the forefront of cyber security innovation, leveraging AI-powered DNS intelligence to stay one step ahead of evolving threats.

Read more about Flashstart

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
BlackBerry CylancePROTECT logo
4.6
(64)

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry CylancePROTECT

Users also considered
PureVPN logo
4.3
(76)

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
Libraesva Email Security logo
4.8
(38)

Exceptional Email Security

learn more
Libraesva Email Security stops known and emerging email threats from reaching their target, so you only receive legitimate messages. It provides exceptional email security by integrating cloud email and a secure email gateway with Libraesva’s unique Adaptive Trust Engine.

Read more about Libraesva Email Security

Users also considered
Onehub logo
4.6
(40)

Secure enterprise file sharing made easy.

learn more
Onehub provides secure, easy-to-use file sharing for business. More than 1 million business users trust Onehub for file sharing, client portal and virtual data room needs.

Read more about Onehub

Users also considered
SafeDNS logo
4.7
(35)

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Sealit logo
4.8
(31)

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
ESET Home Office Security Pack logo
4.8
(30)

Cloud-based cybersecurity solution for SMBs

learn more
ESET Home Office Security Pack is a comprehensive solution for small and medium-sized businesses and startups that need to protect digital equipment

Read more about ESET Home Office Security Pack

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
Acronis Cyber Protect Cloud logo
4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
BooleBox logo
4.6
(33)

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
The layered design of the NordLayer solution is developed to collide cloud-based networking within SASE, and Zero Trust defined capabilities to seamlessly adapt to businesses of all sizes and adhere to the most comprehensive cybersecurity requirements.

Read more about NordLayer

Users also considered