App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Firewall Software - Page 2

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

58 software options

Sponsored

Filter results


Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

Kiteworks logo

Content Governance, Compliance, and Protection

learn more
Protect privacy and ensure compliance of all sensitive content sent via email, file share, automated file transfer, APIs, and web forms - with one platform.

Read more about Kiteworks

Users also considered
Privatise logo

One click cloud firewall for remote & distributed workforces

learn more
One click network security solution/SASE for in-office, distributed work, & remote work.

Read more about Privatise

Users also considered
GoDaddy Website Security logo

Website Security Platform

learn more
GoDaddy Website Security is an all-in-one website protection solution that provides state-of-the-art security tools to help protect your site from the most common security threats.

Read more about GoDaddy Website Security

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Security Event Manager logo

SIEM solution for small to large organizations

learn more
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.

Read more about Security Event Manager

Users also considered
Papertrail logo

Cloud-based log management tool for IT teams.

learn more
Frustration-free log management. Get started in seconds. Instantly manage logs from 2 servers... or 2,000.

How Papertrail Makes Life Easier

Instant log visibility. Use Papertrail's time-saving log tools, flexible system groups, team-wide access, long-term archives, charts, and analytics exports, monitoring webhooks, and 45-second setup.

Realize value from logs you already collect. Track down customer problems, error messages, app requests, slow DB queries, and config changes.

Read more about Papertrail

Users also considered
Deledao logo

The award-winning "set it and forget it” K12 AI web filter.

learn more
The Deledao filter is the award-winning "set it and forget it” K12 web filtering solution powered by real-time AI. 


Use real-time AI filtering technology to exceed CIPA compliance, secure E-Rate funding, and keep students engaged in learning.


Read more about Deledao

Users also considered
Forcepoint Web Security logo

Network security system for finance, retail & other sectors

learn more
Forcepoint Web Security is a network security software designed to help businesses in finance, healthcare, retail, and other sectors gain visibility and control of cloud applications and data using CASB functionality.

Read more about Forcepoint Web Security

Users also considered
Barracuda CloudGen Firewall logo

Network firewall solution

learn more
Barracuda CloudGen Firewall is a next generation firewall (NGFW) designed to manage security across complex and distributed networks. The solution offers scalable centralized management alongside an advanced security analytics platform to manage secure access across the entire WAN.

Read more about Barracuda CloudGen Firewall

Users also considered
Quantum Force logo

Quantum Force: AI-driven, cloud-native cybersecurity

learn more
Quantum Force is a suite of 10 AI-driven, cloud-deployed firewalls from Check Point Software, redefining network security with cutting-edge threat prevention, optimized efficiency, seamless cloud management, and comprehensive threat intelligence.

Read more about Quantum Force

Users also considered
Panorama logo

Cloud-based network security management tool

learn more
Panorama is a cloud-based network security management platform designed to help businesses create security policies and determine potential threats across enterprise networks. Supervisors can use the centralized console to manage policy deployments and configure rules for sandboxing, threat prevention, URL filtering, firewalls, application awareness, and more.

Read more about Panorama

Users also considered
pfSense Plus logo

Cloud-based network security and VPN software

learn more
pfSense Plus is a cloud-based software designed to help businesses prevent cyberattacks and secure networking processes using a firewall, VPN, and other tools. Supervisors can conduct stateful packet inspections (SPI), define time-based rules, and block web traffic from specific regions using GeoIP filtering technology.

Read more about pfSense Plus

Users also considered
AWS WAF logo

Website security and firewall software

learn more
AWS WAF is a website security and firewall software that helps businesses manage filter web traffic, control bot traffic, handle account takeovers attacks, and more on a centralized platform.

Read more about AWS WAF

Users also considered
TEHTRIS XDR Platform logo

Consolidate all your cyber solutions in a single console

learn more
Platform to unify cybersecurity by consolidating all your solutions in a single console for powerful detection and response. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
Citrix Web Firewall logo

Cloud-based firewall for web applications.

learn more
Citrix Web Application Firewall helps organizations block malicious threats that target web applications, including threats that target open protocols such as HTTP, HTTPS and FTP. In addition to filtering by URL and headers, scripting languages can be protected by detecting script signatures.

Read more about Citrix Web Firewall

Users also considered
Myra Web Application Security logo

Myra Security-as-a-Service Platform

learn more
The German technology manufacturer Myra offers a secure and highly certified Security-as-a-Service platform for protecting digital business processes. The smart Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Read more about Myra Web Application Security

Users also considered
Cisco Secure Access logo

Cloud security solution for hybrid workforce

learn more
Cisco Secure Access is a comprehensive security solution designed to protect data, applications, and secure access across multiple devices, clouds, and networks.

Read more about Cisco Secure Access

Users also considered
Cisco Adaptive Security Appliance (ASA) Software logo

Firewall and network security platform

learn more
Cisco Adaptive Security Appliance (ASA) is a firewall and network security platform, designed to help enterprises provide secure access to network resources and data centers of all sizes.

Read more about Cisco Adaptive Security Appliance (ASA) Software

Users also considered
Modshield SB logo

Cybersecurity platform to detect and remediate threats

learn more
Modshield SB is a web application firewall (WAF) designed to help organizations monitor traffic and protect hosting infrastructure and applications from unauthorized access and credential stuffing attacks. Features include bot protection, compliance metrics, raw logs, geo IP feeds & DoS protection.

Read more about Modshield SB

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
Cisco Secure Firewall logo

Firewall solution with threat intelligence

learn more
Cisco Secure Firewall is a cloud-based Firewall system that provides security for public, containerized, virtual, physical, and private firealls. Additionally, the software provides threat intelligence to maintain control of enterprise level encrypted traffic and application environments. Secure Firewall can be used across hybrid and multicloud environments along with integration with other Cisco security products to provide visibility across an entire system.

Read more about Cisco Secure Firewall

Users also considered
ThreatX logo

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
MobileWall logo

Provides a patented cloud-based mobile firewall.

learn more
MobileWall provides patented, cloud-based Software-as-a-Service mobile data security, visibility and control subscription services. MobileWall acts as a mobile firewall for your data, while giving the ability to view data usage and make adjustments to eliminate risks and reduce data costs.

Read more about MobileWall

Users also considered
Virtual Desktops logo

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
ZeroTrusted.ai logo

Protect your Identity & Data with ZeroTrusted.ai's AI Firewa

learn more
Cloud-based solution that assists businesses with preserving anonymity, detecting plagiarism, identifying injection attacks, and overseeing compliance.

Read more about ZeroTrusted.ai

Users also considered