Cybersecurity Software

Best Comparison List of Vendor Applications & Tools
Filter byclear all
Pricing models
Devices supported
Organization types
Geographies served
Customer rating
Integrated with
Features

Here's our list of apps for Cybersecurity software. Filters help you narrow down the results to find exactly what you’re looking for.

Personalize your search in 2 clicks

Select your company sizeSelect your industry type

Personalize your search in a few taps

just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
70 apps

SolarWinds Threat Monitor  

3
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Learn moreAdd to compareCompareRemove app
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Learn moreCompare

Citadel Team  

1
Internal communications and collaboration platform
Citadel Team is a cloud-based internal communications solution that helps businesses of all sizes improve team collaboration via chat, voice calls, and video conferences. It enables managers to grant access permissions to specific users, create groups, and share documents with colleagues. Read more about Citadel Team
Learn moreAdd to compareCompareRemove app
Internal communications and collaboration platform
Citadel Team is a cloud-based internal communications solution that helps businesses of all sizes improve team collaboration via chat, voice calls, and video conferences. It enables managers to grant access permissions to specific users, create groups, and share documents with colleagues. Read more about Citadel Team
Learn moreCompare

Cryptosense Analyzer  

1
Automated cryptographic security auditing for applications
Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Read more about Cryptosense Analyzer
Learn moreAdd to compareCompareRemove app
Automated cryptographic security auditing for applications
Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Read more about Cryptosense Analyzer
Learn moreCompare

Identity Services  

1
Zero Trust Privilege for Today's Modern IT Threatscape
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse. Read more about Identity Services
Learn moreAdd to compareCompareRemove app
Zero Trust Privilege for Today's Modern IT Threatscape
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse. Read more about Identity Services
Learn moreCompare

VaultCore  

1
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreAdd to compareCompareRemove app
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreCompare

Conformio  

1
Web-based ISO compliance & document management solution
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards. Read more about Conformio
Learn moreAdd to compareCompareRemove app
Web-based ISO compliance & document management solution
Conformio is an online tool that helps in document management, task management, and implementation of ISO 9001, ISO 14001, and ISO 27001 compliance standards. Read more about Conformio
Learn moreCompare

Intego Flextivity Secure  

1
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Learn moreAdd to compareCompareRemove app
Cloud-Based Security for Mac OS X
Flextivity Secure provides worry-free AV protection for all your Mac computers (AntiVirus, Firewall, Location-Aware Network Protection, Policies...) Read more about Intego Flextivity Secure
Learn moreCompare

Alyne  

0
Cyber Security, Risk Management and Compliance as a Service
RegTech, CyberSecurity, Risk Management and Compliance as a Service. Read more about Alyne
Learn moreAdd to compareCompareRemove app
Cyber Security, Risk Management and Compliance as a Service
RegTech, CyberSecurity, Risk Management and Compliance as a Service. Read more about Alyne
Learn moreCompare

CloudEye AWS Security  

0
Security, compliance & cost for AWS & Azure cloud services
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more. Read more about CloudEye AWS Security
Learn moreAdd to compareCompareRemove app
Security, compliance & cost for AWS & Azure cloud services
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more. Read more about CloudEye AWS Security
Learn moreCompare

CloudSploit  

0
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit
Learn moreAdd to compareCompareRemove app
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit
Learn moreCompare

Dark Cubed  

0
Cybersecurity solution for small to midsize organizations
Dark Cubed is a cloud-based cybersecurity solution, which assists small to midsize organizations and nonprofits with threat protection and identification. Key features include workflow creation, active blocking, firewall automation, and customizable reporting. Read more about Dark Cubed
Learn moreAdd to compareCompareRemove app
Cybersecurity solution for small to midsize organizations
Dark Cubed is a cloud-based cybersecurity solution, which assists small to midsize organizations and nonprofits with threat protection and identification. Key features include workflow creation, active blocking, firewall automation, and customizable reporting. Read more about Dark Cubed
Learn moreCompare

HAYAG  

0
Compliance, vendor, and risk management software
HAYAG helps medical organizations comply with HIPAA and other statutory regulations and manage revenue cycle analysis, patients, coding, and more. Users can implement quality management systems with appropriate procedures & metrics to ensure adherence to ISO, cybersecurity & data privacy standards. Read more about HAYAG
Learn moreAdd to compareCompareRemove app
Compliance, vendor, and risk management software
HAYAG helps medical organizations comply with HIPAA and other statutory regulations and manage revenue cycle analysis, patients, coding, and more. Users can implement quality management systems with appropriate procedures & metrics to ensure adherence to ISO, cybersecurity & data privacy standards. Read more about HAYAG
Learn moreCompare

