App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 3

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

515 software options

Sponsored

Personalize your search

Any industry

Any business size

Sense Defence AI logo
4.9
(31)

Firewall software

learn more
Sense Defence AI WAF is an AI-powered Web Application Firewall (WAF) solution offering real-time threat detection, intelligent traffic analysis, and proactive attack blocking.

Read more about Sense Defence AI

Users also considered
Blackpoint MDR logo
4.8
(34)

Fully managed integrated defense system.

learn more
Blackpoint MDR provides advanced cyber protection through a fully managed integrated ecosystem of services with intuitive capabilities that streamline security. Blackpoint MDR technology is purpose-built to provide an agile response to attacks, offering continuous visibility and protection across an ever-changing attack surface.

Read more about Blackpoint MDR

Users also considered
Onehub logo
4.6
(40)

Secure enterprise file sharing made easy.

learn more
Onehub provides secure, easy-to-use file sharing for business. More than 1 million business users trust Onehub for file sharing, client portal and virtual data room needs.

Read more about Onehub

Users also considered
Guardio logo
4.5
(45)

Chrome extension for blocking malware and phishing attacks

learn more
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.

Read more about Guardio

Users also considered
ESM+Strategy logo
4.7
(35)

Strategic Planning and Balanced Scorecard Software

learn more
Track the progress of your strategic plan with Balanced Scorecard Software, Strategy Maps, dashboards, and instantly generated exports in PDF, PPT, and Excel.

Read more about ESM+Strategy

Users also considered
SafeDNS logo
4.7
(35)

Cloud-based web filtering and internet security software

learn more
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.

Read more about SafeDNS

Users also considered
Sealit logo
4.8
(31)

Full Security - Just 1 Click.

learn more
Sealit protects your data, no matter how it's shared. End-to-end email and file encryption for small businesses or individuals.

Read more about Sealit

Users also considered
IPinfo logo
4.8
(30)

IP address data for users around the globe.

learn more
IPinfo powers accurate IP address data for users around the globe. Businesses use IPinfo's reliable data to power various use cases including, secure online transactions, web personalization, data enrichment, fraud prevention, content restrictions, lead generation, and more.

Read more about IPinfo

Users also considered
ESET Home Office Security Pack logo
4.8
(30)

Cloud-based cybersecurity solution for SMBs

learn more
ESET Home Office Security Pack is a comprehensive solution for small and medium-sized businesses and startups that need to protect digital equipment

Read more about ESET Home Office Security Pack

Users also considered
Commvault Cloud logo
4.6
(39)

Total Resilience. No Exceptions.

learn more
Commvault® Cloud is the industry’s only platform for cyber resilience, built to meet the demands of the hybrid
enterprise at the lowest TCO, in the face of ransomware and other cyber threats.

Read more about Commvault Cloud

Users also considered
CyLock Anti-Hacker logo
4.9
(27)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
TRAC logo
4.8
(29)

Compliance. Simplified.

learn more
TRAC is an easy-to-use GRC tool built to help users quickly complete important compliance tasks such as vendor management, risk assessments, and business continuity management.

With built-in intelligence and simple workflows, TRAC makes being compliant simple, while also providing critical data to

Read more about TRAC

Users also considered
Acronis Cyber Protect Cloud logo
4.1
(70)

AI-powered data protection and cybersecurity

learn more
Acronis Cyber Protect Cloud is truly a unique integration of backup, anti-malware, antivirus and endpoint protection. Such synergy solves complexity, allowing service providers to better protect customers while keeping the costs down.

Read more about Acronis Cyber Protect Cloud

Users also considered
BooleBox logo
4.6
(33)

Secure file sharing and data protection platform

learn more
Boolebox is a cloud-based and on-premise data protection platform designed to help organizations across finance, research, healthcare, IT and various other sectors archive, synchronize, and securely share data across multiple devices.

Read more about BooleBox

Users also considered
Ncontracts logo
4.8
(25)

Experience the freedom of knowing it's right.

learn more
Automate the FFIEC CAT and NCUA ACET while ensuring accurate responses and gain a clearer picture of your cybersecurity risk.

Read more about Ncontracts

Users also considered
NordLayer logo
4.7
(29)

A stress-free way to secure your network.

learn more
The layered design of the NordLayer solution is developed to collide cloud-based networking within SASE, and Zero Trust defined capabilities to seamlessly adapt to businesses of all sizes and adhere to the most comprehensive cybersecurity requirements.

Read more about NordLayer

Users also considered
Jamf Protect logo
4.6
(34)

Endpoint protection software for MacOS users

learn more

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect, prevent and resolve threats. The platform notifies administrators about malicious activities across scripts, applications, and users and automatically quarantines files for further analysis.

Features of Jamf Protect include log forwarding, CIS benchmarks, on-device activity analysis, threat intelligence, behavioral analytics, and more.

Read more about Jamf Protect

Users also considered
MetaCompliance logo
4.6
(34)

Make it Personal.

learn more
Minimise the risk of cyber security threats and compliance failure. We make cyber security and data protection easier for your employees.

Read more about MetaCompliance

Users also considered
PhishingBox logo
4.8
(26)

Cybersecurity tool for conducting simulated phishing attacks

learn more
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates.

Read more about PhishingBox

Users also considered
Heimdal Threat Prevention logo
4.8
(25)

Advanced DNS Filtering for Your Perimeter and Endpoints.

learn more
A comprehensive DNS security solution that leverages cutting-edge technology to prevent future cyber-threats with unparalleled accuracy. Proprietary detection technologies power it to stop ransomware, data leaks, and network malware in their tracks.

Read more about Heimdal Threat Prevention

Users also considered
Web.com logo
3.7
(128)

Website Design and eCommerce Solution

learn more
Web.com is an online marketing service that equips small businesses with features such as website design, marketing to attract, convert qualified prospects and website traffic and marketing Results. It combines professional web design, on-demand website modifications and online marketing services.

Read more about Web.com

Users also considered
Coro logo
4.6
(30)

Cybersecurity management software

learn more
Coro is a cloud-based cybersecurity application designed to help businesses in healthcare, transportation, financial and legal services, healthcare, IT, and other industries manage and secure users, devices, email, and data from cyberattacks. The platform enables organizations to ensure compliance with various governance and security policies and handle access for confidential and practice data via a unified portal.

Read more about Coro

Users also considered
Hackrate logo
5.0
(20)

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Hack The Box logo
4.9
(21)

Online ethical hacking and cybersecurity training platform

learn more
Hack the Box is a hacking training platform allowing IT professionals to advance their ethical hacking skills and be part of a worldwide community. Hack the Box offers labs and challenges for hackers to develop and practice their cybersecurity skills. Users can learn ethical hacking techniques through hands-on labs and challenges of increasing difficulty.

Read more about Hack The Box

Users also considered