App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 2

442 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

ESET Endpoint Security logo

ESET Endpoint Security

4.7
(1.1K)

Network security, network monitoring & endpoint protection

visit website
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Users also considered
ESET PROTECT MDR logo

ESET PROTECT MDR

4.8
(15)

Future ready protection for enterprise

visit website
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
ManageEngine Log360 logo

ManageEngine Log360

4.6
(10)

Comprehensive SIEM solution

visit website
ManageEngine Log360 is a log management and SIEM (security information and event management) platform which helps businesses to monitor and manage network security, audit Active Directory changes, log devices, and gain visibility into cloud infrastructures.

Read more about ManageEngine Log360

Users also considered
Agari Phishing Defense logo

Agari Phishing Defense

4.5
(8)

Phishing defense software

visit website
With Agari Phishing Defense, users can prevent breach activity at the cloud gateway and proactively protect users from impersonation attacks.

Read more about Agari Phishing Defense

Users also considered
Fortra's Agari DMARC Protection logo

Fortra's Agari DMARC Protection

(0)

Software for protection from spoofing and phishing attacks

visit website
Agari Brand Protection is a simple anti-phishing solution that helps enterprises prevent and recover from email spoofing attacks. Businesses can block phishing attacks with DMARC, SPF, DKIM, and other email authentication services.

Read more about Fortra's Agari DMARC Protection

Users also considered
BooleBox logo

BooleBox

4.6
(33)

Secure file sharing and data protection platform

visit website
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
FileFlex logo

FileFlex

(0)

Zero Trust Data Access Overlay Service

visit website
FileFlex Enterprise is a zero trust overlay service that governs, restricts and manages remote access and sharing of unstructured data across your entire hybrid-IT multi-domain environment of on-premises, cloud-hosted and SharePoint storage.

Read more about FileFlex

Users also considered
Endpoint Detection and Response logo

Endpoint Detection and Response

4.0
(1)

Endpoint detection and response software

visit website
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks and fileless threats. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Users also considered
Quantum Armor logo

Quantum Armor

5.0
(1)

Attack surface management platform

visit website
Quantum Armor is a cloud-based attack surface management platform solution to fully integrate threat intelligence, cloud security and patch management.

The software is available on a continuous monitoring or on-demand model and offers competitive pricing to meet every budget.

Read more about Quantum Armor

Users also considered
Exein logo

Exein

(0)

Open-source cybersecurity solution for IoT & SCADA firmware

visit website
Exein is a cloud-based and open-source cybersecurity framework for IoT and SCADA firmware systems, which runs autonomously on any running device and helps businesses identify existing threats or suspicious behavior.

Read more about Exein

Users also considered
ArkAngel logo

ArkAngel

(0)

Technology-agnostic cybersecurity software

visit website
ArkAngel is a web-based cybersecurity software designed to help businesses across various industries get a 360-degree view of their IT risk and security environment. The platform lets teams continuously monitor and manage risk levels to defined standards.

Read more about ArkAngel

Users also considered
Twingate logo

Twingate

5.0
(2)

Secure work, anywhere

visit website
Twingate makes it easy for organizations to adopt a Zero Trust architecture, replacing corporate VPNs with a more secure and usable solution.

Read more about Twingate

Users also considered
CipherBox logo

CipherBox

5.0
(1)

Endpoint detection and response and cybersecurity software

visit website
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Users also considered
CloudJacketX logo

CloudJacketX

5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

visit website
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketX

Users also considered
Resecurity Context logo

Resecurity Context

(0)

Threat analysis platform

visit website
Resecurity Context is a cloud-based threat analysis platform. The platform allows companies to deliver global visibility and identify the exposure of sensitive data, confidential documents, and more.

Read more about Resecurity Context

Users also considered
Resecurity Risk logo

Resecurity Risk

5.0
(2)

Supply chain monitoring platform

visit website
Resecurity Risk is a supply chain monitoring platform that tracks risks, provides alerts, and manages threats. The platform integrates data from multiple sources and offers an interface for deep-dive investigation.

Read more about Resecurity Risk

Users also considered
Push Security logo

Push Security

5.0
(4)

User-centric cloud security platform

visit website
Push Security uses an API integration and browser extension to give visibility of the SaaS and cloud apps employees are using as well as third-party app integrations with core work platforms.

Read more about Push Security

Users also considered
PureDome logo

PureDome

4.0
(1)

Secure. Reliable. Quick.

visit website
PureDome is dedicated to empowering businesses with robust cybersecurity solutions, ensuring the safeguarding of sensitive data and critical operations. It establishes secure encrypted connections, and ensures secure remote access, shielding communications from potential threats.

Read more about PureDome

Users also considered
Guardz logo

Guardz

(0)

Cybersecurity solution

visit website
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Malwarebytes for Business logo

Malwarebytes for Business

4.7
(2.3K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
Google Cloud logo

Google Cloud

4.7
(1.7K)

Modular platform for computing, hosting, storage & more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud

Users also considered
AVG Antivirus Business Edition logo

AVG Antivirus Business Edition

4.3
(2.1K)

Business antivirus with endpoint solution & server security

learn more
AVG Antivirus Business Edition is designed to protect business & customer data by securing all important data, from PCs to file servers

Read more about AVG Antivirus Business Edition

Users also considered
Cloudflare logo

Cloudflare

4.8
(418)

Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare

Users also considered
Keeper Security logo

Keeper Security

4.7
(470)

Secure password management and digital vault.

learn more
Keeper is a password manager and digital vault protecting passwords and sensitive digital assets for thousands of businesses and millions of individuals.

Read more about Keeper Security

Users also considered
SpamTitan logo

SpamTitan

4.6
(519)

Anti-spam filter for business email. Vital email security.

learn more
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support

Read more about SpamTitan

Users also considered