getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software with Access Controls/Permissions (2026) - Page 8

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


179 software options

Trapster logo

Fully configured Deceptive Security solution

learn more
Trapster is a complete honeypot solution designed to enhance deceptive security for businesses. Trapster uses fully configurable virtual machines that act as discreet sensors, silently monitoring network traffic and alerting users of any unusual activity without disrupting daily operations.

Read more about Trapster

Users also considered
Nipper logo

Close security gaps with proactive assessments

learn more
Nipper is a network configuration audit tool that helps close critical security and compliance gaps. It analyzes configurations with the precision of a penetration tester, providing exception-based security reporting, evidence-based compliance reporting, risk-prioritized views of non-compliances, and remediation analysis to improve compliance posture.

Read more about Nipper

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
AnySecura logo

Endpoint security and user activity monitoring solution

learn more
AnySecura is a user activity monitoring solution that enables organizations to safeguard their critical information with integrated DLP, endpoint protection, and auditing. It helps build a secure and compliant operational environment.

Read more about AnySecura

Users also considered