App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Network Security Software - Page 7

230 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Jamf Threat Defense logo

Jamf Threat Defense

4.5
(2)

Consistent security for all mobile endpoints

learn more
Jamf Threat Defense protects against mobile endpoints including iOS, iPadOS, and Android threat vectors through a highly effective mobile application and prevents in-network threats in real-time.

Read more about Jamf Threat Defense

Users also considered
SpyHunter logo

SpyHunter

3.2
(5)

Malware detection and removal software for Windows and Mac

learn more
SpyHunter is an on-premise malware detection and removal tool for Windows and Mac designed to help businesses scan, identify, remove, and block potentially unwanted programs (PUPs) and malware. It lets users protect their system against the latest malware threats by removing ransomware, trojans, viruses, worms, adware, rootkits, and other objects.

Read more about SpyHunter

Users also considered
Dhound logo

Dhound

5.0
(1)

Web security monitoring & intrusion detection tool

learn more
Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.

Read more about Dhound

Users also considered
Detectify logo

Detectify

5.0
(1)

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
Cisco Identity Services Engine logo

Cisco Identity Services Engine

5.0
(1)

Services Engline for improved & dynamic network visibility

learn more
Identity Services Engine (ISE) provides visibility into network devices on a zero-trust framework. It builds visibility based-segmentation, offers dynamic and complete visbility.

Read more about Cisco Identity Services Engine

Users also considered
ShadowKat logo

ShadowKat

5.0
(1)

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
IDA Pro logo

IDA Pro

5.0
(1)

A powerful disassembler and a versatile debugger.

learn more
Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.

Read more about IDA Pro

Users also considered
condignum logo

condignum

5.0
(1)

Cloud-based compliance management solution

learn more
condignum is a cloud-based compliance management solution designed to help businesses of all sizes and industries handle security requirements and risks. It allows administrators to automatically evaluate complex issues using knowledge databases within the platform.

Read more about condignum

Users also considered
NetWitness logo

NetWitness

5.0
(1)

Threat Detection & Response platform for cybersecurity teams

learn more
Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.

Read more about NetWitness

Users also considered
SYSVOOT Antivirus Pro logo

SYSVOOT Antivirus Pro

5.0
(1)

Your Freedom From Computer Viruses

learn more
Great protection with real time support. All at one price.

Read more about SYSVOOT Antivirus Pro

Users also considered
CloudJacketX logo

CloudJacketX

5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketX is a managed security-as-a-service platform designed to help businesses detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketX

Users also considered
Trava logo

Trava

5.0
(1)

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Fyde logo

Fyde

5.0
(1)

Network security & access management solution

learn more
Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.

Read more about Fyde

Users also considered
IronDefense logo

IronDefense

5.0
(1)

Network detection and response tool to identify cyberthreats

learn more
IronDefense is a network detection and response (NDR) software, which helps businesses in financial, public, and other sectors detect and prevent malicious network activities. It lets security operations center (SOC) teams identify, analyze, and respond to cybersecurity threats using AI technology.

Read more about IronDefense

Users also considered
SecureONE logo

SecureONE

5.0
(1)

We Stop Lateral Movement.

learn more
SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.

Read more about SecureONE

Users also considered
Flowmon Anomaly Detection System logo

Flowmon Anomaly Detection System

5.0
(1)

Intelligent Detection Engine for Network Anomalies

learn more
Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.

Read more about Flowmon Anomaly Detection System

Users also considered
Shieldoo logo

Shieldoo

5.0
(1)

Secure network

learn more
Shieldoo's secure network is a revolutionary new tool designed to connect securely from anywhere with next-gen encryption and anonymity.

Read more about Shieldoo

Users also considered
BelkaVPN logo

BelkaVPN

4.0
(1)

BelkaVPN is designed to help businesses securely access web

learn more
BelkaVPN proxy - is a fast VPN proxy service that ensures internet privacy and security for everyone. Unblock media streaming, protect your data, shun away snoopers and hackers, and enjoy the full palette of online experiences with our VPN extension.

Read more about BelkaVPN

Users also considered
Trellix Network Security logo

Trellix Network Security

3.0
(2)

Network security platform for detecting & resolving threats

learn more
Trellix Network Security is an on-premise and cloud-based network security platform, which helps midsize to large businesses detect and resolve cyber threats or advanced, targeted, and other evasive attacks using Multi-Vector Virtual Execution (MVX), artificial intelligence (AI), and machine learning (ML) technologies. Administrators can receive alerts about critical issues and prioritize or contain targeted and newly discovered attacks based on real-time evidence.

Read more about Trellix Network Security

Users also considered
INETCO Insight logo

INETCO Insight

3.0
(1)

Transaction monitoring solution

learn more
INETCO Insight is an independent real-time payment network intelligence platform designed to meet the specific needs of the payments industry, including banking, retail and payments industries.

Read more about INETCO Insight

Users also considered
CloudSploit logo

CloudSploit

(0)

Automated security and configuration monitoring for AWS

learn more
CloudSploit is an automated security and configuration monitoring tool for Amazon Web Services (AWS) which scans configurations, looking for security concerns

Read more about CloudSploit

Users also considered
Cisco ACI logo

Cisco ACI

(0)

Secure & comprehensive SDN solution for modern data centers

learn more
Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.

Read more about Cisco ACI

Users also considered
DDoS-GUARD logo

DDoS-GUARD

(0)

Network security and website protection software

learn more
DDoS-GUARD is a network security software that helps businesses protect websites against various types of distributed denial-of-service (DDoS) attacks, including TCP SYN flood, Slowloris, and HTTP flood. The platform allows managers to optimize content and images across web pages to improve website performances.

Read more about DDoS-GUARD

Users also considered
ThreatSpotter logo

ThreatSpotter

(0)

ThreatSpotter - Compliance Security Scanner

learn more
ThreatSpotter tool integrates with private cloud resources and ensures that compliance risk management summary should be integrated with provided credentials so that all compliance results would be available in threat analytics dashboard. Threatspotter helps in achievement of tracking continuously.

Read more about ThreatSpotter

Users also considered
Genian NAC logo

Genian NAC

(0)

Network security and access control software

learn more
Genian NAC is a network security and access control software that helps businesses identify IP-enabled devices, manage vulnerabilities, and inspect device configurations to secure network access environments. Key features of the platform include network monitoring, device risk analysis, switch port management, IT security automation, and compliance regulation.

Read more about Genian NAC

Users also considered