getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Network Security Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

Snort logo

Intrusion Prevention System

learn more
Snort is an open sourced Intrusion Prevention System using packet sniffing and packet logging to detect malicious activity on a network and threats. Configurable for business and personal use.

Read more about Snort

Users also considered
Practice Protect logo

Network security & identity management

learn more
PracticeProtect is a cloud security solution designed especially for accountants to manage passwords, control access & protect data online

Read more about Practice Protect

Users also considered
Panorama logo

Cloud-based network security management tool

learn more
Panorama is a cloud-based network security management platform designed to help businesses create security policies and determine potential threats across enterprise networks. Supervisors can use the centralized console to manage policy deployments and configure rules for sandboxing, threat prevention, URL filtering, firewalls, application awareness, and more.

Read more about Panorama

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Gain complete network security powered by a robust SIEM and 24/7 SOC.

Read more about Netsurion

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Varnish Enterprise logo

Content delivery network (CDN) & load balancing platform

learn more
Varnish Enterprise is a web-based solution designed to help businesses streamline video streaming and website acceleration operations. Varnish Enterprise allows organizations to build private content delivery networks (CDNs), enhance performance, and reduce memory or CPU usage.

Read more about Varnish Enterprise

Users also considered
Biocoded logo

Cloud-based platform for managing secured communication

learn more
Biocoded is a cloud-based security platform that allows businesses to securely share messages and files via a unified portal. It offers features like encrypted private messaging, group chat, voice and video conferencing, self-destructing messages, secure file sharing, and tamper-proof IoT access, and more.

Read more about Biocoded

Users also considered
CertHat logo

Tools to streamline Microsoft PKI management

learn more
Certhat is a comprehensive solution for managing and monitoring digital certificates in Microsoft Active Directory Certificate Services (AD CS) environments. This tool helps PKI managers become more productive by providing features such as certificate expiration alerts, full certificate visibility, and the ability to create expiration notifications for certificate groups.

Read more about CertHat

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
ManageEngine PAM360 logo

Privileged access management software

learn more
ManageEngine PAM360 is a privileged access management solution that secures and controls access to critical systems. It offers features like account discovery, credential storage, session management, and user behavior analytics. PAM360 ensures compliance with standards such as NIST, PCI-DSS, HIPAA, and ISO-IEC 27001, while providing flexible deployment options to meet organizational needs.

Read more about ManageEngine PAM360

Users also considered
Akeyless Vault logo

Manage Your Secrets At Infinite Scale.

learn more
Unified Vault platform built to secure DevOps credentials and access to production resources across hybrid cloud and legacy environments.

Read more about Akeyless Vault

Users also considered
CryptoPhoto logo

Stop phishing and malware effortlessly.

learn more
CryptoPhoto is an authentication security provider that offers a faster, higher-security replacement for passwords and two-factor authentication. It addresses human-factor risks like social engineering, phishing, and malware, and is NIST SP 600-63-3 AAL3 compliant. CryptoPhoto provides secure transaction verification, out-of-band user approval, and a passwordless login option that is 10 times faster and easier to use than traditional methods.

Read more about CryptoPhoto

Users also considered
Portnox CLEAR logo

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Aikido Security is a unified security platform that helps businesses detect, pentest, and block threats across code, cloud, and runtime environments. It includes static code analysis, software composition analysis for open-source dependencies, infrastructure as code scanning, secrets detection, malware detection, and container image scanning. The solution offers cloud posture management to identify misconfigurations and risks, with dynamic application security testing and API scanning features.

Read more about Aikido Security

Users also considered
Sysdig logo

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
ManageEngine EventLog Analyzer logo

Web-Based SIEM & Log Management Solution. Affordable Prices.

learn more
EventLog Analyzer is a web-based security information and event management (SIEM) solution, which assists small to large organizations with the monitoring of network devices, servers and applications. Key features include auditing, traffic analysis, threat detection, and compliance management.

Read more about ManageEngine EventLog Analyzer

Users also considered
Cynet 360 logo

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
SiteLock logo

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
NetFlow Traffic Analyzer logo

Network monitoring software for IT professionals

learn more
NetFlow Traffic Analyzer is a network mapping software designed to help IT professionals monitor bandwidth and assess traffic across networks. The platform enables administrators to gain insights into malicious traffic flows and troubleshoot issues on a unified interface.

Read more about NetFlow Traffic Analyzer

Users also considered
Cyolo logo

Secure remote access for critical infrastructure.

learn more
Cyolo redefines secure remote access for operational technology (OT) by enabling employees, contractors, and original equipment manufacturers (OEMs) to safely connect and operate critical infrastructure from anywhere. The product integrates with modern and legacy ICS applications and devices, allowing users to access systems without the need to replace existing infrastructure or change workflows.

Read more about Cyolo

Users also considered
MixMode logo

Self-learning Platform to Defend Against Cyber Attacks

learn more
MixMode is a dynamic attack detection solution purpose-built on patented AI to detect known and novel attacks in real-time, at scale. The MixMode Platform autonomously ingests and analyzes data at scale to cut through the noise, surface critical threats, and improve overall defense.

Read more about MixMode

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered