App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 3

442 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

CyLock Anti-Hacker logo

CyLock Anti-Hacker

5.0
(23)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Acronis Cyber Protect Cloud logo

Acronis Cyber Protect Cloud

4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
BooleBox logo

BooleBox

4.6
(33)

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
PhishingBox logo

PhishingBox

4.8
(27)

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered
Ncontracts logo

Ncontracts

4.8
(25)

Experience the freedom of knowing it's right.

learn more
Automate the FFIEC CAT and NCUA ACET while ensuring accurate responses and gain a clearer picture of your cybersecurity risk.

Read more about Ncontracts

Users also considered
MetaCompliance logo

MetaCompliance

4.6
(34)

Powerful Policy Management.

learn more
Minimise the risk of cyber security threats and compliance failure. We make cyber security and data protection easier for your employees.

Read more about MetaCompliance

Users also considered
Heimdal Threat Prevention logo

Heimdal Threat Prevention

4.8
(25)

Advanced DNS Filtering for Your Perimeter and Endpoints.

learn more
A comprehensive DNS security solution that leverages cutting-edge technology to prevent future cyber-threats with unparalleled accuracy. Proprietary detection technologies power it to stop ransomware, data leaks, and network malware in their tracks.

Read more about Heimdal Threat Prevention

Users also considered
Coro logo

Coro

4.6
(30)

Cybersecurity management software

learn more
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and handle access for confidential and practice data via a unified portal.

Read more about Coro

Users also considered
Web.com logo

Web.com

3.7
(128)

Website Design and eCommerce Solution

learn more
Web.com is an online marketing service that equips small businesses with features such as website design, marketing to attract, convert qualified prospects and website traffic and marketing Results. It combines professional web design, on-demand website modifications and online marketing services.

Read more about Web.com

Users also considered
Onehub logo

Onehub

4.6
(33)

Secure enterprise file sharing made easy.

learn more
Onehub provides secure, easy-to-use file sharing for business. More than 1 million business users trust Onehub for file sharing, client portal and virtual data room needs.

Read more about Onehub

Users also considered
Jamf Protect logo

Jamf Protect

4.6
(30)

Endpoint protection software for MacOS users

learn more

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Users also considered
Hackrate Bug Bounty Platform logo

Hackrate Bug Bounty Platform

5.0
(20)

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate Bug Bounty Platform

Users also considered
Avast Small Office Protection logo

Avast Small Office Protection

4.4
(37)

Cybersecurity & endpoint detection tool for small businesses

learn more
Avast Small Office Protection is a cybersecurity software designed to help small businesses ensure protection from cyber-attacks and ransomware. The application enables organizations to secure various devices including laptops, mobiles, PCs, and tablets and block viruses, malware, spyware, and other online threats in real-time.

Read more about Avast Small Office Protection

Users also considered
Acunetix logo

Acunetix

4.4
(34)

All-in-one automated web application security solution

learn more
Cyber security solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers solutions.

Read more about Acunetix

Users also considered
Cloudbric logo

Cloudbric

4.6
(29)

Cloud and edge computing security solution

learn more
Cloudbric is a network security tool that blocks web attacks through application firewalls, leakage protection, SSL certificates, and more. The software also offers functionality for remote access, website security, mobile security, and blockchain.

Read more about Cloudbric

Users also considered
Apptega logo

Apptega

4.8
(21)

Cybersecurity and Compliance Made Easy

learn more
Apptega is a cloud-based cybersecurity solution that assists IT and compliance teams with managing cybersecurity operations. Key features include framework mapping, compliance management, collaboration, budgeting, vendor management, data synchronization, and predefined templates.

Read more about Apptega

Users also considered
vRx logo

vRx

4.9
(19)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Falcon logo

Falcon

4.6
(25)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
BLACKbox logo

BLACKbox

4.4
(32)

Data protection solution

learn more
BLACKbox is a data protection service that provides complete data loss protection and breach detection across laptops, desktops, on-premises servers, data centers, public cloud environments and more.

Read more about BLACKbox

Users also considered
TRAC logo

TRAC

4.8
(21)

Compliance. Simplified.

learn more
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.

With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to

Read more about TRAC

Users also considered
OnDMARC logo

OnDMARC

4.9
(17)

Software to protect business email from spoofing attacks

learn more
OnDMARC is a protective system for business email. It helps to maintain the authenticity of email domains to guard against spoofing attacks. The software can stop impersonations used for cyber attacks, phishing, and scam emails. It increases deliverability of authorized emails and protects brands.

Read more about OnDMARC

Users also considered
Agrello logo

Agrello

4.5
(28)

The easiest way to sign all your digital documents.

learn more
Agrello is a contract management and e-signing platform suitable for both personal and business use. Manage and sign documents easily while saving time on the entire signing process. Making digital signatures and document management simple and fun!

Read more about Agrello

Users also considered
Specops Password Auditor logo

Specops Password Auditor

4.8
(19)

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
AppTrana logo

AppTrana

4.6
(24)

Application Security Management Solution

learn more
AppTrana’s Cybersecurity portfolio keeps your web apps and APIs secure by enabling you to block common attack patterns and control bot

Read more about AppTrana

Users also considered
DriveStrike logo

DriveStrike

4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered