This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

List of Top Cybersecurity Software - Page 2

ManageEngine Key Manager Plus logo
Trava logo
Enigma Vault logo

Too many apps to choose?

Find the right ones for you

What does your business do?

Select your industry

How many people will use the app?

Select the number of users

Filter results


Features



Pricing model




User rating


289 software options

Sponsored

Trava logo

Trava

(0)

Cybersecurity solution with surveys and assessments

visit website
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Show me more like this
ManageEngine Key Manager Plus logo

ManageEngine Key Manager Plus

(0)

Web-based SSH key and SSL certificate management solution

visit website
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.

Read more about ManageEngine Key Manager Plus

Show me more like this
Enigma Vault logo

Enigma Vault

(0)

Secure your data

visit website
Enigma Vault is a SaaS-based secure card, data, and file storage and processing solution built from the ground up to solve your data security problems. Instead of you handling and storing sensitive data, we give you a token that can then be used for later retrieval and processing.

Read more about Enigma Vault

Show me more like this
Vijilan logo

Vijilan

4.7
(10)

Continuous Monitoring for MSPs.

visit website
Vijilan is a continuous monitoring solution that allows MSPs to detect and remediate security breaches.

Read more about Vijilan

Show me more like this
FileFlex logo

FileFlex

(0)

Zero Trust Data Access Overlay Service

visit website
FileFlex Enterprise is a zero trust overlay service that governs, restricts and manages remote access and sharing of unstructured data across your entire hybrid-IT multi-domain environment of on-premises, cloud-hosted and SharePoint storage.

Read more about FileFlex

Show me more like this
ThreatMark logo

ThreatMark

(0)

Fraud prevention & risk management system for banking sector

visit website
ThreatMark is a fraud detection and prevention software designed to help banks manage transaction risk analysis, user behavior profiling, and threat detection. The centralized dashboard allows fraud analysts to gain visibility into security or risk events and view real-time alerts for credit risks.

Read more about ThreatMark

Show me more like this
Abnormal Security logo

Abnormal Security

(0)

A Fundamentally Different Approach to Email Security

visit website
Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

Read more about Abnormal Security

Show me more like this
Arcules logo

Arcules

(0)

Cloud Surveillance, Simplified.

visit website
A simple and unified video surveillance, access control, and analytics platform in the cloud.

Read more about Arcules

Show me more like this
Critical Insight logo

Critical Insight

5.0
(1)

Threat detection & response software.

visit website
Critical Insight is a cloud-based software specifically designed for businesses that provides managed detection and response services.

Read more about Critical Insight

Show me more like this
CTM360 logo

CTM360

(0)

Global Digital Risk Protection Platform

visit website
CTM360 is a global digital risk protection platform that provides detection and response to vulnerabilities and threats in cyberspace.

Read more about CTM360

Show me more like this
Portnox CLEAR logo

Portnox CLEAR

4.1
(8)

Network security and access control software

visit website
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Show me more like this
CipherBox logo

CipherBox

5.0
(1)

Endpoint detection and response and cybersecurity software

visit website
CipherBox is a cybersecurity software that is designed to help businesses in the healthcare, logistics, finance, and gaming industry manage vulnerabilities, protect domains, handle threat response, and more from within a unified platform. It allows staff members to utilize artificial intelligence (AI) technology to manage events, analyze behavior, and handle logs.

Read more about CipherBox

Show me more like this
Cymulate logo

Cymulate

(0)

Cybersecurity and attack simulation software for SMBs

visit website
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.

Read more about Cymulate

Show me more like this
Splunk Enterprise logo

Splunk Enterprise

4.6
(146)

Machine data management and analytics

visit website
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.

Read more about Splunk Enterprise

Show me more like this
Securden logo

Securden

(0)

Remote monitoring and management software

visit website
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.

Read more about Securden

Show me more like this
Web.com logo

Web.com

2.8
(12)

Website Design and eCommerce Solution

visit website
Web.com is an online marketing service that equips small businesses with features such as website design, marketing to attract, convert qualified prospects and website traffic and marketing Results. It combines professional web design, on-demand website modifications and online marketing services.

Read more about Web.com

Show me more like this
Jamf Protect logo

Jamf Protect

4.6
(24)

Endpoint protection software for MacOS users

visit website

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Show me more like this
Acronis Cyber Protect logo

Acronis Cyber Protect

5.0
(1)

Cloud-based threat monitoring and cybersecurity software

visit website
Acronis Cyber Protect is a cloud-based software that helps businesses leverage artificial intelligence (AI) technology to detect cybersecurity threats across IT assets and endpoint systems. Supervisors can perform vulnerability assessments, deploy security patches, and remotely prevent threats.

Read more about Acronis Cyber Protect

Show me more like this
Endpoint Detection and Response logo

Endpoint Detection and Response

(0)

Endpoint detection and response software

visit website
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks and fileless threats. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.

Read more about Endpoint Detection and Response

Show me more like this
ESET Endpoint Security logo

ESET Endpoint Security

4.7
(853)

Network security, network monitoring & endpoint protection

learn more
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.

Read more about ESET Endpoint Security

Show me more like this
TOPIA logo

TOPIA

4.9
(17)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more.
TOPIA enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about TOPIA

Show me more like this
Beyond Identity logo

Beyond Identity

4.8
(12)

Unphishable Multi-Factor Authentication

learn more
Unphishable, passwordless, multi-factor authentication to eliminate credential attacks and secure your workforce and customer identities.

Read more about Beyond Identity

Show me more like this
ConnectWise Cybersecurity Management logo

ConnectWise Cybersecurity Management

4.4
(11)

Cybersecurity management tool with custom alert thresholds

learn more
ConnectWise Cybersecurity Management software and support solutions help businesses identify cyber risks, resolve issues, and manage recovery operations. Administrators can monitor user accounts and endpoints to track security gaps, identify reconfiguration requirements, and define alert thresholds.

Read more about ConnectWise Cybersecurity Management

Show me more like this
ThreatAware logo

ThreatAware

5.0
(3)

Continuous Controls Monitoring (CCM)

learn more
ThreatAware's breach prevention platform connects agentlessly to an organisation's IT security cloud apps and services, providing unparalleled visibility of the hygiene status for all devices accessing company data. Previously invisible vulnerabilities can be resolved directly from the platform.

Read more about ThreatAware

Show me more like this
Intigriti logo

Intigriti

4.7
(3)

Agile security testing and white hat hacking platform.

learn more
Intigriti’s bug bounty platform enables companies to overcome common cybersecurity challenges through the power of crowdsourced security testing.

Read more about Intigriti

Show me more like this