Compare 142 Cybersecurity Tools Across 17 Categories

Compare pricing, features, and deployment options across 17 cybersecurity categories.

142 Products|1055+ Alternatives|17 Categories

Featured

SplitSecure logo

SplitSecure

Featured

SplitSecure uses Shamir Secret Sharing to split credentials across multiple devices you control — no single point of compromise, no vendor dependency. A fundamentally different approach to secrets management.

Browse Categories

Secrets Management

11 tools

Tools for managing API keys, passwords, certificates, and other sensitive credentials across your infrastructure.

Akeyless logoSplitSecure logoHashiCorp Vault logoAWS Secrets Manager logo+7
Explore category →

SIEM & Security Analytics

9 tools

Security information and event management platforms for log analysis, threat detection, and incident response.

Splunk logoElastic Security logoSumo Logic logoDatadog Security logo+5
Explore category →

PAM & Identity

10 tools

Privileged access management and identity governance tools for controlling and auditing access to critical systems.

CyberArk logoSplitSecure logoBeyondTrust logoDelinea logo+6
Explore category →

Endpoint & EDR

9 tools

Endpoint detection and response platforms for protecting devices against malware, ransomware, and advanced threats.

CrowdStrike logoSentinelOne logoMicrosoft Defender for Endpoint logoVMware Carbon Black logo+5
Explore category →

Security Data Pipeline

10 tools

Tools for routing, transforming, and optimizing security data flows across your infrastructure.

Cribl logoMezmo logoObservo AI logoTenzir logo+6
Explore category →

SASE & Zero Trust

9 tools

Secure access service edge and zero trust platforms for securing distributed workforces and cloud applications.

Zscaler logoNetskope logoCloudflare Zero Trust logoPalo Alto Prisma Access logo+5
Explore category →

Firewall & NGFW

9 tools

Next-generation firewall platforms for network security, intrusion prevention, and application-layer protection.

Palo Alto Networks logoFortinet FortiGate logoCisco Firepower logoCheck Point Quantum logo+5
Explore category →

Identity & Access Management

9 tools

Identity and access management platforms for single sign-on, multi-factor authentication, and lifecycle management.

Okta logoMicrosoft Entra ID logoPing Identity logoOneLogin logo+5
Explore category →

Cloud Security & CNAPP

9 tools

Cloud-native application protection platforms for securing cloud workloads, containers, and infrastructure.

Wiz logoOrca Security logoPrisma Cloud logoLacework logo+5
Explore category →

Vulnerability Management

9 tools

Vulnerability scanning and management platforms for identifying, prioritizing, and remediating security weaknesses.

Tenable logoQualys VMDR logoRapid7 InsightVM logoCrowdStrike Falcon Spotlight logo+5
Explore category →

Email Security

9 tools

Email security platforms for protecting against phishing, BEC, malware, and other email-borne threats.

Proofpoint logoMimecast logoMicrosoft Defender for Office 365 logoAbnormal Security logo+5
Explore category →

Data Security & Governance

9 tools

Data security and governance platforms for discovering, classifying, and protecting sensitive data across your organization.

Varonis logoMicrosoft Purview logoNetwrix logoSpirion logo+5
Explore category →

Application Security

9 tools

Application security testing tools for finding and fixing vulnerabilities in code, dependencies, and containers.

Snyk logoSonarQube logoCheckmarx logoVeracode logo+5
Explore category →

Email Encryption

8 tools

Email encryption platforms for protecting sensitive communications with end-to-end encryption, DLP, and compliance.

Paubox logoVirtru logoZix (OpenText) logoEgress logo+4
Explore category →

Password Management

9 tools

Enterprise password managers for centralized credential storage, secure sharing, and admin controls across your organization.

Okta logoMicrosoft Entra ID logoPing Identity logoOneLogin logo+5
Explore category →

Infrastructure Access

10 tools

Infrastructure access platforms for securing and auditing access to servers, databases, Kubernetes, and cloud resources.

CyberArk logoSplitSecure logoBeyondTrust logoDelinea logo+6
Explore category →

Network Detection & Response

1 tools

AI-driven network traffic analysis platforms for detecting lateral movement, insider threats, and advanced attacks across hybrid environments.

Darktrace logo
Explore category →