18 years helping Australian businesses choose better software
Network Security Software
Network Security software prevents unauthorized access to a computer network.
Capterra offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Albania, American Samoa, Andorra, Anguilla, Antigua & Barbuda, Argentina, Aruba, Australia, Austria, Bahamas
, Bahrain, Barbados, Belarus, Belgium, Belize, Bermuda, Bolivia, Bosnia & Herzegovina, Brazil, British Virgin Islands, Bulgaria, Canada, Cayman Islands, Chile, China, Colombia, Cook Islands, Costa Rica, Croatia, Cuba, Curaçao, Cyprus, Czechia, Denmark, Dominica, Dominican Republic, Ecuador, El Salvador, Estonia, Falkland Islands, Faroe Islands, Fiji, Finland, France, French Guiana, French Polynesia, Germany, Gibraltar, Greece, Greenland, Grenada, Guadeloupe, Guam, Guatemala, Guernsey, Guyana, Haiti, Honduras, Hong Kong SAR China, Hungary, Iceland, India, Indonesia, Ireland, Isle of Man, Italy, Jamaica, Japan, Jersey, Kiribati, Latvia, Liechtenstein, Lithuania, Luxembourg, Malaysia, Maldives, Malta, Marshall Islands, Martinique, Mexico, Micronesia, Moldova, Monaco, Montenegro, Montserrat, Nauru, Netherlands, New Caledonia, New Zealand, Nicaragua, Norfolk Island, North Macedonia, Northern Mariana Islands, Norway, Oman, Palau, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Puerto Rico, Qatar, Romania, Russia, Samoa, San Marino, Saudi Arabia, Serbia, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, South Korea, Spain, Sri Lanka, St Pierre & Miquelon, St. Kitts & Nevis, St. Lucia, St. Martin, St. Vincent & Grenadines, Suriname, Sweden, Switzerland, Thailand, Tonga, Trinidad & Tobago, Turks & Caicos Islands, Tuvalu, Türkiye, US Virgin Islands, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, Vanuatu, Vatican City, Vietnam, Wallis & Futuna, Yemen, Åland Islands
and 135 others
Languages
Chinese, Danish, Dutch, English, French, German, Hebrew, Italian, Japanese, Korean
, Polish, Portuguese, Spanish, Swedish, Traditional Chinese, Turkish
and 6 others
"iPhone, Android, Linux, and Macintosh are all supported devices for this VPN, which allowed me to..."
Read the full review
Mas Idayu
Information Technology Assistant in Malaysia
This information was sourced from NordLayer
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of NordLayer
Pros:
I love the easiness of adding new users, and adding subscriptions. Simple billing and online portal.
Read more
Cons:
Counting the time spent on a machine or in a group over a given period is problematic. Last week, it was impossible to identify whose computers had been accessed.
Read more
"First days of you I felt a little lost, then I use the help center and the videos that the company..."
Read the full review
Javier Victor Marian
Network Security Auditor in US
This information was sourced from EventSentry
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of EventSentry
Pros:
The AD auditing is also useful for accountability and as I start to bring a culture of change management here. I'm really pleased with the product, it's been a great fit.
Read more
Cons:
So far I haven't found anything that merits concern or criticism.
Read more
Andorra, Argentina, Australia, Austria, Belgium, Canada, Curaçao, Cyprus, Czechia, Denmark
, Fiji, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Israel, Italy, Japan, Lithuania, Luxembourg, Malta, Mexico, Monaco, Netherlands, New Zealand, Norway, Poland, Portugal, San Marino, Singapore, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 30 others
Australia, Canada, Denmark, France, Germany, Greece, India, Ireland, Italy, Japan
, Malaysia, Mexico, Netherlands, New Zealand, Portugal, Saudi Arabia, Singapore, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 14 others
This information was sourced from Norton AntiVirus
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of Norton AntiVirus
Pros:
It integrates easily and isn't disruptive. It runs in the back room without slowing down the machine and doesn't affect day-to-day operations.
Read more
Cons:
Sometimes it can be confusing because there are a few different programs that are used for different things.
Read more
This information was sourced from Norton AntiVirus
Who Uses Norton AntiVirus?
Designed for individuals, families, and small businesses, it helps protect PC, Mac, Android, and iOS devices against online threats, monitor dark...
"Overall it's the superior VPN provider so despite its drawbacks it's the best of the bunch. I've..."
Read the full review
Lois
Copywriter in Cyprus
This information was sourced from NordVPN
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of NordVPN
Pros:
The user interface is very easy to use and connects rapidly.
Read more
Cons:
Plan renewal dates seemed to change over the 3 months I used it so I missed this first cancellation date so needed to pay for an extra month.
Read more
This information was sourced from NordVPN
Who Uses NordVPN?
VPN is a service that gives you safe and private access to the internet. By encrypting your connection, a VPN hides your IP and online activity from...
Australia, Austria, Canada, Denmark, Germany, Ireland, Liechtenstein, Netherlands, New Zealand, Sweden
, Switzerland, United Kingdom, United States
and 3 others
"Stops a lot of malware sites. Blocks malware popups and does not slow down the computer"
Read the full review
Natan
Coder in Spain
This information was sourced from ESET Endpoint Security
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of ESET Endpoint Security
Pros:
Ease of use, quick installation, frequent database update, integrate seamlessly.
Read more
Cons:
The disadvantages it has are: it analyzes a few files (zip, ace, rar), the options it has been limited. Sometimes has problems detecting compressed programs; some files do not disinfect them.
Read more
This information was sourced from ESET Endpoint Security
Who Uses ESET Endpoint Security?
ESET Endpoint Security offers a cloud-based and on-premises application for any size company that requires comprehensive protection for their devices.
