getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 17

Last updated: February 2026

505 software options

DNSSense logo

AI-enabled cybersecurity solution for malware protection

learn more
DNSSense is an online cybersecurity suite designed to help professionals with domain name systems (DNS)-layer threat detection and prevention.

Read more about DNSSense

Users also considered
Sensfrx logo

AI-enabled tool for real-time fraud detection and defense

learn more
Sensfrx is an AI-enabled fraud detection and prevention platform that helps businesses fight digital fraud. Using machine learning and real-time behavioral analytics, the platform adapts to changing fraud methods, providing strong protection for industries such as banking, fintech, SaaS, and eCommerce.

Read more about Sensfrx

Users also considered
Attack Surface logo

Affordable, easy to use Attack Surface tool.

learn more
Risk Cognizance's Attack Surface Platform provides comprehensive vulnerability management across digital environments, including external assets, internal networks, cloud services, and third-party vendors. The platform integrates NIST CSF and OWASP guidelines to identify critical assets, assess risks, and implement security measures through continuous monitoring and threat detection capabilities.

Read more about Attack Surface

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Cyqur logo

Password manager

learn more
Cyqur helps empower businesses with hacking prevention, 24x7 access, location control, and DLT proof of record for sensitive data like passwords, access credentials, and notes. The patented tech encrypts and fragments data across multiple user-owned cloud locations, rendering it useless if breached.

Read more about Cyqur

Users also considered
Yakabod Cyber Incident Manager logo

The best kept secret in case management

learn more
Yakabod's zero trust platform, facilitates secure collaboration without compromising sensitive data. The best kept secret in case management, tested and vetted for the past 17 years in securing sensitive data for insider threat, cyber incident management, counter-intelligence, and other use cases.

Read more about Yakabod Cyber Incident Manager

Users also considered
Insights logo

Threat Intelligence protects from attacks before disclosure

learn more
Leverage InQuest Threat Intelligence services to reduce time spent performing manual threat research. Improve your ability to predict, prevent, detect, prevent, hunt, and respond to emerging threats targeting your organization.

Read more about Insights

Users also considered
CyberHive Connect logo

Zero trust, quantum-safe, software-defined mesh network.

learn more
CyberHive Connect provides a fast and resilient network connection directly between approved devices. It has lightweight code, making it equally at home in a corporate network or in the field on IoT devices. It enables a step change in network performance and reliability.

Read more about CyberHive Connect

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to monitor, track, and manage cybersecurity risk across multiple environments.

Read more about Wiz

Users also considered
Dasera logo

Automate, Govern, Secure: Protect Your Data with Dasera

learn more
Dasera is a cloud-based data discovery and management solution that provides organizations with the tools needed to navigate the complexities of data environments.

Read more about Dasera

Users also considered
YesWeHack logo

Global Bug Bounty and VDP Platform

learn more
YesWeHack is a global Bug Bounty and Vulnerability Management Platform that connects organizations to tens of thousands of ethical hackers worldwide. The aim is to uncover and patch vulnerabilities in websites, mobile apps, connected devices, and digital infrastructure, bolstering cyber defense strategies.

Read more about YesWeHack

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
The Marvelous APS Software logo

The Marvelous APS Software for Production Capacity Planning

learn more
The Marvelous APS is an Advanced Production Capacity Planning & Production Scheduling Software

Read more about The Marvelous APS Software

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Kikimora Agent logo

AI-powered cybersecurity platform

learn more
Kikimora Agent is a ai-powered vulnerability management solution. The agent allows for conversational management of complex security tasks across your infrastructure.

Read more about Kikimora Agent

Users also considered
MetaDefender Storage Security logo

Multi-layered data storage protection platform

learn more
MetaDefender Storage Security enables teams to ensure data protection across on-premises, hybrid, and cloud environments in a single platform. It allows managers to combine metascan multiscanning, deep CDR, and proactive DLP to detect and remove threats in stored files. The solution integrates with storage platforms, such as AWS S3, Microsoft Azure, NetApp, and SharePoint, enabling secure file collaboration and regulatory compliance.

Read more about MetaDefender Storage Security

Users also considered
SiON logo

Employee threat management platform

learn more
Cybersecurity protects systems, networks, and data from theft, damage, and unauthorized access. It’s essential for preventing cyberattacks, safeguarding sensitive information, ensuring business continuity, and maintaining trust in a digital world.

Read more about SiON

Users also considered
HTTPCS Cyber Vigilance logo

Data leaks monitoring and cyber threats detection solution

learn more
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches.

Read more about HTTPCS Cyber Vigilance

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
HAYAG logo

Compliance, vendor, and risk management software

learn more
HAYAG helps medical organizations comply with HIPAA and other statutory regulations and manage revenue cycle analysis, patients, coding, and more. Users can implement quality management systems with appropriate procedures & metrics to ensure adherence to ISO, cybersecurity & data privacy standards.

Read more about HAYAG

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
Our fraud-prevention partner analyzes customers' PANs, purchase histories, locations, IP addresses, and payment origins to ensure no fraud occurs. TokenEx supports multiple, layered third-party integrations to combine tokenization with other services for maximum security and flexibility.

Read more about TokenEx

Users also considered
Cymulate logo

Cybersecurity and attack simulation software for SMBs

learn more
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.

Read more about Cymulate

Users also considered