App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Network Security Software - Page 6

266 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Vault logo

Vault

4.7
(7)

Secure data storage and access management software

learn more
Vault by HashiCrop is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Next Generation Firewall logo

Next Generation Firewall

4.7
(7)

Threat intelligence and network security software

learn more
Next Generation Firewall is a threat intelligence software designed to help businesses configure security gateways and prevent zero-day attacks. The platform allows administrators to intercept SSL encrypted communication between servers and clients and protect data centers against Gen V attacks.

Read more about Next Generation Firewall

Users also considered
BackBox logo

BackBox

4.4
(9)

Enabling Network Security Posture Management

learn more
BackBox intelligently automates the OS upgrades, backup, restoration, and compliance of firewalls and other security devices with centralized management. BackBox ensures these devices function effectively and efficiently, streamlining operations for optimal security and performance.

Read more about BackBox

Users also considered
Netsurion logo

Netsurion

3.6
(23)

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.

Gain complete network security powered by a robust SIEM and 24/7 SOC.

Read more about Netsurion

Users also considered
JupiterOne logo

JupiterOne

5.0
(5)

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
Axonius logo

Axonius

5.0
(5)

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
Cisco Umbrella logo

Cisco Umbrella

4.3
(9)

Cloud-based cybersecurity and internet gateway software

learn more
Cisco Umbrella is a cloud security software that provides businesses with tools to identify cybersecurity threats and manage remote access to cloud applications. Supervisors can use DNS layer technology to block malicious domains, applications, and IP addresses from a centralized platform.

Read more about Cisco Umbrella

Users also considered
Akeyless Vault logo

Akeyless Vault

4.6
(7)

Manage Your Secrets At Infinite Scale.

learn more
Unified Vault platform built to secure DevOps credentials and access to production resources across hybrid cloud and legacy environments.

Read more about Akeyless Vault

Users also considered
Portnox CLEAR logo

Portnox CLEAR

4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Sysdig logo

Sysdig

4.4
(7)

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
PA File Sight logo

PA File Sight

4.8
(5)

Windows-based ransomware protection & access auditing tool

learn more
PA File Sight is Windows-based ransomware protection and access auditing software used to protect secure data and files. Organizations can use the software to detect and stop ransomware attacks, prevent data loss and leaks, and audit file access.

Read more about PA File Sight

Users also considered
IronDefense logo

IronDefense

4.8
(5)

Network detection and response tool to identify cyberthreats

learn more
IronDefense is a network detection and response (NDR) software, which helps businesses in financial, public, and other sectors detect and prevent malicious network activities. It lets security operations center (SOC) teams identify, analyze, and respond to cybersecurity threats using AI technology.

Read more about IronDefense

Users also considered
CYRISMA logo

CYRISMA

4.8
(5)

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about CYRISMA

Users also considered
SOAX logo

SOAX

5.0
(4)

Intelligent Data Collection Platform

learn more
SOAX is an intelligent data collection platform that leading companies use to collect public web data. It provides a wide range of features, including proxy servers, web crawlers, and scraper APIs. These features allow businesses to collect data from a variety of sources.

Read more about SOAX

Users also considered
Reveelium logo

Reveelium

4.5
(6)

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
Speedify for Teams logo

Speedify for Teams

4.5
(6)

Virtual private network (VPN) software

learn more
Speedify is VPN software that helps businesses encrypt web traffic to ensure online privacy. It allows staff members to securely utilize multiple internet connections at the same time across macOS, Windows, iOS, and Android devices.

Read more about Speedify for Teams

Users also considered
ITarian logo

ITarian

3.9
(11)

IT and remote access management solution

learn more
ITarian remote access & IT management solution that helps companies connect and communicate with clients & employees, facilitating remote file access, system monitoring, troubleshooting, and operations management. Users can create multiple groups & define roles to provide secure access to resources.

Read more about ITarian

Users also considered
Electric AI logo

Electric AI

3.5
(15)

IT management software for managed software providers (MSP)

learn more
Electric is an IT management software designed to help businesses monitor network security and manage applications, operating systems, databases, and more. It allows IT teams to automate provisioning and de-provisioning of devices, monitor network inventories, launch upgrades, and review policies.

Read more about Electric AI

Users also considered
NOLA logo

NOLA

4.8
(4)

Auto dialer solution for call centers and debt collectors

learn more
NOLA AUTOMATION is an auto dialer solution that helps call centers communicate with customers via various methods including outbound or inbound calls, SMS, emails, live chat, and more. It allows sales teams to analyze customer journey by targeting leads or customers and creating strategic plans.

Read more about NOLA

Users also considered
SiteLock logo

SiteLock

3.2
(23)

Threat intelligence software for eCommerce businesses

learn more
SiteLock is a static application security testing (SAST) software designed to help businesses protect websites against malware and distributed denial-of-service (DDoS) attacks. Key features of the platform include threat detection, database scanning, bad bot blocking, automated plugin patching, security vulnerability repair, and website acceleration.

Read more about SiteLock

Users also considered
Holm Security VMP logo

Holm Security VMP

4.4
(5)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
condignum logo

condignum

5.0
(3)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
Cynet 360 logo

Cynet 360

5.0
(3)

Automated breach response and protection platform

learn more
Cynet 360 is an all-in-one security platform that provides endpoint threat detection and response for networks that require advanced protection. It gives network administrators visibility over all networked devices, users, and events. Cyber security technology is viable for companies of all sizes.

Read more about Cynet 360

Users also considered
VaultCore logo

VaultCore

5.0
(3)

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
Appgate SDP logo

Appgate SDP

5.0
(3)

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered