App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 10 (2025)

Last updated: March 2025

Filter results



Integrated with


Pricing model




User rating


308 software options

Genian NAC logo
(0)

Network security and access control software

learn more
Genian NAC is a network security and access control software that helps businesses identify IP-enabled devices, manage vulnerabilities, and inspect device configurations to secure network access environments. Key features of the platform include network monitoring, device risk analysis, switch port management, IT security automation, and compliance regulation.

Read more about Genian NAC

Users also considered
ThreatX logo
(0)

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
ExpressPlay XCA logo
(0)

Converged broadcast TV and streaming security

learn more
ExpressPlay XCA security-as-a-service enables broadcasters to securely deliver content to smart TVs.

Read more about ExpressPlay XCA

Users also considered
MobileWall logo
(0)

Provides a patented cloud-based mobile firewall.

learn more
MobileWall provides patented, cloud-based Software-as-a-Service mobile data security, visibility and control subscription services. MobileWall acts as a mobile firewall for your data, while giving the ability to view data usage and make adjustments to eliminate risks and reduce data costs.

Read more about MobileWall

Users also considered
Appaegis Isolation Access Cloud logo
(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
ExeonTrace logo
(0)

Network security software

learn more
ExeonTrace is a network monitoring solution that helps businesses gain complete visibility into network data flows and automatically detect suspicious behavior before any real damage is done. Key features include correlation engine, incident assessment, security database, alerting system, and reporting.

Read more about ExeonTrace

Users also considered
Risk Assistant logo
(0)

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
DTonomy AIR logo
(0)

A hyper-efficient security operation platform

learn more
DTonomy leverage AI and automation to help the security team
- automate repetitive tasks
- reduce false positives
- recover attack stories

Read more about DTonomy AIR

Users also considered
Red Access logo
(0)

Agentless Browsing Security

learn more
Red Access is an agentless browsing security platform that helps companies secure web sessions without disrupting user experience. It prevents zero-day threats and malware across browsers, files, identity, and data with combined cloud and endpoint inspection. The platform supports hybrid environments, secures web apps and browsers across devices and operating systems, and enables control and visibility without installing agents, isolating browsers, or adding extensions.

Read more about Red Access

Users also considered
PreEmptive logo
(0)

PreEmptive: Professional Grade Application Protection.

learn more
PreEmptive secures your apps against data & IP theft, hacking, & tampering with multi-layered protection. Solutions include Dotfuscator (.NET/Xamarin), DashO (Java/Android), & JSDefender (JavaScript).
Protect your code and ensure app security with PreEmptive.

Read more about PreEmptive

Users also considered
Crowdsec logo
(0)

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
Area 1 logo
(0)

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1

Users also considered
strongDM logo
(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
swIDch Auth SDK logo
(0)

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
Crowdsec logo
(0)

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
tbSIEM logo
(0)

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
CimTrak Integrity Suite logo
(0)

CimTrak helps companies keep their IT infrastructure secure.

learn more
Security application that helps secure and maintain business IT infrastructure, compliance with regulations such as the PCI-DSS, etc.
Built around advanced file integrity monitoring technology, CimTrak helps companies and government agencies worldwide keep their IT infrastructure secure.

Read more about CimTrak Integrity Suite

Users also considered
Virnetx Matrix logo
(0)

Cloud-based cybersecurity platform

learn more
VirnetX Matrix is a cloud-based, zero-trust network architecture developed to seamlessly integrate and secure applications for the entire organization. It provides enterprise protection against cyber attacks with zero trust network access, flex network segmentation, and protection for cloud or on-premise applications.

Read more about Virnetx Matrix

Users also considered
EdgeConnect SD-WAN logo
(0)

Network and bandwidth management software

learn more
Aruba SD-WAN is a network management solution designed to help businesses streamline application performance, bandwidth, and SD-WAN orchestration operations. It allows companies to control their network traffic across any type of connection and can be used in conjunction with existing routers.

Read more about EdgeConnect SD-WAN

Users also considered
Chariot logo
(0)

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Netwrix Threat Manager (formerly StealthDEFEND) logo
(0)

Detect advanced attacks and shut them down in a flash

learn more
Netwrix StealthDEFEND helps businesses detect and respond to ransomware, golden ticket, DCShadow, kerberoasting, and other attacks on Active Directory and data with high accuracy and speed.

Read more about Netwrix Threat Manager (formerly StealthDEFEND)

Users also considered
Strobes PTaaS logo
(0)

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered
Blacklock logo
(0)

Effortless vulnerability scanner and pen-testing platform.

learn more
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner.

Read more about Blacklock

Users also considered
Virtual Desktops logo
(0)

Virtual desktop solution

learn more
ComputerVault Virtual Desktops provide secure, high-performance remote access to desktops from anywhere, on any device.

Read more about Virtual Desktops

Users also considered
IKare logo
(0)

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered