App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Network Security Software - Page 6

Last updated: January 2025

Filter results



Integrated with


Pricing model




User rating


316 software options

Protegent Antivirus logo

Cloud-based security solution for businesses and individuals

learn more
Protegent Antivirus is a cloud-based security solution that helps businesses safeguard their computers from various malware threats. The tool offers real-time protection, data recovery, automatic updates, and more that help maintain system security.

Read more about Protegent Antivirus

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Radware DDoS Protection logo

The Next Level of DDOS Protection

learn more
DefensePro provides automated DDoS protection from fast-moving, high-volume, encrypted or very-short-duration threats. It defends against IoT-based, Burst, DNS and TLS/SSL attacks and secures against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, phantom floods and more.

Read more about Radware DDoS Protection

Users also considered
ITarian logo

IT and remote access management solution

learn more
ITarian remote access & IT management solution that helps companies connect and communicate with clients & employees, facilitating remote file access, system monitoring, troubleshooting, and operations management. Users can create multiple groups & define roles to provide secure access to resources.

Read more about ITarian

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Security Event Manager logo

SIEM solution for small to large organizations

learn more
Security Event Manager is a security information and event management (SIEM) solution, which assists small to large organizations with threat detection and response management. Key features include event log forwarding, reporting, file integrity, and device monitoring.

Read more about Security Event Manager

Users also considered
Astra Pentest logo

Vulnerability management made simple!

learn more
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Total Network Inventory logo

PC and software audit management software

learn more
Total Network Inventory (TNI) is a solution for handling PC, Mac, Linux, and FreeBSD audit, reporting and software licenses management.

Read more about Total Network Inventory

Users also considered
ManageEngine Browser Security Plus logo

Enterprise browser security tool for IT administrators

learn more
Browser Security Plus, a robust enterprise browser security tool from ManageEngine, empowers IT administrators to manage and fortify browsers efficiently within network infrastructures. Offering a comprehensive suite of features, this tool provides crucial insights into browser usage trends and add-on activities. With Browser Security Plus, IT administrators can elevate their control over browsers, fortifying the overall security posture of the enterprise's web ecosystem.

Read more about ManageEngine Browser Security Plus

Users also considered
Network Detective Pro logo

Non-intrusive IT assessment solution

learn more
Network Detective is a non-intrusive IT assessment tool. There is no software to install, so it can be used anywhere without leaving a footprint. The low-cost and unlimited license models allow MSPs to manage workflows, onboard new clients, and improve service delivery.

Read more about Network Detective Pro

Users also considered
IronDefense logo

Network detection and response tool to identify cyberthreats

learn more
IronDefense is a network detection and response (NDR) software, which helps businesses in financial, public, and other sectors detect and prevent malicious network activities. It lets security operations center (SOC) teams identify, analyze, and respond to cybersecurity threats using AI technology.

Read more about IronDefense

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Snort logo

Intrusion Prevention System

learn more
Snort is an open sourced Intrusion Prevention System using packet sniffing and packet logging to detect malicious activity on a network and threats. Configurable for business and personal use.

Read more about Snort

Users also considered
Forcepoint Web Security logo

Network security system for finance, retail & other sectors

learn more
Forcepoint Web Security is a network security software designed to help businesses in finance, healthcare, retail, and other sectors gain visibility and control of cloud applications and data using CASB functionality.

Read more about Forcepoint Web Security

Users also considered
Quantum Force logo

Quantum Force: AI-driven, cloud-native cybersecurity

learn more
Quantum Force is a suite of 10 AI-driven, cloud-deployed firewalls from Check Point Software, redefining network security with cutting-edge threat prevention, optimized efficiency, seamless cloud management, and comprehensive threat intelligence.

Read more about Quantum Force

Users also considered
BackBox logo

Enabling Network Security Posture Management

learn more
BackBox is designed for complex, hybrid, multi-cloud, and multi-vendor networks. With BackBox intelligent network automation, security, and management solutions, network and security teams can save time, assure compliance, and deliver better and more secured IT services.

Read more about BackBox

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
Timus SASE logo

cybersecurity, zero trust network access, msp-focused

learn more
Timus serves MSPs and their business clients by providing a layered security offering built on the principles of Zero Trust Network Access.

Leveraging the foundational principles of SASE and ZTNA, Timus ensures that users, regardless of their location, remain connected and protected.

Read more about Timus SASE

Users also considered
Varnish Enterprise logo

Content delivery network (CDN) & load balancing platform

learn more
Varnish Enterprise is a web-based solution designed to help businesses streamline video streaming and website acceleration operations. Varnish Enterprise allows organizations to build private content delivery networks (CDNs), enhance performance, and reduce memory or CPU usage.

Read more about Varnish Enterprise

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
JupiterOne logo

Security & Compliance. At the Speed of DevOps.

learn more
Maintain complete visibility across your digital environments leveraging the graph-based, API-powered and data-driven JupiterOne. Simplify compliance evidence collection, shorten the time between findings and remediation and manage configuration of your critical resources.

Read more about JupiterOne

Users also considered
CertHat logo

Tools to streamline Microsoft PKI management

learn more
Certhat is a comprehensive solution for managing and monitoring digital certificates in Microsoft Active Directory Certificate Services (AD CS) environments. This tool helps PKI managers become more productive by providing features such as certificate expiration alerts, full certificate visibility, and the ability to create expiration notifications for certificate groups.

Read more about CertHat

Users also considered
Biocoded logo

Cloud-based platform for managing secured communication

learn more
Biocoded is a cloud-based security platform that allows businesses to securely share messages and files via a unified portal. It offers features like encrypted private messaging, group chat, voice and video conferencing, self-destructing messages, secure file sharing, and tamper-proof IoT access, and more.

Read more about Biocoded

Users also considered
CryptoPhoto logo

Stop phishing and malware effortlessly.

learn more
CryptoPhoto is an authentication security provider that offers a faster, higher-security replacement for passwords and two-factor authentication. It addresses human-factor risks like social engineering, phishing, and malware, and is NIST SP 600-63-3 AAL3 compliant. CryptoPhoto provides secure transaction verification, out-of-band user approval, and a passwordless login option that is 10 times faster and easier to use than traditional methods.

Read more about CryptoPhoto

Users also considered
Akeyless Vault logo

Manage Your Secrets At Infinite Scale.

learn more
Unified Vault platform built to secure DevOps credentials and access to production resources across hybrid cloud and legacy environments.

Read more about Akeyless Vault

Users also considered