App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 13

442 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Acra  logo

Acra

(0)

Protect sensitive data in databases and distributed apps

learn more
Acra database security suite is a set of modern security controls, built to secure sensitive data inside modern distributed apps, clouds and databases, making the life of solution architects and operations teams easier.

Read more about Acra

Users also considered
Managed Detection and Response (MDR) logo

Managed Detection and Response (MDR)

(0)

Cloud-based threat detection, response, and mitigation tool

learn more
Managed Detection and Response (MDR) is a cloud-based software designed to help businesses detect, investigate, and resolve cyber security threats. Supervisors can use the dashboard to gain 360-degree visibility across all endpoints, networks or cloud environments and configure role-based view access across teams.

Read more about Managed Detection and Response (MDR)

Users also considered
ThreatX logo

ThreatX

(0)

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
EndCrypt logo

EndCrypt

(0)

Fully Protect Your Mobile Apps!

learn more
EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmantal threats.

Read more about EndCrypt

Users also considered
Risk Assistant logo

Risk Assistant

(0)

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
BitSight logo

BitSight

(0)

The Standard in Security Ratings

learn more
Identify, Quantify, and Reduce Cyber Risk: Make better, faster decisions about cyber risk with BitSight, the only Security Rating with proven correlation to business outcomes.

Read more about BitSight

Users also considered
iManage Threat Manager logo

iManage Threat Manager

(0)

Advanced threat detection and monitoring

learn more
iManage Threat Manager helps organizations protect sensitive information from internal and external threats using innovative technology to continuously monitor, alert and secure critical knowledge work. It provides sophisticated threat detection, intervention, analytics, and data governance functionalities to protect sensitive content with compliance monitoring.

Read more about iManage Threat Manager

Users also considered
iQ.Suite aaS logo

iQ.Suite aaS

(0)

Enterprise email management & security solution for M365

learn more
iQ.Suite aaS is a cloud-based enterprise email management and security solution for companies using Microsoft 365. It offers a comprehensive set of features including content-driven encryption, insider threat detection, wrong recipient protection, and more. iQ.Suite aaS offers malware and spam detection to minimize risk and secure emails from unauthorized access. Additionally, to ensure company policies are met, this solution can be used to apply business policies to email communications.

Read more about iQ.Suite aaS

Users also considered
Match logo

Match

(0)

Threat detection and cybersecurity solution

learn more
Anomali Match helps improve organizational efficiencies by automating extended detection and response (XDR) activities to profile a threat and its impact on the organization quickly.

Read more about Match

Users also considered
The Anomali Platform logo

The Anomali Platform

(0)

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
Verosint logo

Verosint

(0)

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
i-RADAR logo

i-RADAR

(0)

CONTINUOUS TESTING, MONITORING AND REMEDIATION.

learn more
i-RADAR is an attack surface management platform designed to prevent security breaches in an organization by finding exposed digital assets.

Read more about i-RADAR

Users also considered
ProVision logo

ProVision

(0)

Faster, Easier, Smarter Security & Compliance Operations

learn more
ProVision offers security and compliance in one, streamlined platform. Get insights into your entire network and automated compliance support to ensure your organization stays protected against cyber threats.

Read more about ProVision

Users also considered
FYEO DI logo

FYEO DI

(0)

Secure your organization with actionable threat intelligence

learn more
FYEO Domain Intelligence is FYEO's self-service threat intelligence platform that helps manage darknet mentions, leaked credential alerts, anti-phishing, and more.

Read more about FYEO DI

Users also considered
LetsDefend logo

LetsDefend

(0)

Online training platform for SOC teams.

learn more
LetsDefend is a cloud-based defensive cybersecurity platform for SOC teams. With SOC environment, it provides real incidents and helps to improve SOC Analysts and Incident Responders skills and report progress to their manager.

Read more about LetsDefend

Users also considered
cleanAD logo

cleanAD

(0)

Every ad. Every threat.

learn more
cleanAD is an anti-malvertising solution that enables publishers and ad platforms to detect and stop malvertising in real-time, on client-side using a patented behavioral analysis approach that protects user experience while protecting your ad revenue.

Read more about cleanAD

Users also considered
Interset logo

Interset

(0)

Cybersecurity and threat intelligence software

learn more
Interset is a cybersecurity and analytics platform that uses machine learning and AI to detect and respond to insider and external threats in real time. It is designed to help organizations identify and respond to security threats before they cause damage.

Interset is used by organizations in a variety of industries, including healthcare, financial services, and government. It can help organizations comply with regulatory requirements and protect sensitive data from cyber threats.

Read more about Interset

Users also considered
Cyber Security Services logo

Cyber Security Services

(0)

Network security service for cloud & on-premise systems

learn more
Cyber Security Services is a modular technology-enabled service offering by Advanced, which helps organizations ensure data protection across cloud, hosted, and on-premise IT infrastructure in compliance with ISO 27001 and National Cyber Security Center regulations.

Read more about Cyber Security Services

Users also considered
HAYAG logo

HAYAG

(0)

Compliance, vendor, and risk management software

learn more
HAYAG helps medical organizations comply with HIPAA and other statutory regulations and manage revenue cycle analysis, patients, coding, and more. Users can implement quality management systems with appropriate procedures & metrics to ensure adherence to ISO, cybersecurity & data privacy standards.

Read more about HAYAG

Users also considered
Crowdsec logo

Crowdsec

(0)

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
LIAPP logo

LIAPP

(0)

The Best in Mobile Application Protection

learn more
LIAPP is a security solution designed to help users protect mobile applications from unauthorized access, data breach, and hack attempts.

Read more about LIAPP

Users also considered
SOAR+ logo

SOAR+

(0)

Security automation platform for the entire threat lifecycle

learn more
Security automation for the entire threat lifecycle.

Read more about SOAR+

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK

(0)

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Area 1 Horizon logo

Area 1 Horizon

(0)

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1 Horizon

Users also considered
PhishX logo

PhishX

(0)

A cybersecurity training solution

learn more
PhishX is a solution that specializes in cybersecurity. Companies can use the platform to train their staff to recognize threats and cyber-attacks to protect the company's equipment and prevent data theft from employees' personal devices, which usually have access to emails and corporate platforms.

Read more about PhishX

Users also considered