GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Cybersecurity Software. Filters help you narrow down the results to find exactly what you’re looking for.
ConnectWise Fortify is a cybersecurity & monitoring software that helps businesses identify cyber risks, resolve issues, and manage recovery operations. Administrators can monitor user accounts and endpoints to track security gaps, identify reconfiguration requirements, and define alert thresholds.
Read more about ConnectWise Cybersecurity Management
Perimeter 81 is a leading network cybersecurity solution offering secure remote access and network capabilities managed over a multi-tenant cloud and highly scalable for organizations worldwide.
Read more about Perimeter 81
Perch Security is a threat detection and response management software designed to help enterprises create, launch, and manage cybersecurity programs. The platform enables organizations to identify potential threats and malicious activities across networks and connected devices via a unified portal.
Read more about Perch Security
ESET Endpoint Security is a network monitoring solution, which helps businesses manage processes for detecting threats, blocking targeted attacks, preventing data breaches & providing protection against ransomware. It lets users monitor behavior of malicious processes and decloak memory segments.
Read more about ESET Endpoint Security
Heimdal Threat Prevention is a DNS, HTTP, and HTTPS filtering solution that enhances your pre-existing antivirus. Proprietary DarkLayer GUARD and VectorN Detection technologies power it to stop ransomware, data leaks, and network malware in their tracks.
Read more about Heimdal Threat Prevention
The layered design of the NordLayer solution is developed to collide cloud-based networking within SASE, and Zero Trust defined capabilities to seamlessly adapt to businesses of all sizes and adhere to the most comprehensive cybersecurity requirements.
Read more about NordLayer
Phishing Tackle is a cloud-based cyber security platform, which assists not-for-profit, public, and private organizations with simulated phishing and security awareness training. Key features include attack simulation, customizable content, knowledge testing and campaign statistics.
Read more about Phishing Tackle
SpamTitan is an anti-spam email security solution that identifies & blocks phishing, malware, spear phishing, malicious and spam emails to protect business email, with multi-layered analysis and authentication. 5 Star product with great pricing and amazing front line support
Read more about SpamTitan
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.
Read more about Dark Web ID
Ideally suited for mid-market to enterprise organizations, Infocyte offers agentless install so you can identify, investigate and respond to sophisticated fileless, in-live memory threats with advanced historical forensic analysis to dramatically reduce dwell time.
Read more about Infocyte
Netacea Bot Management is a cloud-based solution which protects mobile applications, websites & application programming interfaces (APIs) from various online threats such as scraping, credential stuffing, & more. An Intent Analytics engine uses machine learning to distinguish bots from humans.
Read more about Netacea Bot Management
Splunk Enterprise is a cloud-based platform designed to assist businesses with big data management and analysis of machine data. Key features include data visualization, performance metrics, data collection, real-time search, indexing, KPI tracking, reporting, and monitoring.
Read more about Splunk Enterprise
ManageEngine Firewall Analyzer is a log analysis software designed to help businesses in the finance, government, healthcare, education, IT, manufacturing, legal, and other sectors gain insights into activities and bandwidth usage across networks. Key features of the platform include change management, VPN and proxy server monitoring, log...
Read more about ManageEngine Firewall Analyzer
Avast Small Office Protection is a cybersecurity software designed to help small businesses ensure protection from cyber-attacks and ransomware. The application enables organizations to secure various devices including laptops, mobiles, PCs, and tablets and block viruses, malware, spyware, and other online threats in real-time.
Read more about Avast Small Office Protection
Avast Business Cloudcare is a cloud-based security solution designed for small and midsize businesses (SMBs) that provides advanced protection against cyber threats. It features proactive malware detection, which monitors your network activities in real time to identify threats at an early stage of infection. The software also allows users to...
Read more about Avast Business CloudCare
Web.com is an online marketing service that equips small businesses with features such as website design, marketing to attract, convert qualified prospects and website traffic and marketing Results. It combines professional web design, on-demand website modifications and online marketing services.
Read more about Web.com
AwareGO is a cloud-based security awareness training platform that allows businesses to provide eLearning content to employees on cybersecurity, compliance, and other security-related topics. Users can create, assign, and track concise training campaigns from one platform.
Read more about AwareGO
ManageEngine PAM360 empowers enterprises looking to stay ahead of this growing risk with a robust privileged access management (PAM) program that ensures no privileged access pathway to mission-critical assets is left unmanaged, unknown, or unmonitored.
Read more about ManageEngine PAM360
Cymulate is a cybersecurity software that helps businesses conduct attack simulations to identify and remediate security gaps across web-apps, emails, and endpoints. Staff members can generate reports and evaluate cyber risks using multiple methodologies, such as NIST, Microsoft DREAD, and CVSS V3.
Read more about Cymulate
Revenera Compliance Intelligence is designed to help software providers detect software license compliance infringements. It enables IT professionals to gain actionable insights into the unpaid use of applications, create revenue generation strategies, and capture leads via a unified platform.
Read more about Revulytics Compliance Intelligence
Endpoint Detection and Response is an endpoint protection software designed to help managed service providers (MSPs) automatically detect and mitigate zero-day attacks and fileless threats. Administrators can create custom policies to protect the system against ransomware attacks and restore data in real-time.
Read more about Endpoint Detection and Response
Key Manager Plus helps enterprises gain complete visibility and control over their cryptographic environments. It enables IT and PKI admins to perform periodic discovery of SSH keys, SSL/TLS certificates, and PGP keys, build a central inventory, request, acquire, deploy, rotate, renew, and track.
Read more about ManageEngine Key Manager Plus
Alyne helps CISOs, Chief Risk Officers, Data Protection Officers and other decision-makers confidently implement compliance requirements, thoroughly assess & manage risk, gain detailed risk analytics, and make risk-aware decisions for their organization – helping to effectively reduce risk exposure.
Read more about Alyne
Jamf Threat Defense protects against mobile endpoints including iOS, iPadOS, and Android threat vectors through a highly effective mobile application and prevents in-network threats in real-time.
Read more about Jamf Threat Defense
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.
Read more about Malwarebytes for Business
Google Cloud Platform is a modular-based platform providing multiple build and scale services to businesses of any size within any industry. It offers tools for document storage, data warehousing, security key enforcement, app creation, API management, AI and machine learning, live chat, and more.
Read more about Google Cloud Platform
Bitdefender GravityZone is a cloud-based security and risk analytics platform designed to help businesses of all sizes detect, respond to, and prevent cybersecurity threats. It offers over 30 security modules, which let users streamline endpoint detection and response and risk analytics.
Read more about Bitdefender GravityZone
Malwarebytes for Teams is a behavior-based antivirus platform that provides advanced threat detection and prevention capabilities against malware,
ransomware, and hackers.
Read more about Malwarebytes for Teams
Astra Security is a cybersecurity software that comes with a website firewall and malware scanner to protect against malware, backdoor, SEO spam, OWASP Top 10 vulnerabilities and any other hacking attempts.
Read more about Astra Security
DNSFilter is a cybersecurity management software that enables enterprises, K-12 schools, and universities to detect online security threats and malware using artificial intelligence (AI) technology, machine learning (ML) algorithms, and content filtering capabilities.
Read more about DNSFilter
Acronis Cyber Protect Cloud is a unique integration of backup with comprehensive anti-malware protection and endpoint management tools. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down.
Read more about Acronis Cyber Protect Cloud
BlackBerry Protect is a cloud-based endpoint protection platform designed to help enterprises detect threats and protect devices from data breaches, grayware, and fileless malware attack. Features include role-based access control, real-time statistics, troubleshooting, and script whitelisting.
Read more about BlackBerry Protect
Lookout is an integrated SASE solution that provides endpoint-to-cloud security, enabling remote teams to work from any location while protecting business data. It provides actionable insights that help businesses proactively identify potential threats such as ransomware, phishing attacks, and offensive web content. Lookout is designed to...
Read more about Lookout
Incapsula is a cloud-based web application security platform to optimize, protect and enhance website performance. It allows website traffic to route through Incapsula’s global network of high-powered servers that accelerate outgoing traffic and optimize it for faster load times.
Read more about Incapsula
Guardio is a Google Chrome extension designed to help businesses provide protection against malware, phishing attacks, and identity theft and remove pop-up messages from the browser. It lets employees prevent unauthorized users from accessing web browsers and remove existing malware from devices via a unified platform.
Read more about Guardio
WP Cerber Security is a cybersecurity software designed to help businesses scan WordPress websites for spam, malware, and hack attempts. The application uses inspection algorithms and a bot engine to screen incoming traffic requests for malicious activities, identify threat patterns, and automatically block them from entering the network.
Read more about WP Cerber Security
SafeDNS is a DNS-based internet security and web filtering service designed to help businesses, educational institutions, and nonprofits protect their network against malware, phishing, inappropriate content, and more whilst maintaining compliance with statutory regulations.
Read more about SafeDNS
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.