App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Network Security Software - Page 8

230 software options

Sponsored

Filter results


Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

MobileWall logo

MobileWall

(0)

Provides a patented cloud-based mobile firewall.

learn more
MobileWall provides patented, cloud-based Software-as-a-Service mobile data security, visibility and control subscription services. MobileWall acts as a mobile firewall for your data, while giving the ability to view data usage and make adjustments to eliminate risks and reduce data costs.

Read more about MobileWall

Users also considered
ThreatSpotter logo

ThreatSpotter

(0)

ThreatSpotter - Compliance Security Scanner

learn more
ThreatSpotter tool integrates with private cloud resources and ensures that compliance risk management summary should be integrated with provided credentials so that all compliance results would be available in threat analytics dashboard. Threatspotter helps in achievement of tracking continuously.

Read more about ThreatSpotter

Users also considered
Cisco ACI logo

Cisco ACI

(0)

Secure & comprehensive SDN solution for modern data centers

learn more
Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.

Read more about Cisco ACI

Users also considered
Risk Assistant logo

Risk Assistant

(0)

Cybersecurity Solution

learn more
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.

Read more about Risk Assistant

Users also considered
DTonomy AIR logo

DTonomy AIR

(0)

A hyper-efficient security operation platform

learn more
DTonomy leverage AI and automation to help the security team
- automate repetitive tasks
- reduce false positives
- recover attack stories

Read more about DTonomy AIR

Users also considered
ExeonTrace logo

ExeonTrace

(0)

Network security software

learn more
ExeonTrace is a network monitoring solution that helps businesses gain complete visibility into network data flows and automatically detect suspicious behavior before any real damage is done. Key features include correlation engine, incident assessment, security database, alerting system, and reporting.

Read more about ExeonTrace

Users also considered
ThreatX logo

ThreatX

(0)

API and web application protection against cyber threats

learn more
ThreatX is a API and web application protection platform that can instantly protect business operations against cyber threats such as bot-based attacks, exploitations of vulnerabilities, zero-day attacks, and more. As a ThreatX managed service, this platform offers multi-layered detection capabilities and behavior analysis that can identify attacker activity without user interruption.

Read more about ThreatX

Users also considered
Network Detection and Response logo

Network Detection and Response

(0)

Network visibility, threat detection and forensic analysis

learn more
Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.

Read more about Network Detection and Response

Users also considered
Appaegis Isolation Access Cloud logo

Appaegis Isolation Access Cloud

(0)

Data Centric Zero Trust

learn more
Appaegis extends zero trust from application access to data access governance to reduce risk, apply real-time control to access, and provide granular visibility to access and availability of critical assets.

Read more about Appaegis Isolation Access Cloud

Users also considered
strongDM logo

strongDM

(0)

strongDM is the Infrastructure Access Platform.

learn more
strongDM’s infrastructure access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability in simplifying workflows and making it easier for technical staff to access the tools they need.

Read more about strongDM

Users also considered
VGS logo

VGS

(0)

Secure collection, protection & exchange of sensitive data

learn more
VGS platform by Very Good Security enables users to securely collect, protect, and exchange sensitive data such as card details, personal finance data, identification documents, vacation rental payments, & credentials, using data redaction and alias value systems which cannot be reverse engineered

Read more about VGS

Users also considered
Crowdsec logo

Crowdsec

(0)

Let's make the Internet safer, together.

learn more
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.

Read more about Crowdsec

Users also considered
Defend logo

Defend

(0)

Full-day, real-time identity—without extra hardware.

learn more
Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.

Read more about Defend

Users also considered
Area 1 Horizon logo

Area 1 Horizon

(0)

Secure email gateway and anti-spam software

learn more
Area 1 Horizon is a network security management software designed to help businesses protect systems against phishing attacks across various traffic sources including emails, web pages, and networks. The platform enables administrators to receive notifications about blocked phishing campaigns on a unified interface.

Read more about Area 1 Horizon

Users also considered
swIDch Auth SDK logo

swIDch Auth SDK

(0)

swIDch Auth SDK. Toolkit for authentication & identification

learn more
Design & build a robust identification and authentication security innovation for passwordless multi-factor security across systems with our swIDch Auth SDK.

Read more about swIDch Auth SDK

Users also considered
DefendX Control logo

DefendX Control

(0)

Control storage resources and secure corporate file assets

learn more
DefendX Control is a cloud-based storage management solution that prevents unwanted files from entering your environment through advanced file blocking policies.

Read more about DefendX Control

Users also considered
tbSIEM logo

tbSIEM

(0)

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Blacklock logo

Blacklock

(0)

On-Demand & Continuous pen testing solution.

learn more
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner. The platform automates several stages of the traditional penetration testing cycle, introducing an agile penetration testing approach and making security testing accessible to more businesses.

Read more about Blacklock

Users also considered
Virnetx Matrix logo

Virnetx Matrix

(0)

Cloud-based cybersecurity platform

learn more
VirnetX Matrix is a cloud-based, zero-trust network architecture developed to seamlessly integrate and secure applications for the entire organization. It provides enterprise protection against cyber attacks with zero trust network access, flex network segmentation, and protection for cloud or on-premise applications.

Read more about Virnetx Matrix

Users also considered
Holm Security VMP logo

Holm Security VMP

(0)

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Haltdos logo

Haltdos

(0)

Intelligent DDoS attack detection & mitigation

learn more
Haltdos is a DDoS mitigation solution for online businesses to defend against a wide range of DDoS attacks to minimize application downtime and latency

Read more about Haltdos

Users also considered
CloudEye logo

CloudEye

(0)

Security, compliance & cost for AWS & Azure cloud services

learn more
CloudEye tracks & monitors AWS services for security & compliance violations with continuous security scanning, vulnerability alerts, audit reports, and more

Read more about CloudEye

Users also considered
Awake Security logo

Awake Security

(0)

Cloud-based network traffic analysis and security platform

learn more
Arista NDR is a cloud-based network security solution, which assists with the detection and visualization of the activity, behavior, and malicious intent of visitors. Key features include advanced network traffic analysis tools, threat intelligence, data point processing, and incident tracking.

Read more about Awake Security

Users also considered
PROsecure logo

PROsecure

(0)

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
RedShield logo

RedShield

(0)

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered