getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Cybersecurity Software - Page 16

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


489 software options

DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
RedRok logo

Security done right.

learn more
RedRok offers easy-to-use security solutions that cover endpoint, network, and cloud security, as well as threat intelligence and compliance management.

Read more about RedRok

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
Oodrive Save logo

Cloud-based server backup and recovery solution

learn more
Oodrive Save is a cloud-based solution that helps businesses in the energy, healthcare, financial, and other sectors streamline data backup and recovery.

Read more about Oodrive Save

Users also considered
Corero SmartWall One logo

DDoS protection and network security solution

learn more
Corero SmartWall One is a DDoS protection solution that enables businesses to protect against malicious cyber threats. By implementing SmartWall One, users can mitigate the risks of downtime and safeguard the organization's reputation from the damaging effects of DDoS attacks.

Read more about Corero SmartWall One

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
IBM i Security Suite logo

Cloud-based software for security and compliance

learn more
IBM i Security Suite from Fresche Solutions is a comprehensive security designed to enhance data protection for IBM i systems. It focuses on mitigating risks and ensuring compliance by providing multiple layers of defense.

Read more about IBM i Security Suite

Users also considered
Ivanti Neurons for RBVM logo

Risk-based vulnerability management platform

learn more
Ivanti Neurons for RBVM is a patch management solution that helps organizations evolve vulnerability management strategy to a risk-based approach. The solution enables prioritization of vulnerabilities and weaknesses that pose the most risk, allowing organizations to protect against ransomware and other cyber threats.

Read more about Ivanti Neurons for RBVM

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
NordStellar logo

Boost security with proactive threat management.

learn more
NordStellar is a threat exposure management platform that helps businesses detect and respond to cyber threats before they escalate. The platform provides complete visibility into digital risks, enabling security teams to monitor the deep and dark web for compromised data, detect account takeovers, and prevent session hijacking. NordStellar's innovative solution helps organizations safeguard their data, protect customer accounts, and mitigate the risk of cyberattacks.

Read more about NordStellar

Users also considered
Feroot logo

Cybersecurity solution

learn more
Feroot is a GRC AI platform that helps businesses automate website security and compliance programs to meet the requirements of PCI DSS 4.0, HIPAA, CCPA/CPRA, CIPA, GDPR, and other laws and standards. The platform provides complete visibility and control over a website's data, enabling businesses to stay ahead of evolving privacy compliance violations and security threats.

Read more about Feroot

Users also considered
Domdog logo

Page security and privacy platform

learn more
Domdog offers a security platform designed to help businesses meet PCI DSS 4.0.1 requirements 6.4.3 and 11.6.1 for payment page protection. The solution features three monitoring modes—JavaScript Agent, Content Security Policy, and Remote Scanner—allowing organizations to implement the appropriate security level for their environment. Domdog provides comprehensive evidence reports that can be exported as PDFs for auditor review.

Read more about Domdog

Users also considered
DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
Sensfrx logo

AI-enabled tool for real-time fraud detection and defense

learn more
Sensfrx is an AI-enabled fraud detection and prevention platform that helps businesses fight digital fraud. Using machine learning and real-time behavioral analytics, the platform adapts to changing fraud methods, providing strong protection for industries such as banking, fintech, SaaS, and eCommerce.

Read more about Sensfrx

Users also considered
Attack Surface logo

Affordable, easy to use Attack Surface tool.

learn more
Risk Cognizance's Attack Surface Platform provides comprehensive vulnerability management across digital environments, including external assets, internal networks, cloud services, and third-party vendors. The platform integrates NIST CSF and OWASP guidelines to identify critical assets, assess risks, and implement security measures through continuous monitoring and threat detection capabilities.

Read more about Attack Surface

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Cyqur logo

Password manager

learn more
Cyqur helps empower businesses with hacking prevention, 24x7 access, location control, and DLT proof of record for sensitive data like passwords, access credentials, and notes. The patented tech encrypts and fragments data across multiple user-owned cloud locations, rendering it useless if breached.

Read more about Cyqur

Users also considered
Yakabod Cyber Incident Manager logo

The best kept secret in case management

learn more
Yakabod's zero trust platform, facilitates secure collaboration without compromising sensitive data. The best kept secret in case management, tested and vetted for the past 17 years in securing sensitive data for insider threat, cyber incident management, counter-intelligence, and other use cases.

Read more about Yakabod Cyber Incident Manager

Users also considered
Insights logo

Threat Intelligence protects from attacks before disclosure

learn more
Leverage InQuest Threat Intelligence services to reduce time spent performing manual threat research. Improve your ability to predict, prevent, detect, prevent, hunt, and respond to emerging threats targeting your organization.

Read more about Insights

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to monitor, track, and manage cybersecurity risk across multiple environments.

Read more about Wiz

Users also considered
Dasera logo

Automate, Govern, Secure: Protect Your Data with Dasera

learn more
Dasera is a cloud-based data discovery and management solution that provides organizations with the tools needed to navigate the complexities of data environments.

Read more about Dasera

Users also considered
YesWeHack logo

Global Bug Bounty and VDP Platform

learn more
YesWeHack is a global Bug Bounty and Vulnerability Management Platform that connects organizations to tens of thousands of ethical hackers worldwide. The aim is to uncover and patch vulnerabilities in websites, mobile apps, connected devices, and digital infrastructure, bolstering cyber defense strategies.

Read more about YesWeHack

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered