Network Security Software

Best Comparison List of Vendor Applications & Tools
Filter byclear all
Pricing models
Devices supported
Organization types
Geographies served
Customer rating
Integrated with
Features

Here's our list of apps for Network Security software. Filters help you narrow down the results to find exactly what you’re looking for.

Personalize your search in 2 clicks

Select your company sizeSelect your industry type

Personalize your search in a few taps

just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
53 apps

Acunetix   

33
Integrated vulnerability management & network security
Acunetix is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more… Read more about Acunetix
Visit WebsiteAdd to compareCompareRemove app
Integrated vulnerability management & network security
Acunetix is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more… Read more about Acunetix
Visit WebsiteCompare

WebTitan   

200
DNS-based web filter, malware/phishing protection & security
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts. Read more about WebTitan
Visit WebsiteAdd to compareCompareRemove app
DNS-based web filter, malware/phishing protection & security
DNS Based Advanced Web Security Filter blocking Malware, Ransomware and Phishing attempts. Read more about WebTitan
Visit WebsiteCompare

EventSentry   

18
Real-time log & event log hybrid SIEM monitoring solution
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more… Read more about EventSentry
Visit WebsiteAdd to compareCompareRemove app
Real-time log & event log hybrid SIEM monitoring solution
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more… Read more about EventSentry
Visit WebsiteCompare

Intruder   

1
Vulnerability scanner that prevents security & data breaches
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing. Read more about Intruder
Visit WebsiteAdd to compareCompareRemove app
Vulnerability scanner that prevents security & data breaches
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing. Read more about Intruder
Visit WebsiteCompare

AVG Business Edition   

1,559
Business antivirus with endpoint solution & server security
AVG Antivirus Business Edition is designed to protect business & customer data by securing all important data, from PCs to file servers. Read more about AVG Business Edition
Visit WebsiteAdd to compareCompareRemove app
Business antivirus with endpoint solution & server security
AVG Antivirus Business Edition is designed to protect business & customer data by securing all important data, from PCs to file servers. Read more about AVG Business Edition
Visit WebsiteCompare

Cornerstone MFT   

0
Network security and managed file transfer solution
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption. Read more about Cornerstone MFT
Visit WebsiteAdd to compareCompareRemove app
Network security and managed file transfer solution
Cornerstone MFT is a cloud-based solution, which assists enterprises, financial services and healthcare organizations with managing security and file transfers across servers. Key features include process automation, compliance management, collaboration, and data encryption. Read more about Cornerstone MFT
Visit WebsiteCompare

SolarWinds Threat Monitor   

3
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Visit WebsiteAdd to compareCompareRemove app
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Visit WebsiteCompare

Network Assurance   

0
Cybersecurity management for on–prem & multi–cloud networks
Network Assurance illuminates complex network security and policy compliance interactions, giving you visible insights to reduce attack vectors and network disruptions. The solution works fast to find device configuration errors or troubleshoot access and connectivity issues in hybrid networks. Read more about Network Assurance
Visit WebsiteAdd to compareCompareRemove app
Cybersecurity management for on–prem & multi–cloud networks
Network Assurance illuminates complex network security and policy compliance interactions, giving you visible insights to reduce attack vectors and network disruptions. The solution works fast to find device configuration errors or troubleshoot access and connectivity issues in hybrid networks. Read more about Network Assurance
Visit WebsiteCompare

Avast Business   

691
Cloud-based security software solution
Avast Business is a cloud-based security software for commercial organizations that helps to protect endpoint devices as well as file and email servers. Read more about Avast Business
Visit WebsiteAdd to compareCompareRemove app
Cloud-based security software solution
Avast Business is a cloud-based security software for commercial organizations that helps to protect endpoint devices as well as file and email servers. Read more about Avast Business
Visit WebsiteCompare

EventTracker   

20
Managed EDR solution integrated with a SIEM platform and SOC
EventTracker is a managed SIEM (security information and event management), threat intelligence, and log management solution for IT security teams. The platform offers a range of products to help businesses manage their security orchestration and monitor threats and alerts in real time. Read more about EventTracker
Visit WebsiteAdd to compareCompareRemove app
Managed EDR solution integrated with a SIEM platform and SOC
EventTracker is a managed SIEM (security information and event management), threat intelligence, and log management solution for IT security teams. The platform offers a range of products to help businesses manage their security orchestration and monitor threats and alerts in real time. Read more about EventTracker
Visit WebsiteCompare

Flowmon   

9
Network security and monitoring solution for IT teams
Flowmon is a cloud-based solution, which assists network and security operations teams with monitoring and analytics. Key features include anomaly detection, response automation, application performance tracking, data import/export, metadata management, and troubleshooting. Read more about Flowmon
Visit WebsiteAdd to compareCompareRemove app
Network security and monitoring solution for IT teams
Flowmon is a cloud-based solution, which assists network and security operations teams with monitoring and analytics. Key features include anomaly detection, response automation, application performance tracking, data import/export, metadata management, and troubleshooting. Read more about Flowmon
Visit WebsiteCompare

Webroot   

156
Smarter Cybersecurity Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot
Visit WebsiteAdd to compareCompareRemove app
Smarter Cybersecurity Services & Solutions
Webroot SecureAnywhere Business Endpoint Protection secures users and devices across all the stages of a cyberattack. Read more about Webroot
Visit WebsiteCompare

ESET Endpoint Security  

675
Network security, network monitoring & endpoint protection
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments. Read more about ESET Endpoint Security
Learn moreAdd to compareCompareRemove app
Network security, network monitoring & endpoint protection
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments. Read more about ESET Endpoint Security
Learn moreCompare

Kaseya VSA  

175
IT Systems Management Software for SMBs and MSPs
Deliver better service and improve your team's efficiency - manage and automate all of IT to improve your network security with Kaseya. Read more about Kaseya VSA
Learn moreAdd to compareCompareRemove app
IT Systems Management Software for SMBs and MSPs
Deliver better service and improve your team's efficiency - manage and automate all of IT to improve your network security with Kaseya. Read more about Kaseya VSA
Learn moreCompare

OneLogin  

51
Cloud-Based Identity Management & Single Sign-On System
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP. Read more about OneLogin
Learn moreAdd to compareCompareRemove app
Cloud-Based Identity Management & Single Sign-On System
OneLogin’s cloud based identity management platform provides secure single sign-on, multi-factor authentication and directory integration with AD, LDAP. Read more about OneLogin
Learn moreCompare

Nessus  

51
Vulnerability assessment solution for security practitioners
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities. Read more about Nessus
Learn moreAdd to compareCompareRemove app
Vulnerability assessment solution for security practitioners
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities. Read more about Nessus
Learn moreCompare

ConnectWise Automate  

88
IT Automation for Today’s IT World
Boost the effectiveness of your IT teams and simplify every aspect of your business with flexible remote monitoring and management from ConnectWise Automate. Read more about ConnectWise Automate
Learn moreAdd to compareCompareRemove app
IT Automation for Today’s IT World
Boost the effectiveness of your IT teams and simplify every aspect of your business with flexible remote monitoring and management from ConnectWise Automate. Read more about ConnectWise Automate
Learn moreCompare

Avatier Identity Anywhere  

27
Cloud or on-premise Identity-as-a-Container (IDaaC) platform
Avatier Identity Anywhere is a cloud-based or on-premise identity-as-a-container (IDaaC) software which helps enterprises manage business apps & employee assets securely through a single platform, and supports native login, portability, scalability, continuous delivery, recovery, and more… Read more about Avatier Identity Anywhere
Learn moreAdd to compareCompareRemove app
Cloud or on-premise Identity-as-a-Container (IDaaC) platform
Avatier Identity Anywhere is a cloud-based or on-premise identity-as-a-container (IDaaC) software which helps enterprises manage business apps & employee assets securely through a single platform, and supports native login, portability, scalability, continuous delivery, recovery, and more… Read more about Avatier Identity Anywhere
Learn moreCompare

SecureLink  

60
Vendor access management and remote support
SecureLink is a vendor privileged access management solution for technology enterprises and vendors which offers features such as role-based permissions, audit logs, compliance management, self registration, desktop sharing, remote support, file transfer, and more… Read more about SecureLink
Learn moreAdd to compareCompareRemove app
Vendor access management and remote support
SecureLink is a vendor privileged access management solution for technology enterprises and vendors which offers features such as role-based permissions, audit logs, compliance management, self registration, desktop sharing, remote support, file transfer, and more… Read more about SecureLink
Learn moreCompare

CyberGRX  

18
Third-party cyber risk management platform for enterprises
CyberGRX is a cloud-based cyber risk management platform which helps large enterprises with data collection and assessments. Key features include compliance, business process control, security engagement, vulnerability scanning, performance metrics, and a self service portal. Read more about CyberGRX
Learn moreAdd to compareCompareRemove app
Third-party cyber risk management platform for enterprises
CyberGRX is a cloud-based cyber risk management platform which helps large enterprises with data collection and assessments. Key features include compliance, business process control, security engagement, vulnerability scanning, performance metrics, and a self service portal. Read more about CyberGRX
Learn moreCompare

Perimeter 81  

5
Network security solution for businesses
Perimeter 81 is a cloud-based network security solution, which assists small to large organizations with the deployment of dedicated and shared gateways. Key features include traffic encryption, threat detection, user management, and split tunneling.… Read more about Perimeter 81
Learn moreAdd to compareCompareRemove app
Network security solution for businesses
Perimeter 81 is a cloud-based network security solution, which assists small to large organizations with the deployment of dedicated and shared gateways. Key features include traffic encryption, threat detection, user management, and split tunneling.… Read more about Perimeter 81
Learn moreCompare

Wallarm  

5
Application security platform for businesses
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis. Read more about Wallarm
Learn moreAdd to compareCompareRemove app
Application security platform for businesses
Wallarm is a cloud-based application security suite designed to help organizations automate protection and security testing for websites, microservices, and APIs. Key features include perimeter scanning, traffic metrics, password management, threat detection, and pattern analysis. Read more about Wallarm
Learn moreCompare

Horangi  

1
Cyber security, security appliances & incident response
Horangi is a cyber security platform that delivers incident response & threat detection for businesses who lack the time / expertise to monitor these internally. Read more about Horangi
Learn moreAdd to compareCompareRemove app
Cyber security, security appliances & incident response
Horangi is a cyber security platform that delivers incident response & threat detection for businesses who lack the time / expertise to monitor these internally. Read more about Horangi
Learn moreCompare

Awake Security  

0
Cloud-based network traffic analysis and security platform
Awake Security is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking. Read more about Awake Security
Learn moreAdd to compareCompareRemove app
Cloud-based network traffic analysis and security platform
Awake Security is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking. Read more about Awake Security
Learn moreCompare

PhishingBox  

0
Cybersecurity tool for conducting simulated phishing attacks
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates. Read more about PhishingBox
Learn moreAdd to compareCompareRemove app
Cybersecurity tool for conducting simulated phishing attacks
PhishingBox is a network security solution designed to help businesses conduct simulated phishing attacks and provide awareness training to team members. It lets organizations create groups of employees and send targeted phishing emails using custom-built templates. Read more about PhishingBox
Learn moreCompare
Network Security Software Buyers Guide

Network Security Software Comparison

Use GetApp to find the best Network Security software and services for your needs. Our intuitive directory allows you to make an easy online Network Security software comparison in just a few minutes by filtering by deployment method (such as Web-based, Cloud Computing or Client-Server), operating system (including Mac, Windows, Linux, iOS, Android), pricing (including Free and Subscription), platform (including Google Apps, Salesforce, Intuit, NetSuite, SAP) and supported location.

Filter by
Customer rating