getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Network Security Software - Page 5

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

Netskope Active Platform logo

Safe cloud enablement solution

learn more
Netskope is an application designed to help companies secure their complete cloud app infrastructure.

Read more about Netskope Active Platform

Users also considered
Cisco Umbrella logo

Cisco DNS security is proven and deploys fast.

learn more
With 30,000+ customers, our DNS-layer security is proven and deploys fast. Processing 600+ billion requests daily, Umbrella ranks #1 in DNS security in GigaOM's new study. Also, Miercom ranks us #1 in SSE threat efficacy.

Read more about Cisco Umbrella

Users also considered
Astra Pentest logo

Vulnerability management made simple!

learn more
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Hide My WP Ghost logo

Cloud-based vulnerability management platform

learn more
Hide My WP Ghost provides an extra layer of security for WordPress sites by camouflaging WordPress-specific vulnerabilities from hacker bots. The plugin protects against common attacks such as SQL injection and brute force attempts by hiding WordPress paths and files without physically altering them. It includes security monitoring features with user activity logs, customizable security levels, and compatibility with other security plugins while maintaining site performance.

Read more about Hide My WP Ghost

Users also considered
Alert Logic MDR logo

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered
Ezeelogin logo

On-premises SSH jump server solution.

learn more
Ezeelogin is an on-premises SSH jump server solution designed to securely manage access to Linux servers, routers, switches and cloud instances. It offers various features including two-factor authentication, SAML authentication, SSH session recording, identity and access management (IAM), privileged access management (PAM), SSH key rotation, and root password management.

Read more about Ezeelogin

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
BlueCat logo

Centralized, automated, and secure DDI

learn more
BlueCat helps enterprises achieve their network modernization objectives by delivering innovative products and services that enable networking, security, and DevOps teams to deliver change-ready networks with improved flexibility, automation, resiliency, and security.

Read more about BlueCat

Users also considered
Mailinblack logo

Cloud-based & on-premise email protection software

learn more
Protecting businesses from malware, phishing, ransomware, and spam emails.

Read more about Mailinblack

Users also considered
SilverSky Managed Security Services logo

Security device monitoring and management

learn more
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.

Read more about SilverSky Managed Security Services

Users also considered
SPAMfighter Exchange Module logo

Anti-spam and network security solution

learn more
SPAMfighter Exchange Module is an anti-spam solution designed to help businesses identify and prevent spam messages, email fraud, and phishing attacks. The centralized dashboard allows users to deploy updates, blacklist suspicious emails, generate custom reports, and handle data encryption processes.

Read more about SPAMfighter Exchange Module

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Radware DDoS Protection logo

The Next Level of DDOS Protection

learn more
DefensePro provides automated DDoS protection from fast-moving, high-volume, encrypted or very-short-duration threats. It defends against IoT-based, Burst, DNS and TLS/SSL attacks and secures against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, phantom floods and more.

Read more about Radware DDoS Protection

Users also considered
Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Security Event Manager logo

SIEM solution for small to large organizations

learn more
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.

Read more about Security Event Manager

Users also considered
ManageEngine Browser Security Plus logo

Enterprise browser security tool for IT administrators

learn more
Browser Security Plus, a robust enterprise browser security tool from ManageEngine, empowers IT administrators to manage and fortify browsers efficiently within network infrastructures. Offering a comprehensive suite of features, this tool provides crucial insights into browser usage trends and add-on activities. With Browser Security Plus, IT administrators can elevate their control over browsers, fortifying the overall security posture of the enterprise's web ecosystem.

Read more about ManageEngine Browser Security Plus

Users also considered
Network Detective Pro logo

Non-intrusive IT assessment solution

learn more
Network Detective is a non-intrusive IT assessment tool. There is no software to install, so it can be used anywhere without leaving a footprint. The low-cost and unlimited license models allow MSPs to manage workflows, onboard new clients, and improve service delivery.

Read more about Network Detective Pro

Users also considered
BackBox logo

Enabling Network Security Posture Management

learn more
BackBox intelligently automates the OS upgrades, backup, restoration, and compliance of firewalls and other security devices with centralized management. BackBox ensures these devices function effectively and efficiently, streamlining operations for optimal security and performance.

Read more about BackBox

Users also considered
IronDefense logo

Network detection and response tool to identify cyberthreats

learn more
IronDefense is a network detection and response (NDR) software, which helps businesses in financial, public, and other sectors detect and prevent malicious network activities. It lets security operations center (SOC) teams identify, analyze, and respond to cybersecurity threats using AI technology.

Read more about IronDefense

Users also considered
ITarian logo

IT and remote access management solution

learn more
ITarian remote access & IT management solution that helps companies connect and communicate with clients & employees, facilitating remote file access, system monitoring, troubleshooting, and operations management. Users can create multiple groups & define roles to provide secure access to resources.

Read more about ITarian

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
What to do if the attacker has got behind the firewall or there are no patches available for vulnerabilities? No problem with the intrusion detection and prevention system from Enginsight. It recognises attacks and anomalies on every client and server and blocks them automatically.

Read more about Enginsight

Users also considered