---
description: Page 3 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Network Security Software - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Security Software](https://www.softwareadvice.co.uk/directory/4170/network-security/software) > [Page 3](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3)

# Network Security Software

Canonical: https://www.softwareadvice.co.uk/directory/4170/network-security/software

Page: 3 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4)

-----

## Products

1. [Lookout](https://www.softwareadvice.co.uk/software/379029/lookout) — 4.7/5 (69 reviews) — Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business...
2. [Corner Bowl Server Manager](https://www.softwareadvice.co.uk/software/186358/corner-bowl-server-manager) — 4.8/5 (67 reviews) — Corner Bowl Server Manager is a SIEM, compliance software, an Uptime Monitor and a Server Monitor software tool for I...
3. [CylanceENDPOINT](https://www.softwareadvice.co.uk/software/73251/cylanceprotect) — 4.6/5 (65 reviews) — CylancePROTECT is a cloud-based solution that helps businesses of all sizes manage processes related to the entire th...
4. [BrowseControl by CurrentWare](https://www.softwareadvice.co.uk/software/194308/browsecontrol) — 4.7/5 (63 reviews) — With BrowseControl web filtering and application blocking software by CurrentWare you can prevent the launching of ap...
5. [Orca Security](https://www.softwareadvice.co.uk/software/432007/orca-security) — 4.8/5 (60 reviews) — Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud est...
6. [Adguard](https://www.softwareadvice.co.uk/software/470095/Adguard) — 4.6/5 (56 reviews) — AdGuard is a network security solution that comes with all features available in the personal version, plus the optio...
7. [OpenText Core DNS Protection](https://www.softwareadvice.co.uk/software/222460/secureanywhere-dns-protection) — 4.5/5 (55 reviews) — OpenText™ Core DNS Protection is a cloud-native solution that filters every DNS request -- from browsers, app, or bac...
8. [CrowdStrike](https://www.softwareadvice.co.uk/software/135499/crowdstrike) — 4.7/5 (55 reviews) — CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus pr...
9. [UserLock](https://www.softwareadvice.co.uk/software/296235/userlock) — 4.7/5 (55 reviews) — UserLock brings modern identity and access management (IAM) to on-premises and hybrid Active Directory environments. ...
10. [ConnectWise SIEM](https://www.softwareadvice.co.uk/software/118233/perch-security) — 4.6/5 (52 reviews) — ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to...
11. [Symantec Enterprise Cloud](https://www.softwareadvice.co.uk/software/414489/symantec-enterprise-cloud) — 4.5/5 (52 reviews) — Symantec Endpoint Encryption is an encryption solution that allows businesses to protect sensitive information by enc...
12. [Zscaler](https://www.softwareadvice.co.uk/software/241644/zscaler-internet-access) — 4.3/5 (48 reviews) — Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and...
13. [Cato Networks Suite](https://www.softwareadvice.co.uk/software/228235/cato-networks-suite) — 4.7/5 (42 reviews) — Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other asse...
14. [Workspace ONE](https://www.softwareadvice.co.uk/software/445973/workspace-one) — 4.6/5 (40 reviews) — Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage...
15. [Xcitium Endpoint Detection & Resonse](https://www.softwareadvice.co.uk/software/345400/comodo-endpoint-security-manager) — 4.3/5 (39 reviews) — Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the c...
16. [runZero](https://www.softwareadvice.co.uk/software/431387/runzero) — 4.9/5 (37 reviews) — runZero provides asset inventory and network visibility for security and IT teams. You can discover your entire inven...
17. [Blackpoint MDR](https://www.softwareadvice.co.uk/software/318796/blackpoint) — 4.8/5 (36 reviews) — Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was establ...
18. [Lightspeed Filter](https://www.softwareadvice.co.uk/software/183406/lightspeed-filter) — 4.6/5 (36 reviews) — Lightspeed Filter is the best-in-class solution that protects students from harmful material to ensure their online s...
19. [XG Firewall](https://www.softwareadvice.co.uk/software/149083/xg-firewall) — 4.5/5 (35 reviews) — XG Firewall is a network security solution that helps businesses streamline endpoint detection and response, firewall...
20. [SafeDNS](https://www.softwareadvice.co.uk/software/167341/safedns) — 4.7/5 (35 reviews) — SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection...
21. [Acunetix](https://www.softwareadvice.co.uk/software/77622/acunetix) — 4.4/5 (35 reviews) — Acunetix is a cloud-based digital security solution that assist security analysts with data protection, manual testin...
22. [REVE Antivirus](https://www.softwareadvice.co.uk/software/366146/reve-antivirus) — 4.4/5 (34 reviews) — REVE Antivirus is a computer and network security solution for home users and enterprises. Turbo scan is a quick scan...
23. [Qualys Cloud Platform](https://www.softwareadvice.co.uk/software/262425/qualysguard-enterprise) — 4.0/5 (33 reviews) — Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize t...
24. [Lockwell](https://www.softwareadvice.co.uk/software/411863/lockwell) — 4.7/5 (32 reviews) — Go from zero to secure in minutes—with a platform that’s smart, supportive, and built for teams with limited resource...
25. [PhishingBox](https://www.softwareadvice.co.uk/software/270218/phishingbox) — 4.7/5 (31 reviews) — PhishingBox is a cloud-based security awareness training platform that helps small to large organizations conduct sim...

-----

Page: 3 / 11\
Prev: [Previous page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.uk/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.uk/directory/4528/security/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.uk/directory/4307/network-monitoring/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.uk/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.uk/directory/4286/vulnerability-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.uk/directory/4170/network-security/software)
- [All Categories](https://www.softwareadvice.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Software Advice helps businesses in the UK find the best software with confidence. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.uk","url":"https://www.softwareadvice.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@type":"Organization","@id":"https://www.softwareadvice.co.uk/#organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"SoftwareAdvice UK","url":"https://www.softwareadvice.co.uk/","@type":"WebSite","@id":"https://www.softwareadvice.co.uk/#website","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Security Software","description":"Page 3 - Discover the best Network Security Software for your organisation. Compare top Network Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3","about":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#webpage","mainEntity":{"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#itemlist"},"isPartOf":{"@id":"https://www.softwareadvice.co.uk/#website"},"inLanguage":"en-GB","publisher":{"@id":"https://www.softwareadvice.co.uk/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Network Security Software - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Lookout","position":1,"description":"Lookout is an integrated endpoint security and secure access service edge (SSE) solution designed to protect business data. It provides unified insights to help businesses identify threats, such as mobile phishing and ransomware, and implement security policies. Lookout can increase visibility and provide protection for teams who are working remotely while using mobile devices and cloud technology.\n\nLookout works as a single security platform that protects data from endpoints to the cloud, without the need for multiple standalone solutions. It includes real-time protection for phishing attacks, custom web filtering for inappropriate web content, data protection in email, SaaS, and IaaS applications, plus more. \n\nPricing information is provided on request by Lookout. Support is available via an FAQ page, online portal, and other resources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/764d1f7c-5498-40f5-8da4-941ec7ddb41c.png","url":"https://www.softwareadvice.co.uk/software/379029/lookout","@type":"ListItem"},{"name":"Corner Bowl Server Manager","position":2,"description":"Corner Bowl Server Manager is a SIEM, compliance software, an Uptime Monitor and a Server Monitor software tool for IT professionals.  Server Manager includes the following components:\n\nEvent Log Manager - an on-premise log management software tool designed to help IT professionals monitor, save and analyze log files from a central location.  Save log file entries to SQL Server, MySQL, SQLite and Corner Bowl’s own file format. Backup raw Windows EVTX files and Linux/Unix Audit Logs to a central file server.  Generate reports to fulfill PCI/DSS, HIPAA, SOX, GDPR and other compliance requirements. Monitor Windows Account Lockouts in real-time.\n\nDisk Monitor - an enterprise Free Disk Space, Ransomware Monitoring and File Access Permissions Monitoring Software Tool for IT professionals.  Monitor disk space on all your servers with just a few clicks.  Continually monitor Ransomware attacks using our File Integrity Monitor.  Fulfill compliance requirements with our detailed recursive Directory and File Access Permissions Reports.   Monitor directory sizes, file activity, automatically delete temporary files and much more.  Supports Windows, Linux and other Unix flavors using Windows Shares, SFTP/SSH and FTP/S.\n\nInternet Server Monitor - an Uptime Monitor software tool that minimizes downtime by proactively notifying IT professionals when network and application performance has degraded below acceptable thresholds or have completely failed. Internet Server Monitor includes over 25 different monitors including: Ping, CPU, Memory, DNS, DNS Blacklist, SSL Certificates, Database, Domain Expiration, Email, SFTP/FTP/FTPS, Network Speed, Performance Counter, Windows Services, SNMP, Websites and much more.\n\nTriggerable actions include: Sending emails, Microsoft Teams notifications, adding Windows Firewall Rules, adding IIS IP Address Restriction Rules, SMS messages, launching scripts and executables, starting, stopping and restarting Windows Services and processes, firing SNMP traps, generating HTML, PDF, CSV and text file status and reports, writing Windows Event Log Entries, sending Syslog Messages and displaying desktop notifications on any remote Management Console.\n\nClient/Server architecture enables you to manage your entire network from any Windows Workstation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e74dd762-d981-472a-8ea7-927a4ae4f7c4.png","url":"https://www.softwareadvice.co.uk/software/186358/corner-bowl-server-manager","@type":"ListItem"},{"name":"CylanceENDPOINT","position":3,"description":"CylancePROTECT is a cloud-based solution that helps businesses of all sizes manage processes related to the entire threat lifecycle by preventing zero-day attacks using various security controls. Key features include web threat management, application security, real-time monitoring, vulnerability protection, and device management. \n\n\nThe artificial intelligence (AI)-enabled solution allows teams to inspect applications for detecting threats and maintain control over scripts across multiple devices. CylancePROTECT provides protection against memory threats by identifying malicious executables and resolve fireless attacks using preventive responses. Additionally, the centralized platform enables enterprises to manage USB device usage for prohibiting the use of unauthorized devices. \n\n\nCylancePROTECT can also be deployed in an on-premise environment. Pricing is available on monthly subscriptions and support is extended via documentation and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d7a401c0-0e30-432e-8398-a18d8750eb74.png","url":"https://www.softwareadvice.co.uk/software/73251/cylanceprotect","@type":"ListItem"},{"name":"BrowseControl by CurrentWare","position":4,"description":"With BrowseControl web filtering and application blocking software by CurrentWare you can prevent the launching of applications and control what websites can be accessed based on URL, IP address, and web content category. \n\nWhen a blocked website is accessed you can display a custom warning message, provide your users the option to request access to the blocked site, or redirect them to a new web page such as your organization’s acceptable use policy.\n\nBrowseControl can also:\n- Limit internet access to a specific list of trusted websites and intranet portals\n\n- Prevent users from launching specific applications such as cloud storage apps, games, and software with limited floating licenses\n\n- Schedule unique application and website access permissions to allow more flexibility during off-hours times such as breaks and weekends\n\n- Block network ports\n\n- Prevent the uploading or downloading of specific file types such as executables and ZIP files","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/31d58ab1-efdc-4ff7-8441-e7247df3250e.png","url":"https://www.softwareadvice.co.uk/software/194308/browsecontrol","@type":"ListItem"},{"name":"Orca Security","position":5,"description":"Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform  that provides security teams with 100% coverage of their entire cloud environment.\n\nInstead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dc4da2bc-b63d-49f4-a76e-5b0814fe7d80.jpeg","url":"https://www.softwareadvice.co.uk/software/432007/orca-security","@type":"ListItem"},{"name":"Adguard","position":6,"description":"AdGuard is a network security solution that comes with all features available in the personal version, plus the option to configure filtering by country. The platform is available for businesses with a variety of sizes and budgets.\n\nWhitelisting is also an option for both administrators and users, that allows them to access specific domains or a website's content. AdGuard Business supports multilingual websites and applications and works with any OS and browser, whether Windows, macOS or Linux, Chrome or Firefox. With minimum hardware requirements of Pentium II processor and 512 MB RAM, it is a versatile solution for your business network.\n\nAdguard enables businesses to completely block advertisements, block malware and phishing attacks, whitelist specific sites as well as eliminate trackers that collect browsing activity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8a1c9047-6cfe-47f2-a164-308cbb6ea9b3.png","url":"https://www.softwareadvice.co.uk/software/470095/Adguard","@type":"ListItem"},{"name":"OpenText Core DNS Protection","position":7,"description":"OpenText™ Core DNS Protection is a cloud-native solution that filters every DNS request -- from browsers, app, or background process -- to block threats before they reach your network or device. It stops access to malicious domains, prevents DNS leaks on the fly, and ensures encrypted DNS traffic is resolved only by trusted sources.\n\nKey benefits:\n\nPrevent malware by blocking access to malicious domains and servers \n\nStop data exfiltration by cutting off access to Command and Control servers\n\nGain full visibility to all DNS activity with comprehensive logs\n\nDeploy in seconds with immediate protection\n\nSecure users and devices on any network, even at home","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1eaf8f65-6651-413b-857c-e919e1e9d173.png","url":"https://www.softwareadvice.co.uk/software/222460/secureanywhere-dns-protection","@type":"ListItem"},{"name":"CrowdStrike","position":8,"description":"CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. \n\n\nThe application helps network administrators monitor malicious activities, apply mitigation techniques and block data tampering across multiple devices. System engineers can use the solution to detect unauthorized access in real-time, review and categorize hackers under blacklist or whitelist. Additionally, it helps users identify and block various malware activities such as polymorphic, obfuscated and more. \n\n\nCrowdStrike comes with a feature which enables managers to provide user-based access to USBs, monitor usage and track security risks. It comes with a mobile application for Android and is available on an annual subscription. The solution offers different support options to customers, including email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e223712f-b823-4608-92e0-14d1f76a5f6e.png","url":"https://www.softwareadvice.co.uk/software/135499/crowdstrike","@type":"ListItem"},{"name":"UserLock","position":9,"description":"UserLock brings modern identity and access management (IAM) to on-premises and hybrid Active Directory environments. Add multi-factor authentication (MFA), single sign-on (SSO), and context-aware access controls for strong on-premise Active Directory identity authentication. \n\nThe result: low-friction security for end users and simple, scalable management for IT teams.\n\nDeployed on-premise alongside Active Directory, UserLock sits at the AD authentication layer. Easy to implement and use, UserLock helps organizations secure, monitor, and manage Windows logins, Remote Desktop (RDP, RD Gateway, RemoteApp), IIS sessions, VPN connections, and SaaS applications.\n\nAdministrators gain real-time visibility and control over user sessions, making it easy to prevent account sharing, limit concurrent logins, and respond immediately to suspicious activity.\n\nUserLock's comprehensive auditing and reporting capabilities support compliance with standards such as ISO 27001, HIPAA, and NIS2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1ae9fd81-097e-4a26-8811-d253b394b2dc.png","url":"https://www.softwareadvice.co.uk/software/296235/userlock","@type":"ListItem"},{"name":"ConnectWise SIEM","position":10,"description":"ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities, which assist administrators with evaluating threat alerts, logs and related information.\n\n\nConnectWise SIEM allows enterprises to detect potential threats, security issues and malicious activities across the network and connected devices via a unified portal. IT professionals can gain visibility into Windows logs, active assets, HIPAA and PCI DSS compliance, networking status and other metrics via a dashboard. Additionally, users can evaluate issues, instance and other events through real-time alerts and store the information in a repository for future reference.\n\n\nConnectWise SIEM supports integration with a variety of third-party applications such as G Suite, Microsoft teams, Cisco, Salesforce, Bitdefender, Freshdesk, and more. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34dcfe8-0d4f-4a8b-8316-e96618c26019.png","url":"https://www.softwareadvice.co.uk/software/118233/perch-security","@type":"ListItem"},{"name":"Symantec Enterprise Cloud","position":11,"description":"Symantec Endpoint Encryption is an encryption solution that allows businesses to protect sensitive information by encrypting data on any hard drive, ensuring maximum data security. Symantec Endpoint Encryption supports file encryption on Windows, Mac, self-encrypting drives, and removable media, minimizing risks across all business devices. \n\n\nWith Symantec Endpoint Encryption, users can launch and manage file encryption from a single console. In addition to file encryption, Symantec Endpoint Encryption utilizes an email encryption gateway that automatically encrypts and decrypts emails between internal and external clients. Users can easily configure encryption rules across all devices, allowing users to encrypt data at rest, in motion, and in use.\n\n\nFor existing encryption systems, Symantec Endpoint Encryption also supports BitLocker and File Vault encrypted devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d3a23625-aab8-4741-9746-340f02ec3c7e.jpeg","url":"https://www.softwareadvice.co.uk/software/414489/symantec-enterprise-cloud","@type":"ListItem"},{"name":"Zscaler","position":12,"description":"Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious web content including malware callbacks, scripts, botnets and browser exploits.\n\nOrganizations can remediate misconfigurations for SaaS and PaaS applications, identify instances of confidential data loss and monitor access to streaming, social media, email or other web applications. Zscaler allows administrators to configure access permissions based on user, group, time, location or quota and utilize reports to gain insights into web transactions across multiple geographies. Additionally, enterprises can enforce bandwidth policies, inspect Secure Sockets Layer (SSL) traffic and analyze unknown files to detect malicious behavior.\n\nZscaler facilitates integration with several third-party technology providers such as AT&T, VMware, Accenture, Splunk and more. Pricing is available on request and support is extended via live chat, documentation, knowledge base, forums, FAQs, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a6796f9-1449-4617-8dd6-deb7827a0caa.png","url":"https://www.softwareadvice.co.uk/software/241644/zscaler-internet-access","@type":"ListItem"},{"name":"Cato Networks Suite","position":13,"description":"Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other assets across the organizations on a unified and secure network. It enables businesses to manage traffic optimization and routing for wide area networks (WAN) and cloud traffic to ensure maximum uptime.\n\nCato Networks Suite allows enterprises to share and route data using a converged network of point of presence (PoP) access points to improve data access speed. The platform offers an integrated stack of security applications, which includes firewalls, secure web gateway with URL filtering (SWG), anti-malware protection, IPS-as-a-service (IPS) and managed threat detection and response (MDR) system. Additionally, administrators can track usage of various applications, network topology/ activities and trends.\n\nCato Networks Suite lets managers enable or disable connectivity between sites, restrict or allow specific applications and monitor security events. Pricing details are available on request and support is extended via email and an online portal.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/979dc7eb-f9d0-4b41-a083-8aebcd2576e0.png","url":"https://www.softwareadvice.co.uk/software/228235/cato-networks-suite","@type":"ListItem"},{"name":"Workspace ONE","position":14,"description":"Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage and deliver any app anywhere and on any device. It provides one source of truth for end user access,  provisioning, security, compliance, and management across all devices","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c6cdd3de-a711-4714-84b9-b152bcdf6e3b.png","url":"https://www.softwareadvice.co.uk/software/445973/workspace-one","@type":"ListItem"},{"name":"Xcitium Endpoint Detection & Resonse","position":15,"description":"Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the cybersecurity industry, is a sophisticated solution for monitoring endpoint devices continually. It is engineered not only to detect and respond to serious threats like malware and ransomware but also to provide deep insights into the attack dynamics, pinpoint vulnerabilities, and enhance future defenses.\n\nThe solution operates with an agent installed on endpoint devices, working closely with a central management console and utilizing a cloud-based analytics service. This agent monitors device activities, sending data to the console where potential threats are analyzed.\n\nEDR platforms, while varying slightly between vendors, generally share key functionalities, including threat detection using behavioral analytics, heuristics, and machine learning to spot suspicious activities. Upon detecting a threat, actions such as quarantining or deleting infected files and isolating the affected device can be executed. These platforms also offer detailed reporting and alerts to facilitate rapid response to threats.\n\nWhen choosing an EDR solution, it's crucial to consider its detection and response effectiveness, impact on system performance, and false positive rate. The ideal EDR should maintain high detection rates for all threats while optimizing system performance and minimizing false alerts.\n\nThe advantages of EDR include better visibility of endpoint actions, improved detection, quicker response times, enhanced forensic data for investigations, and lower false positive rates, which strengthen an organization’s cybersecurity stance.\n\nImplementing EDR involves setting specific security goals, choosing a suitable platform, deploying it, configuring detection rules, and actively managing alerts to respond appropriately to threats.\n\nXcitium's EDR emphasizes not just threat detection but also immediate containment within a \"ZeroDwell\" time environment, advocating for preemptive action against unknown threats by virtualizing them. This approach improves upon traditional EDR capabilities by adding more robust awareness and remediation features.\n\nIn summary, Xcitium's EDR platform provides a thorough, analytical approach to cybersecurity, enabling organizations to proactively manage threats with advanced detection, response, and containment strategies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cfe8a5f4-c6b4-435f-a4ea-22874f613764.png","url":"https://www.softwareadvice.co.uk/software/345400/comodo-endpoint-security-manager","@type":"ListItem"},{"name":"runZero","position":16,"description":"runZero provides asset inventory and network visibility for security and IT teams. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. runZero's secret sauce is its proprietary unauthenticated scanner powered by high-fidelity fingerprinting that gathers more details than other solutions. You can also augment the inventory with integrations for MDMs, EDRs, cloud service providers, and virtual environments. The solution also provides network visibility by uncovering unknown subnets and scanning RFC1918 subnets quickly. runZero integrates well with SIEMs & CMDBs and its Explorer deploys in minutes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8911edc-294f-4cc5-aacd-639ecfdbdc99.png","url":"https://www.softwareadvice.co.uk/software/431387/runzero","@type":"ListItem"},{"name":"Blackpoint MDR","position":17,"description":"Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber experience and knowledge of malicious tradecraft to help MSPs safeguard their infrastructure and operations. \n\nOffering the only world-class, nation state-grade cybersecurity ecosystem, Blackpoint serves the MSP community using its own proprietary security operations and incident response platform, SNAP-Defense, which is available as a product or as a True Managed Detection and Response (MDR) service. Blackpoint not only detects breaches earlier than any other solution on the market, but its dedicated MDR security analysts work 24x7 to combine network visualization, insider threat monitoring, anti-malware, traffic analysis, and endpoint security in one rapidly deployed service to monitor and detain threats before it's too late.  \n \nIn addition to its MDR services, Blackpoint is launching LogIC, its new logging with integrated compliance service to help MSPs and their clients satisfy cyber compliance requirements, including assessments and audits. With simple push-button setup, LogIC’s hyper-efficient logging architecture and self-service web application allows you to generate compliance reports and manage all aspects of event and log collection. Streamline how you prepare for audits and know exactly where you are already covered without compromising your security posture.  \n \nBlackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community. The mission? Provide absolute, unified detection and response services for MSPs of all sizes to combat a constantly changing threat landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d48533f-1f0d-4bcb-be5c-794399a68dab.png","url":"https://www.softwareadvice.co.uk/software/318796/blackpoint","@type":"ListItem"},{"name":"Lightspeed Filter","position":18,"description":"Lightspeed Filter is the best-in-class solution that protects students from harmful material to ensure their online safety. Our solution leverages human review by data scientists and machine learning to block inappropriate sites—including new and unknown ones—while still allowing access to critical educational materials. With 138 categories that differentiate sites such as adult gaming versus educational gaming, Lightspeed Filter is the most precise web filter on the market: this ensures comprehensive protection without over-blocking. \n\nThis tool also helps technology teams scale student safety with our cloud-based, device-level protections that work across all devices, operating systems, and learning environments. With Lightspeed Filter, enjoy end-to-end cloud-based filtering protection, simplified SSL decryption, fast and accurate roster syncing, and easy hardware-free setup. \n\n**Fast and accurate roster syncing: Simultaneously sync any combination of student information systems\n(SIS) and directory services to one centralized place with Lightspeed SmartSync technology.\n\n**Flexible policy management: Quickly locate and manage group policies, reports, and more with quick\nsearch functionality, sophisticated hierarchical breadcrumb navigation, and granular group filtering with Lightspeed SmartPolicy technology.\n\n**The Most Precise Web Filter: With 138 categories that differentiate sites such as adult gaming versus educational gaming, Lightspeed Filter is the most precise web filter on the market ensuring\ncomprehensiveness without over blocking, unlike other filters.\n\n**Adaptive AI Database: From 20 years of web crawling, Lightspeed has the most mature and complete\nK-12 database in the industry leveraging machine learning and human review by data scientists and to\nblock inappropriate, new, and unknown sites and allow access to valuable educational materials.\n\n**Easy SSL Decryption: Provide multi-OS SSL decryption without the need to configure proxies, PACs, or\ntrust certificates. Lightspeed SmartAgents put the power of a filter inside each device.\n\n**Granular YouTube Controls: SmartPlay takes control of YouTube. Allow educational videos and block\ninappropriate content, thumbnails and time-wasters—in just a click.\n\n**Dynamic Reports: Get high-level data on device use or detailed, granular reports on individual students.\nLightspeed Systems® offers the most powerful, actionable, and shareable reports.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f93a4f99-ceb0-4b5b-bda2-a47c538a9ec2.png","url":"https://www.softwareadvice.co.uk/software/183406/lightspeed-filter","@type":"ListItem"},{"name":"XG Firewall","position":19,"description":"XG Firewall is a network security solution that helps businesses streamline endpoint detection and response, firewall security and compliance management operations. The application enables employees to detect cyber threats, block suspicious applications and assess data breach risks via a unified platform.\n\n\nIt lets administrators isolate a compromised network host to prevent data leakage, malware or virus spread and hacker communication. Features of XG Firewall include data synchronization, access control, security management, analytics, email tracking, auditing and more. Additionally, it allows IT teams to trigger an automated response with dynamic firewall rules and lateral movement protection to identified threats.\n\n\nXG Firewall comes with an application programming interface (API), which lets businesses integrate the system with several third-party endpoint security management platforms. It offers a free version and additional pricing details are available on request. Support is extended via phone, email, documentation, forums and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/21fe3e60-213f-4e65-b50c-0382e0ff4d9b.png","url":"https://www.softwareadvice.co.uk/software/149083/xg-firewall","@type":"ListItem"},{"name":"SafeDNS","position":20,"description":"SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection against dangerous, inappropriate and irrelevant sites. The solution also caters to educational institutions and home users.\n\n\nSafeDNS can be installed on individual devices and on routers to protect all users on a network. The SafeDNS service helps users block entire content categories and specific websites. The solution filters out botnets, malicious and phishing websites and most of online advertising such as context ads, video and audio advertisements, banners and pop-ups.\n\n\nSafeDNS filters online content according to user-introduced filtering rules. The SafeDNS service resolves DNS requests and matches them with its existing database of categorized internet resources.\n\n\nThe service is compliant with the Children's Internet Protection Act (CIPA) and is appropriate for educational institutions including K-12 schools and higher education. It also offers an allowlist-only mode which enables network administrators give users access to permitted websites from the user's allowlist.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0f42c621-01dc-4513-8253-079efce52947.png","url":"https://www.softwareadvice.co.uk/software/167341/safedns","@type":"ListItem"},{"name":"Acunetix","position":21,"description":"Acunetix is a cloud-based digital security solution that assist security analysts with data protection, manual testing and compliance reporting. It is primarily designed to scan websites and identify vulnerabilities that can compromise networks.\n\nKey features include site crawling, analysis, threat detection, SQL injection testing, network scanning and testing. Its vulnerability scanner crawls through open-source software and custom-built applications using black box and grey box techniques. With its network security module, users can test routers, firewalls and switches and detect misconfigurations.\n\nAcunetix comes with an application programming interface (API) that enables firms to integrate it with their workflows and processes. It if offered on a one-time subscription basis and support is provided via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9a1f201e-3bde-45b3-a0e2-bfe0c3a29b9e.png","url":"https://www.softwareadvice.co.uk/software/77622/acunetix","@type":"ListItem"},{"name":"REVE Antivirus","position":22,"description":"REVE Antivirus is a computer and network security solution for home users and enterprises. Turbo scan is a quick scan that scans all your files in seconds and provides you with the results of the scan in one click.\n\nAnti-Rootkit is an advanced virus detection technology that detects and removes rootkits from your system. It uses both signature-based and heuristic methods to detect rootkits. Rootkits use different techniques to hide from the operating system, making it difficult for antivirus software to detect them. Anti-Rootkit uses advanced techniques to detect these rootkits and remove them from your system.\n\nAnti-Malware protects against malware attacks by detecting malicious files before they can infect your computer or steal personal information from it. It automatically updates itself with new virus definitions so that you are always protected against new threats as soon as they're released into the wild!\n\nAdvanced parental control with live notification functionality allows you to monitor what websites kids visit online and receive live notifications whenever they access inappropriate content.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cde04a2b-ea46-4f67-bafc-716a936f1b7f.png","url":"https://www.softwareadvice.co.uk/software/366146/reve-antivirus","@type":"ListItem"},{"name":"Qualys Cloud Platform","position":23,"description":"Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attacks and address potential threats.\n\nThe platform allows managers to track expired licenses, application versions and out-of-date operating systems to maintain asset inventory. Qualys Cloud enables teams to evaluate files in accordance with payment card industry data security standard (PCI DSS) and health insurance portability and accountability act (HIPAA) compliance protocols. Additionally, operators can access endpoints to quarantine files, fix misconfigurations and remove exploits on a unified interface.\n\nQualys Cloud offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Amazon Web Services, Microsoft Azure and Google Cloud Platform. Pricing is available on request and support is extended via knowledge base, phone, chat, email, FAQs and forum.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/296fda38-71c2-40bb-91b2-b8813c1a7c14.png","url":"https://www.softwareadvice.co.uk/software/262425/qualysguard-enterprise","@type":"ListItem"},{"name":"Lockwell","position":24,"description":"Go from zero to secure in minutes—with a platform that’s smart, supportive, and built for  teams with limited resources.\n\nLockwell is the #1 Fully Automated Cybersecurity Platform for Small Business Owners. In a digital world where threats are constant and resources are tight, Lockwell gives you a smarter, simpler, and more affordable way to stay protected and compliant—without hiring an IT team or wading through technical complexity.\n\nWhat You Get with Lockwell:\n\nLockwell unifies enterprise-grade protection into one easy-to-use platform. Our four core pillars give you everything you need to stay secure and audit-ready:\n🔹 Security Tools: Get complete visibility and protection across all devices, accounts, emails, and networks. Lockwell includes a powerful suite of tools—VPN, device protection, anti-malware, email firewall, password manager, safe browsing, and more—monitored and managed 24/7 by Elle, your AI Cyber Defense Agent.\n\n\n🔹 Cyber Posture Management: Stay ahead of risks with continuous vulnerability scanning, vendor monitoring, penetration testing, and security awareness training. Lockwell keeps your organization strong and resilient with guided, prioritized action plans.\n\n\n🔹 Compliance & Reporting: Achieve NIST compliance in as little as 7 days, with no spreadsheets, no consultants, and no stress. Lockwell automates policy creation, audit logging, risk assessments, and executive-ready reporting—so you can prove you’re secure without lifting a finger.\n\n🔹 AI-Driven Simplicity: Elle takes care of the heavy lifting. She detects issues, alerts your team, helps resolve them, and prepares compliance reports. She’s your real-time assistant, giving you peace of mind even when you’re not watching.\n\n\nBuilt for Small Teams. Trusted by Thousands.\n\nUnlike traditional security providers that rely on disconnected tools and expensive services, Lockwell is built from the ground up to serve small organizations better. \nThat means:\n🔹 No long setup or learning curve\n🔹 No expensive consultants\n🔹 No tech jargon\n🔹 No locked-in contracts\n\n\nJust real protection, fast.\n\nFrom Risk to Resilience—Fast\nWith Lockwell, you can go from unprotected to fully secured in minutes. Whether you're handling sensitive client data, trying to meet compliance standards, or responding to a cyber insurance request, Lockwell makes it easy to get it right—without slowing your business down.\n\nWe don’t just help you pass audits. We help you build client confidence, strengthen your operations, and create new growth opportunities through better cybersecurity.\n\nCybersecurity doesn’t have to be expensive or complicated. Lockwell provides everything you need to secure your business—without the hassle.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bf5b3952-34fd-42d6-8814-cd8255d1e356.png","url":"https://www.softwareadvice.co.uk/software/411863/lockwell","@type":"ListItem"},{"name":"PhishingBox","position":25,"description":"PhishingBox is a cloud-based security awareness training platform that helps small to large organizations conduct simulated phishing attacks to identify end-users’ susceptibility to threats. Features include pre-defined phishing emails, automated workflows, reporting, real-time alerts and website cloning. \n\nThe solution enables administrators to set up training courses, auto-enroll employees, and analyze the security posture across the entire organization. With its phishing simulator module, trainers can create multiple tests targeting specific groups, build custom phishing templates using the editor and configure email content, training moments and more. Additionally, supervisors can send security tips to employees and provide real-time information to end-users who failed the test. \n\nPhishingBox offers integration with several third-party platforms such as Bridge, Moodle, Okta, Ping Identity and more. The solution is available on annual subscriptions and support is extended via email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/98d140d6-f4c0-4002-a1a5-b896875d3e41.png","url":"https://www.softwareadvice.co.uk/software/270218/phishingbox","@type":"ListItem"}],"@id":"https://www.softwareadvice.co.uk/directory/4170/network-security/software?page=3#itemlist","numberOfItems":25}
</script>