HTTPCS Cyber Vigilance  

0
Cyber watch tool for anticipating cyber attacks in real time
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches. Read more about HTTPCS Cyber Vigilance
Learn moreAdd to compareCompareRemove app
Cyber watch tool for anticipating cyber attacks in real time
HTTPCS Cyber Vigilance is an online watch tool for defending business websites against cyber attacks or data breaches. Read more about HTTPCS Cyber Vigilance
Learn moreCompare

MXSweep  

0
Internet security and compliance services
MXSweep is a global provider of SaaS Internet Security & Compliance services including email security, content control & business continuity, encryption, email & sharepoint archiving, web and mobile security to corporate and public sector customers. Read more about MXSweep
Learn moreAdd to compareCompareRemove app
Internet security and compliance services
MXSweep is a global provider of SaaS Internet Security & Compliance services including email security, content control & business continuity, encryption, email & sharepoint archiving, web and mobile security to corporate and public sector customers. Read more about MXSweep
Learn moreCompare

Namogoo Customer Hijacking Prevention  

0
Customer journey hijacking prevention
Namogoo Customer Hijacking Prevention is a cloud-based solution for detecting & blocking unauthorized promotional content within customer web sessions, in order to avoid disrupting the user journey with competitor diversions. Namogoo eliminates unauthorized ads to help increase conversions. Read more about Namogoo Customer Hijacking Prevention
Learn moreAdd to compareCompareRemove app
Customer journey hijacking prevention
Namogoo Customer Hijacking Prevention is a cloud-based solution for detecting & blocking unauthorized promotional content within customer web sessions, in order to avoid disrupting the user journey with competitor diversions. Namogoo eliminates unauthorized ads to help increase conversions. Read more about Namogoo Customer Hijacking Prevention
Learn moreCompare

Probely  

0
Automate Security Testing from Threat Found to Ticket Closed
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease. Read more about Probely
Learn moreAdd to compareCompareRemove app
Automate Security Testing from Threat Found to Ticket Closed
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease. Read more about Probely
Learn moreCompare

RIPS  

0
Static code analysis tool for web application security
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications. Read more about RIPS
Learn moreAdd to compareCompareRemove app
Static code analysis tool for web application security
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications. Read more about RIPS
Learn moreCompare

Securonix Cloud  

0
Cloud-based UEBA & security analytics solution
Securonix Cloud is a scalable user & entity behavior analytics (UEBA) & security analytics software powered by machine learning that detects threats to networks / computers at any time with flexible multi-tenant architecture, encrypted SSL connections, API integration with cloud sources, & more… Read more about Securonix Cloud
Learn moreAdd to compareCompareRemove app
Cloud-based UEBA & security analytics solution
Securonix Cloud is a scalable user & entity behavior analytics (UEBA) & security analytics software powered by machine learning that detects threats to networks / computers at any time with flexible multi-tenant architecture, encrypted SSL connections, API integration with cloud sources, & more… Read more about Securonix Cloud
Learn moreCompare

TokenEx  

0
Tokenization, key and encryption management platform
Our fraud-prevention partner analyzes customers' PANs, purchase histories, locations, IP addresses, and payment origins to ensure no fraud occurs. TokenEx supports multiple, layered third-party integrations to combine tokenization with other services for maximum security and flexibility. Read more about TokenEx
Learn moreAdd to compareCompareRemove app
Tokenization, key and encryption management platform
Our fraud-prevention partner analyzes customers' PANs, purchase histories, locations, IP addresses, and payment origins to ensure no fraud occurs. TokenEx supports multiple, layered third-party integrations to combine tokenization with other services for maximum security and flexibility. Read more about TokenEx
Learn moreCompare

ijura  

0
Cybersecurity platform for detecting malware threats
ijura is a cloud-based cybersecurity solution that helps enterprises detect cyber threats such as malware attacks or phishing scams across internet of things (IoT) devices. Users can utilize the WiFi sniffing functionality to identify malware threats across wireless networks. Read more about ijura
Learn moreAdd to compareCompareRemove app
Cybersecurity platform for detecting malware threats
ijura is a cloud-based cybersecurity solution that helps enterprises detect cyber threats such as malware attacks or phishing scams across internet of things (IoT) devices. Users can utilize the WiFi sniffing functionality to identify malware threats across wireless networks. Read more about ijura
Learn moreCompare
Filter by
Customer rating