getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Cybersecurity Software - Page 19

Last updated: February 2026

505 software options

The Anomali Platform logo

Cloud-based & on-premise XDR tool for administrators.

learn more
The Anomali Platform is a cloud-based and on-premise vulnerability management solution, which helps businesses in finance, aviation, banking, and other sectors handle cybersecurity via machine learning (ML). The platform offers various features including exposure management, threat intelligence, extended detection and response, risk protection, natural language processing (NLP), data transformation, attack surface management, and more.

Read more about The Anomali Platform

Users also considered
ThreatDefence XDR Platform logo

On-premise & cloud-based XDR tool for developers.

learn more
ThreatDefence XDR Platform is a cloud-based and on-premise cybersecurity solution, which helps businesses in legal services, education, finance, and other sectors manage threat detection and response across servers, cloud environments, endpoints, and more. The platform provides various features such as vulnerability management, dark web monitoring, activity tracking, risk protection, root cause analysis, cloud asset management, and reporting.

Read more about ThreatDefence XDR Platform

Users also considered
Panzura logo

Award-winning hybrid, multi-cloud data management

learn more
Award-winning hybrid, multi-cloud data management platform. Panzura's cloud product suite includes CloudFS, Data Services, Smart Apps, and Global Services. Panzura solves all your most critical cloud data management challenges.

Read more about Panzura

Users also considered
Field Effect logo

Cyber security solution for MSPs

learn more
Field Effect is a cyber security solution that offers advanced threat detection and response, as well as cyber training for businesses. Field Effect’s technology combines artificial intelligence (AI) with industry best practices to offer a comprehensive defence against cyber attacks.

Read more about Field Effect

Users also considered
SURFSecurity logo

A secure identity-first zero-trust enterprise browser

learn more
BYOD and cloud-adoption is making it hard for CISOs to track and secure remote environments, forcing them to add tools to their growing security stack. SURF's zero-trust enterprise browser collapses the security stack into one single control point, ensuring that security starts at the user identity.

Read more about SURFSecurity

Users also considered
Fingerprint logo

Identify fraud before it happens.

learn more
Fingerprint offers a comprehensive user profiling solution for both web and mobile platforms. Recognize 99.5% of returning visitors, and get the full view of your users behavior.

Read more about Fingerprint

Users also considered
Vortex logo

Cybersecurity and threat intelligence software

learn more
Vortex is a cloud-based cybersecurity platform that helps in threat prevention and detection. It offers threat prevention capabilities with its groundbreaking Simulation Intelligence and Signature-less detection technology. It supports several file types, such as Microsoft Office documents, PDFs, image files, audio, video files, and more. This approach helps in the thorough protection of user data.

Read more about Vortex

Users also considered
Senteon logo

Cloud-based cybersecurity tool for managed service providers

learn more
Senteon is a cloud-based cybersecurity solution that helps managed service providers (MSPs) automate security configuration on a centralized interface. The platform utilizes artificial intelligence (AI) technology to help users conduct system evaluations and review non-compliant settings. Additionally, Senteon also provides compliance mappings, drift monitoring, remediation management, threat tracking, change history tracking, reporting, and more.

Read more about Senteon

Users also considered
Red Access logo

Agentless Browsing Security

learn more
Red Access is an agentless browsing security platform that helps companies secure web sessions without disrupting user experience. It prevents zero-day threats and malware across browsers, files, identity, and data with combined cloud and endpoint inspection. The platform supports hybrid environments, secures web apps and browsers across devices and operating systems, and enables control and visibility without installing agents, isolating browsers, or adding extensions.

Read more about Red Access

Users also considered
Corsha logo

Identity Provider for Machines to elevate security

learn more
Corsha is an Identity Provider for Machines that allows an enterprise to securely connect, move data, and automate with confidence from anywhere to anywhere. Corsha builds dynamic identities for trusted machines and brings innovation like automated, one-time-use MFA credentials to APIs.

Read more about Corsha

Users also considered
Todyl Security Platform logo

Cloud-based cybersecurity platform

learn more
Todyl is an all-in-one cloud-based cybersecurity platform that lets users identify threats, protect data, simplify architectures, and more.

Read more about Todyl Security Platform

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Cyqur logo

Password manager

learn more
Cyqur helps empower businesses with hacking prevention, 24x7 access, location control, and DLT proof of record for sensitive data like passwords, access credentials, and notes. The patented tech encrypts and fragments data across multiple user-owned cloud locations, rendering it useless if breached.

Read more about Cyqur

Users also considered
Integrite logo

Digital Risk Monitoring and Threat Intelligence

learn more
SaaS-based AI-powered digital risk monitoring platform helps you to do a 360-degree posturing on digital assets and prevent risks.

Read more about Integrite

Users also considered
Netwrix Threat Manager logo

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager

Users also considered
ShadowHQ logo

Out-of-band collaboration platform used during Cyber Attacks

learn more
ShadowHQ is a communications and document storage platform that is deployed the moment a cyber attack is initiated.

It provides:
- secure communications [instant text, mass text, recorded video],
- war rooms [IT, PR, Shareholders, Sales], and
- secure document storage [playbooks, press releases].

Read more about ShadowHQ

Users also considered
Asimily Insight logo

Healing the Devices that Heal

learn more
Asimily is athje leading risk management platform for IoT devices and web-connected equipment.

Read more about Asimily Insight

Users also considered
ManageEngine Endpoint DLP Plus logo

Monitor and protect sensitive data across endpoints

learn more
ManageEngine Endpoint DLP Plus is an enterprise-ready solution that monitors the transfer and usage of sensitive data across the business IT network. The solution supports advanced data discovery and classification techniques such as Fingerprint, RegEx, and keywords search, through which sensitive data is identified and protected across the different endpoints in your organization.

Read more about ManageEngine Endpoint DLP Plus

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
ThreatAdvice Breach Prevention logo

Cybersecurity and risk assessment platform

learn more
ThreatAdvice vCISO is a cybersecurity platform designed to assist businesses with risk assessment and vulnerability management operations. Administrators can configure roles, view disaster recovery questionnaires, and store policy information within a centralized repository.

Read more about ThreatAdvice Breach Prevention

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service platform delivers continuous, scalable, and cost-effective penetration testing — empowering businesses to identify and address security vulnerabilities in real time.

Read more about Blacklock

Users also considered
Armor logo

Ransomware and endpoint protection tool for SMBs

learn more
Multi-layered anti-ransomware solution preventing ransomware before it even starts, working alongside EDR/EPP/XDR agents.

Read more about Armor

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
Phalanx GRC logo

Built, manage and maintain your compliance program.

learn more
Phalanx is a GRC platform that can help your team effectively build, manage, and maintain your compliance program. With Phalanx, you not only get access to the software itself but also have a dedicated team of security and compliance professionals who are there to help you every step of the way.

Read more about Phalanx GRC

Users also considered