This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

Cybersecurity Software - Page 3

148 software options


Filter Results


Pricing models

Customer rating

Risk Ident


Software specialized for the prevention of online fraud

learn more
RISK IDENT is specialized software for the prevention of online fraud. To aid the identification of fraudulent transactions, the package carries out automated evaluations and interprets data points to calculate results. RISK IDENT gives real-time results, which enables companies to take action.

Read more about Risk Ident

Access Rights Manager


Audit management for access rights

learn more
SolarWinds Access Rights Manager (ARM) is an access governance solution that manages and audit access rights across any IT infrastructure to mitigate insider threats and data loss.

Read more about Access Rights Manager

Cyber Security Services


Network security service for cloud & on-premise systems

learn more
Cyber Security Services is a modular technology-enabled service offering by Advanced, which helps organizations ensure data protection across cloud, hosted, and on-premise IT infrastructure in compliance with ISO 27001 and National Cyber Security Center regulations.

Read more about Cyber Security Services

R&S Trusted Gate


Secure and data-compliant protection for cloud working

learn more
R&S Trusted Gate provides secure, data-compliant solutions for cloud applications. The patented software is aimed at public services and global companies that work with sensitive data and collaboration tools via the cloud. It utilizes data-centric approaches and uses high-security standards.

Read more about R&S Trusted Gate



Continuous Controls Monitoring (CCM)

learn more
ThreatAware's breach prevention platform connects agentlessly to an organisation's IT security cloud apps and services, providing unparalleled visibility of the hygiene status for all devices accessing company data. Previously invisible vulnerabilities can be resolved directly from the platform.

Read more about ThreatAware



Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Google Cloud Platform


Modular platform for computing, hosting, storage & more

learn more
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.

Read more about Google Cloud Platform



Performance & Security for Any Website

learn more
Cloudflare protects and accelerates million of website online using a single change to your DNS by offering CDN functionality and advanced security.

Read more about Cloudflare



Cloud-based cybersecurity and network monitoring platform

learn more
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.

Read more about DNSFilter

JumpCloud Directory Platform


A cloud directory platform for secure access to resources

learn more
Cloud-forward identity security and endpoint protection

Read more about JumpCloud Directory Platform



Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

BlackBerry Protect


Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry Protect



Safer, Faster Website

learn more
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.

Read more about Incapsula



Strategic Planning and Balanced Scorecard Software

learn more
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel.

Read more about ESM+Strategy



Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS



Cloud and edge computing security solution

learn more
Cloudbric is a network security tool that blocks web attacks through application firewalls, leakage protection, SSL certificates, and more. The software also offers functionality for remote access, website security, mobile security, and blockchain.

Read more about Cloudbric



Cybersecurity and Compliance Made Easy

learn more
Apptega is a cloud-based cybersecurity solution that assists IT and compliance teams with managing cybersecurity operations. Key features include framework mapping, compliance management, collaboration, budgeting, vendor management, data synchronization, and predefined templates.

Read more about Apptega



Monitor, Protect & Improve your customers digital experience

learn more
Detect key vulnerabilities and supply chain attacks (Magecart) to reduce exposure to data breaches, reducing both ICO fines and financial losses. This protects your online reputation and customer trust in your brand.

Read more about RapidSpike



Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

vRealize Automation


Infrastructure automation tool for the private cloud

learn more
vRealize Automation (vRA) is a web-based configuration management software designed to help organizations streamline IT services requests made by authorized administrators, business users or developers from a secure portal whilst maintaining compliance with industrial policies.

Read more about vRealize Automation



Application security management solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana



Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely



Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Privileged Access Security Solution


Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about Privileged Access Security Solution



One click cloud firewall for remote & distributed workforces

learn more
One click network security solution/SASE for in-office, distributed work, & remote work.

Read more about Privatise