getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software for Windows - Page 9

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


255 software options

Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
Senteon logo

Cloud-based cybersecurity tool for managed service providers

learn more
Senteon is a cloud-based cybersecurity solution that helps managed service providers (MSPs) automate security configuration on a centralized interface. The platform utilizes artificial intelligence (AI) technology to help users conduct system evaluations and review non-compliant settings. Additionally, Senteon also provides compliance mappings, drift monitoring, remediation management, threat tracking, change history tracking, reporting, and more.

Read more about Senteon

Users also considered
Systancia Cleanroom logo

Privileged access management (PAM) solution

learn more
Systancia Cleanroom is a Privileged Access Management product that enables users to manage privileged access to IT and OT systems, from the corporate network or Internet, by monitoring the accounts used for authentication to resources and finely tracking all actions. It offers features such as agentless video recording of web resources with no jump server and native management of remote access based on a ZTNA solution.

Read more about Systancia Cleanroom

Users also considered
remote.it logo

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered
HarfangLab logo

Cloud-based endpoint protection and cybersecurity solution

learn more
HarfangLab is a cloud-based cybersecurity software that helps businesses isolate endpoints remotely and facilitate the blocking of threats.

Read more about HarfangLab

Users also considered
Systancia Access logo

Access management and user authentication solution

learn more
Systancia Access streamlines access management, user authentication, and single sign-on authentication operations. It aims to provide a secure and centralized way to manage credentials while also enhancing user authentication through Multi-Factor Authentication (MFA).

Read more about Systancia Access

Users also considered
Netrinos logo

Secure global LAN for seamless connections.

learn more
The Netrinos Network is a secure private network that seamlessly bypasses firewalls and routers, giving users instant access to their devices from anywhere on the internet. It encrypts traffic for privacy and security, allows devices to connect across locations, and switches networks without disrupting connections.

Read more about Netrinos

Users also considered
CalQRisk logo

An Integrated Modular Software Solution, Tailored to you

learn more
CalQRisk is a modular Governance, Risk & Compliance (GRC) software solution, with pick and choose modules and customisable risk registers to suit your business needs.


CalQRisk allows teams to focus on the important tasks, saving you time and money.

Read more about CalQRisk

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
RedRok logo

Security done right.

learn more
RedRok offers easy-to-use security solutions that cover endpoint, network, and cloud security, as well as threat intelligence and compliance management.

Read more about RedRok

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Silo for Research logo

Endpoint protection management tool for IT and other sectors

learn more
Silo is an endpoint protection management software designed to help businesses in the IT, legal, government, finance, healthcare, and other sectors securely access websites and collect data to anonymously conduct investigations. Key features of the platform include network isolation, delegated admin control, data loss prevention, encrypted audit logs, Dark Web access, and language translation.

Read more about Silo for Research

Users also considered
DEFENCE logo

Keep your business safe from cyber risks and compliant!

learn more
DEFENCE is the platform that allows you to fully manage cyber & IT security ensuring compliance with the highest standards in use.

Read more about DEFENCE

Users also considered
Lepide Data Security Platform logo

Data security. Simplified.

learn more
Lepide audits and protects files and folders, and the systems that govern access to them, without requiring a massive IT security team.

With detailed visibility over user behavior, permissions, security states, and more, you can ensure your data is protected from internal and external threats.

Read more about Lepide Data Security Platform

Users also considered
Magnet AXIOM Cyber logo

Digital forensics and incident response software

learn more
Magnet AXIOM Cyber is a cloud-based incident response and digital forensics software.

Read more about Magnet AXIOM Cyber

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden offers complete identity cybersecurity in a single package - ensuring that user, application, machine, AI, and cloud identities across your entire IT landscape are protected under a single pane.

Read more about Securden

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
FileFlex logo

Zero Trust Data Access Overlay Service

learn more
FileFlex Enterprise is a zero trust overlay service that governs, restricts and manages remote access and sharing of unstructured data across your entire hybrid-IT multi-domain environment of on-premises, cloud-hosted and SharePoint storage.

Read more about FileFlex

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered
ArkAngel logo

Technology-agnostic cybersecurity software

learn more
ArkAngel is a web-based cybersecurity software designed to help businesses across various industries get a 360-degree view of their IT risk and security environment. The platform lets teams continuously monitor and manage risk levels to defined standards.

Read more about ArkAngel

Users also considered
BlackCloak logo

Protect Your Executives Personal Lives, Protect Your Company

learn more
BlackCloak helps reduce enterprise risk by providing online privacy protection, home network security, device security, identity theft protection, and cybersecurity incident response to executives in their personal digital lives.

Read more about BlackCloak

Users also considered
Clario logo

One Clario app. Complete cybersecurity.

learn more
Clario is a cybersecurity app that combines VPN, data breach monitoring, antivirus, ad blocker, and other great security tools. It helps users secure their devices and online identity from viruses, hacking, ID theft, or spying - all in real-time. One Clario account easily protects up to three iOS, Android, or macOS devices.

Read more about Clario

Users also considered
Tripwire Enterprise logo

Superior security, continuous compliance.

learn more
Fortra's Tripwire Enterprise is a leading compliance monitoring solution, using file integrity monitoring (FIM) and security configuration management (SCM). Backed by decades of experience, its advanced use cases are unmatched by other solutions.

Read more about Tripwire Enterprise

Users also considered