GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Computer Security Software. Filters help you narrow down the results to find exactly what you’re looking for.
PerimeterX offers a suite of products, Bot Defender, Code Defender, and Page Defender to protect businesses from online attacks. It uses behavioral fingerprinting, machine learning, and predictive analytics to recognize real users while blocking automated attacks. The suite can protect against web scraping, carding, browser extensions, digital...
Read more about PerimeterX
iPrism Web Security is a secure web gateway designed to help businesses detect threats and secure against malware attacks. The platform enables managers to classify URLs, identify botnets, and protect the system from advanced persistent threats (APTs).
Read more about iPrism Web Security
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration...
Read more about RedShield
CrowdSec is an open-source and collaborative multiplayer firewall. Analyze behaviors, respond to attacks & share signals across the community. Security should be available to everyone. We make it happen. For free.
Read more about Crowdsec
Verimatrix Code Shield solution injects powerful, automated, and self-defending security directly into your app. It secures the app from being modified and can be easily implemented at any stage of the development process.
Read more about Verimatrix Code Shield
DIARIO is capable of scanning documents without them ever leaving the perimeter of the company or user, using an artificial intelligence engine with 100% Telefónica TECH technology. It accepts all types of different documents, from Microsoft Word to Adobe Acrobat and more.
Read more about DIARIO
Securden is an endpoint protection software designed to help businesses of all sizes control applications, privileged access, and remote endpoints. Administrators can utilize the password vault to store, manage, and share certificates and secured keys.
Read more about Securden
AdsPower is an anti-association independent browser environment provider. The centralized platform is mainly for eCommerce marketers who require untraceable multi-account browser tools to set up, log in, and manage multiple social media profiles or other online accounts without leaving fingerprints.
Read more about AdsPower
FortMesa provides cybersecurity programs for organizations without a security professional on staff. It allows users to build their organization's cyber risk management and security operations capability using simple and easy to use team-based workflows. Map to a cyber standard and build controls
Read more about FortMesa
Cybersprint is a security platform that allows companies to visualize their digital footprint and identify online access points to their business systems. The software searches all possible public entrances via the internet: social media, IoT, mobile apps, and the dark web.
Read more about Cybersprint
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments,...
Read more about Trend Micro Cloud One
GetSecured is a data protection program designed to help businesses detect vulnerabilities and data breaches. The platform acts as a comprehensive security scanning tool to find breached data, web app/AWS cloud vulnerabilities, exposed servers, and compliance issues.
Read more about GetSecured
BroShield is a computer security and parental control software that helps individuals and families block inappropriate sites, schedule screen times, restrict activities, receive suspicious activity alerts, and more from within a unified platform. It allows users to monitor activities in real-time, restrict adult websites, set up web firewalls,...
Read more about BroShield
Risk Assistant is a cloud-based cybersecurity solution that helps businesses of all sizes prevent financial losses. It provides effective defensive measures to protect a business by evaluating and tracking risk levels.
Read more about Risk Assistant
Adaptive SSO Authentication & FIM Solution
Hitachi ID's all credential self-service identity authentication management for passwords, security questions, smart cards, tokens, etc. Request a demo.
Read more about Hitachi ID Bravura Pass
Prove's Phone-Centric Identity platform helps companies mitigate fraud while accelerating revenue and reducing OPEX across mobile, desktop, tablet, contact center, and in-store channels.
Read more about Prove
Protect computers and devices in your IT network from malware by removing administrative privileges and limiting the actions that can be performed by a standard user. Eliminate standing privileges & enforce JIT access. Control application usage and track activities using comprehensive audit trails.
Read more about Windows Privilege Manager
Secure Remote Worker addresses the challenges faced by BPOs & Contact Centers enabling them to create a secure and compliant remote working environment that allows them to scale faster.
Read more about Secure Remote Worker
The ASPIA platform enables automated and simplified security assessment and vulnerability management. Using ASPIA, enterprise security workflows can be automated and orchestrated to measure and improve efficiency and accuracy.
Read more about ASPIA
Blacklock is an award-winning self-service penetration testing platform that enables businesses to perform security testing in a cost-effective, scalable and continuous manner. The platform automates several stages of the traditional penetration testing cycle, introducing an agile penetration testing approach and making security testing accessible...
Read more about Blacklock
tbIAM is a cloud-based identity access management (IAM) solution that helps businesses in IT, finance, healthcare, retail, HR, manufacturing, and other industries manage security operations using single sign-on (SSO), multi-factor authentication (MFA), and other measures. It lets staff members utilize the self-service portals to manage profiles...
Read more about tbIAM
iBoostUp will quickly and easily make your Mac perform better. Whether it’s running a little slow, using too much space, or if you just want to be sure it’s safe from malware and viruses, iBoostUp is the solution for you.
Read more about iBoostUp
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.
Read more about Versio.io
IObit Uninstaller is software that removes unwanted programs, plugins, and suspicious files from computers, allowing for safer browsing and improved device performance. The system also offers an intelligent scan that performs a thorough and optimized cleanup.
Read more about IObit Uninstaller
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.