App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Cybersecurity Software - Page 2

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

515 software options

Sponsored

Personalize your search

Any industry

Any business size

Webroot Business Endpoint Protection logo
4.5
(212)

Smarter Cybersecurity Services & Solutions

learn more
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack.

Read more about Webroot Business Endpoint Protection

Users also considered
GoTo Resolve logo
4.4
(197)

All-in-one IT support

learn more
Designed with today's SMBs in mind, GoTo Resolve is an all-in-one IT support software built to help IT professionals streamline their help desk by bringing together the tools they need to engage, identify problems, and fix issues faster.

Read more about GoTo Resolve

Users also considered
GoodAccess logo
4.9
(95)

Cloud VPN with identity-based access control in 10 minutes.

learn more
GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In 10 minutes you create resilient private network with identity-based access control. No hardware, no maintenance fees. Just secure "anywhere, anytime" access for authorized users.

Read more about GoodAccess

Users also considered
Astra Security logo
4.8
(107)

Website Protection Suite for online businesses

learn more
Astra Security is a cybersecurity software that comes with a website firewall and malware scanner to protect against malware, backdoor, SEO spam, OWASP Top 10 vulnerabilities and any other hacking attempts.

Read more about Astra Security

Users also considered
Malwarebytes for Teams logo
4.5
(158)

Advanced malware protection for small businesses.

learn more
Malwarebytes for Teams is a behavior-based antivirus platform that provides advanced threat detection and prevention capabilities against malware,
ransomware, and hackers.

Read more about Malwarebytes for Teams

Users also considered
ManageEngine Firewall Analyzer logo
4.5
(146)

Empower firewall intelligence for seamless security manageme

learn more
ManageEngine Firewall Analyzer is a network security device management solution that helps optimize firewall performance, enforce compliance, proactively manage threats, monitor traffic and bandwidth consumption, and streamline firewall management for enhanced network protection.

Read more about ManageEngine Firewall Analyzer

Users also considered
UTunnel VPN logo
5.0
(68)

Cloud VPN, Zero Trust Network Access, and Mesh Networking

learn more
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!

Read more about UTunnel VPN

Users also considered
SentinelOne logo
4.8
(79)

Autonomous endpoint protection platform

learn more
DataSet is a next-generation, autonomous endpoint/server protection platform that protects organizations against attacks utilizing key features such as machine learning, behavioral attack detection, automated responses, and real-time forensics, with complete visibility into all activity

Read more about SentinelOne

Users also considered
Perimeter 81 logo
4.8
(70)

Radically simple cybersecurity.

learn more
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.

Read more about Perimeter 81

Users also considered
Flashstart logo
4.8
(73)

DNS filtering software provider

learn more
FlashStart is at the forefront of cyber security innovation, leveraging AI-powered DNS intelligence to stay one step ahead of evolving threats.

Read more about Flashstart

Users also considered
Delivery Trust logo
4.9
(66)

Email Encryption Platform

learn more
Delivery Trust is a user-friendly secure email solution to protect critical information.

Read more about Delivery Trust

Users also considered
GeeTest CAPTCHA logo
4.8
(72)

Bot management system for protecting websites & mobile apps

learn more
GeeTest CAPTCHA protects websites, mobile apps, and APIs against malicious bot attacks while ensuring a smooth user experience.

Read more about GeeTest CAPTCHA

Users also considered
Lookout logo
4.7
(67)

Endpoint-to-cloud security for businesses with remote teams

learn more
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to eliminate the need for standalone cybersecurity solutions.

Read more about Lookout

Users also considered
Mailock logo
4.7
(62)

Secure emails with encryption and recipient authentication

learn more
Exchange confidential information securely using your existing email setup. Encrypt messages and authenticate your recipients.

Read more about Mailock

Users also considered
usecure logo
4.7
(61)

Transform employees into a cybersecurity asset.

learn more
usecure is the automated Human Risk Management (HRM) platform that transforms employees into a cybersecurity asset through user-tailored training programs.

Read more about usecure

Users also considered
Beagle Security logo
4.9
(51)

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
BrowseControl logo
4.7
(63)

Easy-to-use web filtering software to restrict internet use

learn more
Web filtering software. Blocks websites based on URLs, categories, keywords, and IP addresses. Restrictions can be customized based on groups of users or computers.

Read more about BrowseControl

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Cyberattacks are increasingly more sophisticated, but Orca makes it easy to remediate at-risk sensitive data in the cloud. Agentless statistical scanning reduces the noise, while contextual analysis helps prioritize risk so security teams can focus on what truly matters.

Read more about Orca Security

Users also considered
LogicGate Risk Cloud logo
4.7
(66)

Risk Management Without Limits.

learn more
Risk Cloud® is a no-code governance, risk, and compliance (GRC) platform that scales and adapts to your changing business environment.

Read more about LogicGate Risk Cloud

Users also considered
WP Cerber Security logo
4.9
(44)

Cybersecurity, anti-spam and malware scanning software

learn more
WP Cerber Security is a cybersecurity software designed to help businesses scan WordPress websites for spam, malware, and hack attempts. The application uses inspection algorithms and a bot engine to screen incoming traffic requests for malicious activities, identify threat patterns, and automatically block them from entering the network.

Read more about WP Cerber Security

Users also considered
BlackBerry CylancePROTECT logo
4.6
(64)

Threat detection and endpoint protection platform

learn more
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.

Read more about BlackBerry CylancePROTECT

Users also considered
Phishing Tackle logo
4.9
(36)

Simulated phishing and security awareness training platform

learn more
Phishing Tackle is a cloud-based cyber security platform, which assists not-for-profit, public, and private organizations with simulated phishing and security awareness training. Key features include attack simulation, customizable content, knowledge testing and campaign statistics.

Read more about Phishing Tackle

Users also considered
PureVPN logo
4.3
(76)

Secured VPN service offering limitless, anonymous web access

learn more
Pure VPN, and PureVPN for Business, is a Virtual Private Network (VPN) for all platforms including Windows, Mac, Linux, iOS and Android that provides 256-bit secured, anonymous and P2P-enabled access to unrestricted internet browsing with features including IP address masking, split tunneling & more

Read more about PureVPN

Users also considered
ThreatLocker logo
4.9
(38)

Allow what you need, Block everything else.

learn more
Stop ransomware with policy-driven endpoint protection. ThreatLocker enables organizations of all sizes with Zero Trust controls such as application allowlisting, Ringfencing, elevation and storage controls, as well as operational alerts.

Read more about ThreatLocker

Users also considered
GitGuardian logo
4.8
(36)

Automated Secrets Detection and Remediation

learn more
GitGuardian is helping developers and security teams secure software development with automated secrets detection & remediation for private or public source code.

Read more about GitGuardian

Users also considered