App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Network Security Software - Page 8

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

2.2M+ verified reviews. Learn more

14+ years of expertise. Learn more

2M+ monthly users.

Filter 292 results


Features



Pricing model




User rating


Sort by
Dhound logo

Web security monitoring & intrusion detection tool

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Dhound is a web security monitoring and threat detection system for websites, applications, servers, and clouds, with tools for tracking logins, auditing outgoing traffic, detecting threats, marking trusted sources, monitoring WordPress sites, and setting up alerts for suspicious and warning events.Read more about Dhound
Pros and Cons from Dhound users
No pros & cons found
CyberCAST logo

Going Beyond The Alert

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

4

Features

5

Description

Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.Read more about CyberCAST
Pros and Cons from CyberCAST users
No pros & cons found
Enterprise Security logo

Enterprise security and data protection system

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Enterprise Security offers a data protection system that protects sensitive data anywhere and everywhere, empowering organizations to use data to create better customer experiences, make intelligent decisions, and fuel innovation. Protegrity’s fine-grain data protection solutions can enable your data security, sharing, and analytics.Read more about Enterprise Security
Pros and Cons from Enterprise Security users
No pros & cons found
NetBrain logo

No-code network automation and observability platform

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

3

Features

4

Description

NetBrain, the leading no-code network automation platform, accelerates troubleshooting collaboration by emulating network engineers' tasks. It ensures continuous assessment of hybrid networks, safeguards change operations, and prevents unplanned downtime. The platform features an extensible automation library with pre-built intents for common IT issues.Read more about NetBrain
Pros and Cons from NetBrain users
No pros & cons found
ManageEngine PAM360 logo

Complete privileged access security for enterprises

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

3

Features

5

Description

ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.Read more about ManageEngine PAM360
Pros and Cons from ManageEngine PAM360 users
No pros & cons found
ShadowKat logo

External Attack Surface Management

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.Read more about ShadowKat
Pros and Cons from ShadowKat users
No pros & cons found
IDA Pro logo

A powerful disassembler and a versatile debugger.

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

1

Features

4

Description

Hex-Rays develops and supports the IDA disassembler. This famous software analysis tool, which is a de-facto standard in the software security industry, is an indispensable item in the toolbox of a software analyst, security expert, software developer, or software engineer.Read more about IDA Pro
Pros and Cons from IDA Pro users
No pros & cons found
MeghOps logo

Innovating Cyber Horizons

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.Read more about MeghOps
Pros and Cons from MeghOps users
No pros & cons found
CloudJacketXi logo

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.Read more about CloudJacketXi
Pros and Cons from CloudJacketXi users
No pros & cons found
NetWitness logo

Threat Detection & Response platform for cybersecurity teams

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

4

Features

5

Description

Netwitness is a suite of products (including Netwitness Platform, Network, Logs, Orchestrator, Endpoint and Detect AI) designed for cybersecurity teams to tackle threat, network, endpoint detection and response, as well as security orchestration and automation.Read more about NetWitness
Pros and Cons from NetWitness users
No pros & cons found
SYSVOOT Antivirus Pro logo

Your Freedom From Computer Viruses

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Great protection with real time support. All at one price.Read more about SYSVOOT Antivirus Pro
Pros and Cons from SYSVOOT Antivirus Pro users
No pros & cons found
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

4

Features

4

Description

Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more. Read more about Trava
Pros and Cons from Trava users
No pros & cons found
Netacea Bot Management logo

Netacea protects websites, mobile apps and APIs from bots.

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.Read more about Netacea Bot Management
Pros and Cons from Netacea Bot Management users
No pros & cons found
Fyde logo

Network security & access management solution

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

3

Description

Fyde is a cloud-based network security solution designed to assist enterprises with providing partners and contractors privileged access to corporate resources and applications. Key features include policy management, application segmentation, threat detection, and identity management.Read more about Fyde
Pros and Cons from Fyde users
No pros & cons found
Network Node Manager i logo

Network monitoring and troubleshooting platform

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Network Node Manager i (NNMi) is a network management software that provides real-time visibility into the performance and availability of network infrastructure. It is designed to help organizations monitor and manage their network devices, applications, and services to ensure that they are operating at peak performance. Read more about Network Node Manager i
Pros and Cons from Network Node Manager i users
No pros & cons found
SecureONE logo

We Stop Lateral Movement.

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

SecureONE is a privileged access management (PAM) software designed to help businesses distribute and manage user access across multiple departments. IT teams can secure critical data and verify the identity of end users through LDAP and Active Directory integration.Read more about SecureONE
Pros and Cons from SecureONE users
No pros & cons found
Flowmon Anomaly Detection System logo

Intelligent Detection Engine for Network Anomalies

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

4

Description

Flowmon Anomaly Detection System is an advanced solution capable of analyzing network traffic to identify anomalies and detect malicious behavior.Read more about Flowmon Anomaly Detection System
Pros and Cons from Flowmon Anomaly Detection System users
No pros & cons found
Illumio logo

Cloud security solutions to protect networks

learn more
Reviews Sentiment
 
5
Positive Reviews
Functionality
Ease of Use

5

Features

5

Description

Illumio is a zero trust network security company that provides advanced cloud security solutions to protect networks and secure the cloud. Their Zero Trust Segmentation Platform visualizes communication between workloads and devices, sets granular segmentation policies to control communications, and isolates high-value assets to stop breaches and ransomware from spreading across hybrid IT environments.Read more about Illumio
Pros and Cons from Illumio users
No pros & cons found
Cisco ACI logo

Secure & comprehensive SDN solution for modern data centers

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

4

Features

4

Description

Cisco ACI is a secure and comprehensive software-defined networking (SDN) solution built for modern data centers. Designed to simplify the application deployment lifecycle, this solution enables IT teams to easily move workloads across multi-fabric and multi-cloud networks. Cisco ACI can proactively identify network performance issues and protect from potential risks.Read more about Cisco ACI
Pros and Cons from Cisco ACI users
No pros & cons found
Network Detection and Response logo

Network visibility, threat detection and forensic analysis

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

5

Features

4

Description

Network Detection and Response delivers network visibility, threat detection and forensic analysis of suspicious activities. It accelerates the ability for organizations to respond to and identify future attacks before they become serious events.Read more about Network Detection and Response
Pros and Cons from Network Detection and Response users
No pros & cons found
Defend logo

Full-day, real-time identity—without extra hardware.

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

3

Features

5

Description

Plurilock DEFEND, an enterprise continuous authentication platform that confirms user identity or alerts security teams to detected intrusions in real-time, as regular work is carried out, without otherwise inconveniencing or interrupting users.Read more about Defend
Pros and Cons from Defend users
No pros & cons found
BelkaVPN logo

BelkaVPN is designed to help businesses securely access web

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

4

Features

4

Description

BelkaVPN proxy - is a fast VPN proxy service that ensures internet privacy and security for everyone. Unblock media streaming, protect your data, shun away snoopers and hackers, and enjoy the full palette of online experiences with our VPN extension.Read more about BelkaVPN
Pros and Cons from BelkaVPN users
No pros & cons found
PureDome logo

Secure. Reliable. Quick.

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

4

Features

3

Description

PureDome offers a comprehensive network security solution with encrypted connections, dedicated IPs, and device posture checks. Its 24/7 support and seamless integration help businesses efficiently manage access permissions and fortify against cyber threats.Read more about PureDome
Pros and Cons from PureDome users
No pros & cons found
Trellix Network Security logo

Network security platform for detecting & resolving threats

learn more
Reviews Sentiment
 
 
 
1-2
3-4
5
Positive Reviews
Functionality
Ease of Use

3.7

Features

3.7

Description

Trellix Network Security is an on-premise and cloud-based network security platform, which helps midsize to large businesses detect and resolve cyber threats or advanced, targeted, and other evasive attacks using Multi-Vector Virtual Execution (MVX), artificial intelligence (AI), and machine learning (ML) technologies. Administrators can receive alerts about critical issues and prioritize or contain targeted and newly discovered attacks based on real-time evidence. Read more about Trellix Network Security
Pros and Cons from Trellix Network Security users
No pros & cons found
INETCO Insight logo

Transaction monitoring solution

learn more
Reviews Sentiment
 
3-4
Positive Reviews
Functionality
Ease of Use

3

Features

2

Description

INETCO Insight is an independent real-time payment network intelligence platform designed to meet the specific needs of the payments industry, including banking, retail and payments industries.Read more about INETCO Insight
Pros and Cons from INETCO Insight users
No pros & cons found