App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 7

461 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Scytale logo

Scytale

5.0
(5)

Are you SOC 2 compliant yet?

learn more
InfoSec compliance automation software and advisory services solution.

Read more about Scytale

Users also considered
PingSafe logo

PingSafe

5.0
(5)

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Cisco Umbrella logo

Cisco Umbrella

4.3
(9)

Cloud-based cybersecurity and internet gateway software

learn more
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform.

Read more about Cisco Umbrella

Users also considered
SpectralOps logo

SpectralOps

4.6
(7)

Code security software for code and cloud

learn more
Spectral is a cloud-based software that enables teams to ship & build software while avoiding security mistakes, misconfigurations, credential leakage and data breaches without agents, across the entire software development lifecycle.

Read more about SpectralOps

Users also considered
Portnox CLEAR logo

Portnox CLEAR

4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
SecurityScorecard logo

SecurityScorecard

4.4
(8)

The global leader in cybersecurity ratings

learn more
SecurityScorecard is the global leader in cybersecurity ratings, helping thousands of organizations of all types and sizes gain instant visibility into their own security posture and that of their third parties.

Read more about SecurityScorecard

Users also considered
Vade logo

Vade

4.7
(6)

Collaborative cybersecurity based on IA, enhanced by people.

learn more
Vade is a global cybersecurity company specializing in the development of collaborative email security solutions. Combining human and machine intelligence, Vade's solutions form a cybersecurity alliance that is powered by AI and enhanced by people.

Read more about Vade

Users also considered
Acronis Cyber Protect logo

Acronis Cyber Protect

4.7
(6)

Cloud-based threat monitoring and cybersecurity software

learn more
Acronis Cyber Protect presents a groundbreaking strategy for safeguarding against cyber threats by merging data protection and cybersecurity.

Read more about Acronis Cyber Protect

Users also considered
Spybot logo

Spybot

4.7
(6)

Endpoint protection and file analysis platform

learn more
Spybot is an endpoint security suite, which helps enterprises detect and remove corrupt files, track unauthorized access to data, and protect systems from malware attacks. Features include anti-virus and anti-spyware, automated signature updates, task scheduling, and command-line tools.

Read more about Spybot

Users also considered
Wallarm WAF logo

Wallarm WAF

4.7
(6)

Application security platform for businesses

learn more
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis.

Read more about Wallarm WAF

Users also considered
Feedzai logo

Feedzai

4.7
(6)

Cloud-based financial risk assessment and management tool

learn more
Feedzai is a cloud-based risk management software that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to detect cyber threats or risks across financial transactions or accounts. Supervisors can conduct risk assessments, monitor the status of transactions as ‘fraud’ or ‘not fraud’, and analyze behavioral biometrics, network, and device data.

Read more about Feedzai

Users also considered
Uptycs logo

Uptycs

4.7
(6)

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Specops uReset logo

Specops uReset

4.4
(7)

Sel-service password reset solution

learn more
Our enterprise self-service password reset solution allows users to securely reset their Active Directory passwords themselves. The product can be used for the purpose of updating local cached credentials, even when they are off VPN. This can be done by initiating the reset process right from the Windows logon screen on their workstations. With security features like multi-factor authentication and geo-blocking, Specops uReset is a perfect fit for organizations that take security very seriously.

Read more about Specops uReset

Users also considered
Flare logo

Flare

4.4
(7)

Digital monitoring platform that protects company data

learn more
Flare is a digital footprint monitoring platform designed to help protect sensitive data and financial resources for companies. This AI-enabled platform provides continuous monitoring to identify potential issues and malicious actors that are a threat to digital assets. Flare delivers prioritized alerts and ranks threats for immediate action using a built-in scoring system. It also offers remediation capabilities that can execute takedowns against critical threats or proactively notify teams.

Read more about Flare

Users also considered
Beyond DLP logo

Beyond DLP

4.8
(5)

Product Data Protection Beyond Boundaries

learn more
Beyond DLP is a data protection platform to track and protect scattered data. ITsMine's software brings data protection to enterprises in a clear API-based solution.

Read more about Beyond DLP

Users also considered
PA File Sight logo

PA File Sight

4.8
(5)

Windows-based ransomware protection & access auditing tool

learn more
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access.

Read more about PA File Sight

Users also considered
CYRISMA logo

CYRISMA

4.8
(5)

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about CYRISMA

Users also considered
CyberSmart logo

CyberSmart

5.0
(4)

Cybersecurity, automated compliance, GDPR readiness for SMBs

learn more
CyberSmart is a cybersecurity solution that identifies system vulnerabilities on all devices, helps prevent cyberattacks, and provides continuous compliance while preparing for IASME Certification. This solution provides 24/7 device monitoring, vulnerability scanning, remote auditing, and more.

Read more about CyberSmart

Users also considered
Guardz logo

Guardz

5.0
(4)

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
CYBERAWARE SECURITY logo

CYBERAWARE SECURITY

5.0
(4)

SaaS educational platform

learn more
Ongoing SaaS based programme to help organisations nurture a culture of security awareness. It includes training modules, monitoring and reporting functions, as well as practical phishing simulation campaigns. Risk exposure index can be calculated for each individual computer user.

Read more about CYBERAWARE SECURITY

Users also considered
Push Security logo

Push Security

5.0
(4)

A vulnerability scanner for your cloud identities

learn more
Push is an identity security platform for cloud-first businesses. Map out your entire cloud identity attack surface and harden it against identity-based attacks.

Read more about Push Security

Users also considered
Reveelium logo

Reveelium

4.5
(6)

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
HackEDU logo

HackEDU

4.5
(6)

Hands-On Secure Coding Training for Software Developers

learn more
HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Designed to help development teams improve code quality and meet compliance requirements, HackEDU offers customized learning paths, certifications, progress tracking, and more.

Read more about HackEDU

Users also considered
Webz.io logo

Webz.io

4.5
(6)

Machine-Defined Web Data

learn more
Webz.io transforms the vast pool of web data from across the open and dark web into structured web data feeds, ready for machines to consume.

Read more about Webz.io

Users also considered
WhiteSource logo

WhiteSource

4.3
(7)

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and license compliance management.

It integrates with your development environments and DevOps pipeline to detect open source libraries with security or compliance issues in real-time.

Read more about WhiteSource

Users also considered