getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Network Security Software with Large enterprises - Page 8

Last updated: May 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


182 software options

CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
BUFFERZONE logo

Network security and endpoint protection solution

learn more
BUFFERZONE is a security solutions suite based on Protection by Containment that creates an isolated virtual environment for users to securely access potentially risky content such as web pages, email attachments, links, or external files.

Read more about BUFFERZONE

Users also considered
Hypori Halo logo

Securing the world at work from any device, anywhere.

learn more
Hypori Halo is an app-accessible, separate, and secure mobile workspace delivering encrypted access to enterprise apps and data from any smartphone or tablet.

Read more about Hypori Halo

Users also considered
Trapster logo

Fully configured Deceptive Security solution

learn more
Trapster is a complete honeypot solution designed to enhance deceptive security for businesses. Trapster uses fully configurable virtual machines that act as discreet sensors, silently monitoring network traffic and alerting users of any unusual activity without disrupting daily operations.

Read more about Trapster

Users also considered