getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Network Security Software - Page 8

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


249 software options

Trellix Network Security logo

Network security platform for detecting & resolving threats

learn more
Trellix Network Security is an on-premise and cloud-based network security platform, which helps midsize to large businesses detect and resolve cyber threats or advanced, targeted, and other evasive attacks using Multi-Vector Virtual Execution (MVX), artificial intelligence (AI), and machine learning (ML) technologies. Administrators can receive alerts about critical issues and prioritize or contain targeted and newly discovered attacks based on real-time evidence.

Read more about Trellix Network Security

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Enterprise Security logo

Enterprise security and data protection system

learn more
Enterprise Security offers a data protection system that protects sensitive data anywhere and everywhere, empowering organizations to use data to create better customer experiences, make intelligent decisions, and fuel innovation. Protegrity’s fine-grain data protection solutions can enable your data security, sharing, and analytics.

Read more about Enterprise Security

Users also considered
Prisma SASE logo

AI-powered SASE

learn more
Experience comprehensive protection and control for your applications and data with Prisma SASE. With advanced AI-powered security, real-time threat detection, and a focus on SASE principles, this cutting-edge solution ensures your organization is secure and compliant in the ever-evolving digital landscape.

Read more about Prisma SASE

Users also considered
Illumio logo

Cloud security solutions to protect networks

learn more
Illumio is a zero trust network security company that provides advanced cloud security solutions to protect networks and secure the cloud. Their Zero Trust Segmentation Platform visualizes communication between workloads and devices, sets granular segmentation policies to control communications, and isolates high-value assets to stop breaches and ransomware from spreading across hybrid IT environments.

Read more about Illumio

Users also considered
Plixer One logo

Network monitoring platform providing performance analytics

learn more
Plixer One Platform is a network monitoring solution that offers comprehensive network visibility and performance analytics across on-premises, multi-cloud, and hybrid environments. Powered by Scrutinizer technology, it provides real-time insights, streamlined traffic monitoring, frictionless implementation, increased efficiency and reduced costs.

Read more about Plixer One

Users also considered
Eye Security logo

Cyber protection in one simple package

learn more
Eye Security delivers high-quality cyber solutions to European companies. Its mission is to make security accessible and affordable for every company. Eye Security provides an all-in-one solution with managed XDR, 247 incident response, security awareness training, and cyber insurance.

Read more about Eye Security

Users also considered
SecureONE logo

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Onapsis logo

ERP security program for SAP and Oracle platforms

learn more
Onapsis provides services for monitoring and protection of SAP and Oracle ERP systems. Onapsis software discloses unauthorized changes and attacks on customer systems through constant monitoring. Onapsis Research Labs constantly searches for security holes.

Read more about Onapsis

Users also considered
BhaiFi Core logo

Unified Software-Based Networking Platform Beyond Firewall.

learn more
All-In-One Software-Based Network Security & Management Solution for Coworking Spaces, SMEs, Hotels & Retail.

Read more about BhaiFi Core

Users also considered
Flowmon ADS logo

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon ADS

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
NetWitness logo

Threat Detection & Response platform for cybersecurity teams

learn more
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.

Read more about NetWitness

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
Netacea Bot Management logo

Netacea protects websites, mobile apps and APIs from bots.

learn more
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.

Read more about Netacea Bot Management

Users also considered
Ericsson NetCloud Manager logo

Manage network connectivity and security from anywhere.

learn more
NetCloud SASE integrates cellular-centric SD-WAN and zero-trust cybersecurity into a unified, cloud-delivered solution, enabling rapid network deployment. Integrated CASB, SWG, RBI, CDR, and ZTNA protect against web exploits, phishing, ransomware, and data loss to Gen AI and other web tools.

Read more about Ericsson NetCloud Manager

Users also considered
Vectra AI Platform logo

AI-driven network detection and response platform

learn more
Vectra AI delivers AI-driven network detection and response that exposes lateral movement and attacker behavior missed by perimeter tools. With visibility across on-prem, cloud, and hybrid networks, analysts can stop attacks early using instant access to enriched network metadata.

Read more about Vectra AI Platform

Users also considered
Defend logo

Full-day, real-time identity—without extra hardware.

learn more
Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.

Read more about Defend

Users also considered
Cisco ACI logo

Secure & comprehensive SDN solution for modern data centers

learn more
Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.

Read more about Cisco ACI

Users also considered
BelkaVPN logo

BelkaVPN is designed to help businesses securely access web

learn more
BelkaVPN proxy - is a fast VPN proxy service that ensures internet privacy and security for everyone. Unblock media streaming, protect your data, shun away snoopers and hackers, and enjoy the full palette of online experiences with our VPN extension.

Read more about BelkaVPN

Users also considered
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
INETCO Insight logo

Transaction monitoring solution

learn more
INETCO Insight is an independent real-time payment network intelligence platform designed to meet the specific needs of the payments industry, including banking, retail and payments industries.

Read more about INETCO Insight

Users also considered
Haltdos logo

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency.

Read more about Haltdos

Users also considered
CloudSploit logo

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered