getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software with Third-Party Integrations (2026) - Page 5

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


120 software options

Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
TokenEx logo

Tokenization, key and encryption management platform

learn more
TokenEx is cloud-based data security, key and encryption management platform designed to help small to large businesses with tokenization, compliance regulations and cloud vaulting to protect sensitive data such as PII, PCI, PHI, and even information in unstructured formats.

Read more about TokenEx

Users also considered
strongDM logo

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
LONI logo

IaaS software for IT infrastructure engineers

learn more
LONI is a network mapping and security software designed to help IT infrastructure engineers collaborate with team members to manage public or private cloud and Active Directory (AD) infrastructure. Administrators can gain visibility into layer 1, layer 2, and layer 3 devices, system logging protocol (Syslog) anomalies, latency timers, and MAC addresses on a unified interface.

Read more about LONI

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Strobes PTaaS logo

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Securden logo

An industry-leading Privileged Access Management platform.

learn more
Securden helps you protect your network from unauthorized access and adopt zero-trust policies throughout your company.

Read more about Securden

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Fortmesa's network sensor is fully integrated allowing your team to identify non-authorized assets, map to business & operating units, and drive organizational compliance and governance

Read more about FortMesa

Users also considered
MicroZAccess logo

Network access control (NAC) platform

learn more
MicroZAccess is the next-generation Zero Trust Network Access client that delivers secure and reliable connections between devices and the cloud. Its peer-to-peer overlay model provides improved performance and privacy. It offers flexible deployment options, which make it easy to manage.

Read more about MicroZAccess

Users also considered
MicroZAccess logo

Network access control (NAC) platform

learn more
MicroZAccess is the next-generation Zero Trust Network Access client that delivers secure and reliable connections between devices and the cloud. Its peer-to-peer overlay model provides improved performance and privacy. It offers flexible deployment options, which make it easy to manage.

Read more about MicroZAccess

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
FortMesa logo

Cybersecurity software

learn more
FortMesa provides world class cybersecurity programs for organizations without a security professional on staff. Fortmesa's network sensor is fully integrated allowing your team to identify non-authorized assets, map to business & operating units, and drive organizational compliance and governance

Read more about FortMesa

Users also considered
Trapster logo

Fully configured Deceptive Security solution

learn more
Trapster is a complete honeypot solution designed to enhance deceptive security for businesses. Trapster uses fully configurable virtual machines that act as discreet sensors, silently monitoring network traffic and alerting users of any unusual activity without disrupting daily operations.

Read more about Trapster

Users also considered
PreEmptive logo

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Hackuity logo

Risk-Based Vulnerability Management Cockpit

learn more
Hackuity is a comprehensive security solution that orchestrates and automates the vulnerability management process.

Read more about Hackuity

Users also considered
Virtual Desktops logo

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered