App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

iPhone Cybersecurity Applications - Page 2

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

74 software options

Sponsored

1 filter applied



Integrated with


Pricing model




User rating


Personalize your search

Any industry

Any business size

DriveStrike logo
4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
Libraesva Email Archiver logo
4.9
(14)

Secure Email Archiving

learn more
Protect business information, simplify compliance, and improve efficiency by using Libraesva Email Archiver to automatically save a copy of every email sent or received by businesses. Libraesva's Resilient Archive technology stores every email in highly secure and digitally signed archives.

Read more about Libraesva Email Archiver

Users also considered
ManageEngine Password Manager Pro logo
4.4
(23)

Privileged Password Manager for Enterprises

learn more
Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises.

Read more about ManageEngine Password Manager Pro

Users also considered
6clicks logo
4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
Beyond Identity logo
4.8
(12)

Unphishable Multi-Factor Authentication

learn more
Unphishable, passwordless, multi-factor authentication to eliminate credential attacks and secure your workforce and customer identities.

Read more about Beyond Identity

Users also considered
Acronis Cyber Protect Home Office (formerly Acronis True Image) logo
4.3
(21)

Data protection solution for files, apps, and systems.

learn more
Acronis Cyber Protect Home Office: backup & anti-malware in a single integrated solution that provides a better protection at a fraction of the cost. Safeguard your digital life from threats, backup and recover files, OSs, and devices from anywhere.

Read more about Acronis Cyber Protect Home Office (formerly Acronis True Image)

Users also considered
Privatise logo
4.7
(11)

One click cloud firewall for remote & distributed workforces

learn more
One click network security solution/SASE for in-office, distributed work, & remote work.

Read more about Privatise

Users also considered
Radware Bot Manager logo
4.8
(9)

Automated bot detection for websites and mobile apps

learn more
Radware Bot Manager is an automated bot detection solution that is suitable for websites and mobile applications. It is suitable for businesses in various industries, including e-commerce, financial services, travel, media, and others. With this solution, users gain granular visibility and detailed insights related to malicious bot traffic. Radware Bot Manager is designed to help businesses protect online assets, brand reputation, user experience, and revenue.

Read more about Radware Bot Manager

Users also considered
IRONSCALES logo
4.7
(7)

We catch the phish that others miss!

learn more
We ensure your inboxes are uncompromised and your team is unburdened.

Read more about IRONSCALES

Users also considered
CyberCompass logo
4.8
(6)

Cloud-based compliance and risk management solution

learn more
CyberCompass is cloud-based compliance & risk management solution designed to help small to medium firms manage, assess, and remediate cyber risks. It allows users to quickly identify vulnerabilities/risks across employee processes, vendor channels, or technology, & ensure compliance with protocols.

Read more about CyberCompass

Users also considered
Netsurion logo
3.6
(23)

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
ComplyAssistant logo
5.0
(5)

GRC software/services solutions for any organization.

learn more
ComplyAssistant offers Governance, Risk, and Compliance (GRC) software and service solutions to healthcare institutions of all sizes.

Read more about ComplyAssistant

Users also considered
Portnox CLEAR logo
4.1
(11)

Network security and access control software

learn more
Portnox’s cloud-native network & endpoint security essentials enable resource-constrained IT teams to address today’s most pressing security challenges.

Read more about Portnox CLEAR

Users also considered
Acronis Cyber Protect logo
4.7
(6)

Integrated data protection and cybersecurity in one solution

learn more
Acronis Cyber Protect brings together data protection and cybersecurity in one, easy-to-use solution.

Read more about Acronis Cyber Protect

Users also considered
Feedzai logo
4.7
(6)

Cloud-based financial risk assessment and management tool

learn more
Feedzai is a cloud-based risk management software that helps businesses leverage artificial intelligence (AI) technology and machine learning capabilities to detect cyber threats or risks across financial transactions or accounts. Supervisors can conduct risk assessments, monitor the status of transactions as ‘fraud’ or ‘not fraud’, and analyze behavioral biometrics, network, and device data.

Read more about Feedzai

Users also considered
CyberSmart logo
5.0
(4)

Cybersecurity, automated compliance, GDPR readiness for SMBs

learn more
CyberSmart is a cybersecurity solution that identifies system vulnerabilities on all devices, helps prevent cyberattacks, and provides continuous compliance while preparing for IASME Certification. This solution provides 24/7 device monitoring, vulnerability scanning, remote auditing, and more.

Read more about CyberSmart

Users also considered
Appgate SDP logo
5.0
(4)

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Banyan Security logo
4.3
(4)

Universal zero trust network access

learn more
Banyan Security is zero-trust remote access that enables fast, easy provisioning of user-to-application segmentation, giving users and developers passwordless, one-click access to complex infrastructure and applications from anywhere, without relying on network-centric legacy VPNs.

Read more about Banyan Security

Users also considered
Timus logo
5.0
(2)

cyber security, network management, zero trus, sase

learn more
Timus combines secure, zero-trust network access with an intelligent cloud firewall that adapts in real time.

Our platform helps companies orchestrate secure access while protecting the client network against cyberattacks.

Read more about Timus

Users also considered
Twingate logo
5.0
(2)

Secure work, anywhere

learn more
Twingate makes it easy for organizations to adopt a Zero Trust architecture, replacing corporate VPNs with a more secure and usable solution.

Read more about Twingate

Users also considered
TEHTRIS XDR Platform logo
4.3
(3)

Consolidate all your cyber solutions in a single console

learn more
Unify all your cybersecurity tools in a single console for hyperautomated real-time remediations, without human interaction. Within the TEHTRIS XDR Platform, you will find an EDR, MTD, SIEM, Honeypots, NTA, DNS Firewall, Cloud security and Container security.

Read more about TEHTRIS XDR Platform

Users also considered
ManageEngine PAM360 logo
5.0
(1)

Complete privileged access security for enterprises

learn more
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.

Read more about ManageEngine PAM360

Users also considered
Venn logo
5.0
(1)

Secure Remote Workspace

learn more
Venn secures remote work on any unmanaged or BYOD computer with a radically simplified and less costly solution than VDI.

Read more about Venn

Users also considered
Uniqkey logo
5.0
(1)

Best Password Manager for Business

learn more
Uniqkey is a European-based password and access management solution tailored for businesses. Engineered with IT professionals in mind and designed for an effortless user experience, our platform streamlines password management while offering centralized access control for administrators.

Read more about Uniqkey

Users also considered
remote.it logo
(0)

Zero-trust network connectivity as a service

learn more
remote.it delivers zero-trust network connectivity as a service, revolutionizing remote access and network management. It connects without public IP addresses, survives network changes, and minimizes attack surfaces. With flexible deployment options and a wide range of applications, it's a robust VP.

Read more about remote.it

Users also considered