Network Security Software

Best Comparison List of Vendor Applications & Tools
Filter byclear all
Pricing models
Devices supported
Organization types
Geographies served
Customer rating
Integrated with
Features

Here's our list of apps for Network Security software. Filters help you narrow down the results to find exactly what you’re looking for.

Personalize your search in 2 clicks

Select your company sizeSelect your industry type

Personalize your search in a few taps

just me
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
63 apps

Reveal(x)  

3
Cloud-based network detection and response solution
With cloud-native security, ExtraHop Reveal(x) detects all threats and intelligently responds using deep context and automated workflows. Businesses can streamline response workflows and proactively secure enterprise environments, whilst ensuring compliance. Read more about Reveal(x)
Learn moreAdd to compareCompareRemove app
Cloud-based network detection and response solution
With cloud-native security, ExtraHop Reveal(x) detects all threats and intelligently responds using deep context and automated workflows. Businesses can streamline response workflows and proactively secure enterprise environments, whilst ensuring compliance. Read more about Reveal(x)
Learn moreCompare

SolarWinds Threat Monitor  

3
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Learn moreAdd to compareCompareRemove app
Automated threat monitoring - IT Ops edition
SolarWinds Threat Monitor is a cloud-based platform built to empower security-minded MSPs & MSSPs with a scalable, unified tool to monitor managed networks for threats and analyze logs against global threat intelligence data. Capabilities include automated response, an alarm engine, and reporting. Read more about SolarWinds Threat Monitor
Learn moreCompare

Netskope  

2
Safe cloud enablement solution
Netskope is an application designed to help companies secure their complete cloud app infrastructure. Read more about Netskope
Learn moreAdd to compareCompareRemove app
Safe cloud enablement solution
Netskope is an application designed to help companies secure their complete cloud app infrastructure. Read more about Netskope
Learn moreCompare

Dhound  

1
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Learn moreAdd to compareCompareRemove app
Web security monitoring & intrusion detection tool
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events. Read more about Dhound
Learn moreCompare

Distil Networks  

1
Cloud based website security software
Distil Networks is a software suite that offers fraud detection and website security services and can either be deployed on-premises or hosted in the cloud. Read more about Distil Networks
Learn moreAdd to compareCompareRemove app
Cloud based website security software
Distil Networks is a software suite that offers fraud detection and website security services and can either be deployed on-premises or hosted in the cloud. Read more about Distil Networks
Learn moreCompare

Fyde  

1
Network security & access management solution
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management. Read more about Fyde
Learn moreAdd to compareCompareRemove app
Network security & access management solution
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management. Read more about Fyde
Learn moreCompare

Identity Services  

1
Zero Trust Privilege for Today's Modern IT Threatscape
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse. Read more about Identity Services
Learn moreAdd to compareCompareRemove app
Zero Trust Privilege for Today's Modern IT Threatscape
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse. Read more about Identity Services
Learn moreCompare

VaultCore  

1
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreAdd to compareCompareRemove app
Encryption key management and cybersecurity software
VaultCore is an encryption key management software designed to help businesses and government administrations secure data by deploying key encryption across virtual and on-premise environments. Administrators can automatically schedule and enforce cryptography across keys to ensure asset protection. Read more about VaultCore
Learn moreCompare

Awake Security  

0
Cloud-based network traffic analysis and security platform
Awake Security is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking. Read more about Awake Security
Learn moreAdd to compareCompareRemove app
Cloud-based network traffic analysis and security platform
Awake Security is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking. Read more about Awake Security
Learn moreCompare

CloudEye AWS Security  

0
Security, compliance & cost for AWS & Azure cloud services
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more. Read more about CloudEye AWS Security
Learn moreAdd to compareCompareRemove app
Security, compliance & cost for AWS & Azure cloud services
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more. Read more about CloudEye AWS Security
Learn moreCompare

CloudSploit  

0
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit
Learn moreAdd to compareCompareRemove app
Automated security and configuration monitoring for AWS
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns. Read more about CloudSploit
Learn moreCompare

HaltDos  

0
Intelligent DDoS attack detection & mitigation
HaltDos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency. Read more about HaltDos
Learn moreAdd to compareCompareRemove app
Intelligent DDoS attack detection & mitigation
HaltDos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency. Read more about HaltDos
Learn moreCompare

Kenna  

0
Prioritize your scan data
Kenna is an essential platform for anyone who performs vulnerability scans. It correlates active Internet breach data, exploit data, and industry-leading threat feeds with internal scan data, enabling security professionals to pinpoint "what to fix first" within their specific environment, across all of their groups of assets. Read more about Kenna
Learn moreAdd to compareCompareRemove app
Prioritize your scan data
Kenna is an essential platform for anyone who performs vulnerability scans. It correlates active Internet breach data, exploit data, and industry-leading threat feeds with internal scan data, enabling security professionals to pinpoint "what to fix first" within their specific environment, across all of their groups of assets. Read more about Kenna
Learn moreCompare
Filter by
Customer rating