getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 15

Last updated: February 2026

505 software options

SafeGuard Cyber Security logo

Cybersecurity platform with NLU analytics

learn more
SafeGuard Cyber Security is a cybersecurity platform that helps businesses protect their communications, employees, and data against social engineering attacks and other threats.

Read more about SafeGuard Cyber Security

Users also considered
Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
Arctic Wolf Managed Detection and Response logo

Security software for detecting and mitigating cyberattacks

learn more
Arctic Wolf Managed Detection and Response offers round-the-clock monitoring of networks, endpoints, and clouds to block cyberattacks. Integrating with existing tech, it identifies assets, gathers security data, and tracks threats continuously, allowing organizations to concentrate elsewhere. The system swiftly investigates and contains incidents, preventing escalation. It also aids in recovery, enhancing rules to bolster defenses against future threats.

Read more about Arctic Wolf Managed Detection and Response

Users also considered
Advisera logo

Web-based ISO compliance & document management solution

learn more
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards

Read more about Advisera

Users also considered
ThreatConnect TI Ops Platform logo

Built for operations, not just centralization.

learn more
TI Ops is the threat intelligence platform built for operations, not just centralization.

Read more about ThreatConnect TI Ops Platform

Users also considered
SpyWarrior logo

Anti-virus software

learn more
SpyWarrior is a comprehensive anti-malware solution designed to provide online protection and security against ransomware, viruses, trojans and other threats using AI algorithms and machine learning.

Read more about SpyWarrior

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
Hobsec logo

Complete security platform that automatically discovers and

learn more
Hobsec is a complete cybersecurity solution that automatically finds and fixes security threats.

Read more about Hobsec

Users also considered
Mitiga logo

Cloud & SaaS forensics for incident response and threat hunt

learn more
Mitiga’s modern IR2 platform and teams of cloud and SaaS forensics experts help you prepare for cloud and SaaS application breaches before they happen and recover in record time. We're dedicated to creating a whole new level of resilience for today's cloud and SaaS-driven enterprises.

Read more about Mitiga

Users also considered
Verosint logo

Stop account fraud before it starts

learn more
Verosint, a leading provider of account fraud detection and prevention, helps digital businesses answer the question of “who’s there?” By combining verified, open source intelligence, identity graphing techniques and risk signal orchestration, Verosint stops account fraud before it starts.

Read more about Verosint

Users also considered
Nudge Security logo

Making security work for modern work

learn more
Nudge Security is a cybersecurity startup securing modern organizations through the power of the modern workforce. It helps businesses with SaaS discovery, identity and access, risk insights, attack surface, security nudges and more.

Read more about Nudge Security

Users also considered
ThreatMark logo

Fraud prevention & risk management system for banking sector

learn more
ThreatMark is a fraud detection and prevention software designed to help banks manage transaction risk analysis, user behavior profiling, and threat detection. The centralized dashboard allows fraud analysts to gain visibility into security or risk events and view real-time alerts for credit risks.

Read more about ThreatMark

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
IntSights logo

Endpoint threat intelligence and protection suite

learn more
IntSights is an external threat intelligence and protection suite designed to help businesses in financial services, manufacturing, retail, food & beverage, insurance, automotive, and other sectors monitor, detect and mitigate risks that impact digital footprints for brands.

Read more about IntSights

Users also considered
CloudEye logo

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
AirCISO logo

Extended detection and response (XDR) software

learn more
AirCISO is an XDR software that connects in to your devices and provides actionable insights and intelligence.

Read more about AirCISO

Users also considered
BroShield logo

Computer security and parental control software

learn more
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls, manage robotic troubleshooting, and handle other processes.

Read more about BroShield

Users also considered
zScan logo

Cloud-based application development and cybersecurity tool

learn more
zScan helps app developers create and deploy mobile software applications by managing comprehensive aspects of the software development cycle. Key attributes include IT risk management, compliance control, audit management, alert notifications, legal risk assessments, and CAPA.

Read more about zScan

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
CTM360 logo

Global Digital Risk Protection Platform

learn more
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Asimily Insight logo

Healing the Devices that Heal

learn more
Asimily is athje leading risk management platform for IoT devices and web-connected equipment.

Read more about Asimily Insight

Users also considered