Argentina, Austria, Belgium, Bosnia & Herzegovina, Brazil, Canada, China, Croatia, Czechia, Denmark
, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong SAR China, Hungary, Iceland, Indonesia, Ireland, Israel, Italy, Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, Malaysia, Monaco, Montenegro, Norway, Poland, Portugal, Qatar, Romania, Saudi Arabia, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Türkiye, Ukraine, United Kingdom, United States
and 37 others
"Utilizing SpamTitan as the primary spam-fighting app has proven to be very successful, and it has..."
Read the full review
Nabila
Human Resources Manager in Malaysia
This information was sourced from SpamTitan
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of SpamTitan
Pros:
Integration was easy, post sales team ensured all the steps were taken correctly and it is highly effective.
Read more
Cons:
It's lacking intuitiveness of other competitors. Regularly have to phone because a user will start receiving 'unsolicited bulk spam' and their emails get blocked sending out.
Read more
This information was sourced from SpamTitan
Who Uses SpamTitan?
Business solution - applicable for every business with email.
"Duo not only provides 2-factor authentication but also provides security posture checking for a..."
Read the full review
Paul Henry
Systems Engineer in Philippines
This information was sourced from Duo Security
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of Duo Security
Pros:
It does a great job of being straightforward and keeping your accounts secure. It provides new codes on a 30-second basis, making it difficult for hackers to do what they do.
Read more
Cons:
If I close all of my internet windows, I have to re-certify everything again so that can be annoying. Also, I purchased a new cell phone after several months of using Duo.
Read more
This information was sourced from Duo Security
Who Uses Duo Security?
Duo provides identity-first security and access management that scales to any sized organization across every industry, from small and medium...
Australia, Brazil, Canada, China, Cyprus, France, Germany, India, Ireland, Israel
, Italy, Japan, Mexico, Netherlands, Norway, Poland, Saudi Arabia, South Africa, Spain, Sweden, Switzerland, United Arab Emirates, United Kingdom, United States
and 14 others
"It's a good VPN, I recommend using it for just some private browsing."
Read the full review
Kush
Intern in US
This information was sourced from TunnelBear
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of TunnelBear
Pros:
Tunnel bear's ease of use and integration allows us to do this easily without slowing down the team.
Read more
Cons:
Though you can access offers from different countries but you may not access it fully as sometimes there is problem loading images or text which you may not understand at all.
Read more
This information was sourced from TunnelBear
Who Uses TunnelBear?
TunnelBear for Teams is the perfect fit for small to medium sized businesses that rely on cloud-based tools for everyday communication and work.
"For several years, WebTitan has supported us with a reliable web filtering tool that has served us..."
Read the full review
Nabila
Human Resources Manager in Malaysia
This information was sourced from WebTitan
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of WebTitan
Pros:
The platform is very easy to use, simple interface easy to navigate.
Read more
Cons:
I cannot seem to get it to show the same list of blocked attempts in the email. I can only get a block count by category along with a unique domain count.
Read more
This information was sourced from WebTitan
Who Uses WebTitan?
This is a business solution for any business that wants a vital security layer at the HTTP and HTTPS layer and wants to control web content.
"Crashplan has been so helpful in helping users understand their clear and concise backup history,..."
Read the full review
Kyle
SR IT Analyst in US
This information was sourced from CrashPlan
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of CrashPlan
Pros:
Enterprise class features like (Active) Directory integration and storing encryption keys on-site while using cloud backup.
Read more
Cons:
Downloading files, viewing them, archiving and many other functions are impossible. Beyond that I was double charged two different times for two separate companies that I manage.
Read more
This information was sourced from CrashPlan
Who Uses CrashPlan?
Web-based data protection tool that enables IT professionals and small businesses to manage back up of user files, external hard drives, and NAS...
"Splunk is a powerful and useful monitoring tool. Splunk's efficiency is enhanced by the ability to..."
Read the full review
Shayla
Human Resources Specialist in US
This information was sourced from Splunk Enterprise
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of Splunk Enterprise
Pros:
When you need to store, correlate, and search large amounts of data, especially System Log data, there is no tool that even comes close to Splunk. It's power and flexibility is amazing.
Read more
Cons:
So, first time user it can be difficult to use it.
Read more
This information was sourced from Splunk Enterprise
Who Uses Splunk Enterprise?
AI-powered solutions for security and observability that accelerate detection, investigation and response. Supported by an enterprise-class platform...
Australia, Brazil, Canada, China, France, Germany, India, Japan, Mexico, Netherlands
, New Zealand, Singapore, United Kingdom, United States
and 4 others
Languages
Chinese, English, French, German, Italian, Japanese, Korean, Portuguese, Russian, Spanish
, Traditional Chinese
and 1 others
"We are using it to protect our network and users PCs from internal and external threats. We have..."
Read the full review
Abdihamid
Innovation & Development Officer in Kenya
This information was sourced from Bitdefender GravityZone
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of Bitdefender GravityZone
Pros:
Multi-tenancy options, APIs advanced integration with several SIEM platforms (we tested the integration with Sumo Logic). The attractive price point (if compared to other EDR vendors).
Read more
Cons:
Customer service at Bitdefender was frustrating to deal with and less than accommodating.
Read more
This information was sourced from Bitdefender GravityZone
Who Uses Bitdefender GravityZone?
Network security system that helps businesses of all sizes protect data from cyber threats with a unified prevention, detection, response, and...
"I continue to use the software at home and recommend to anyone out there to include Webroot in..."
Read the full review
Steven
Operations Support Specialist in US
This information was sourced from Webroot Business Endpoint Protection
VPN Software
Policy Management
Anti Virus
Compliance Management
Risk Alerts
Anomaly/Malware Detection
Intrusion Prevention System
Patch Management
Reporting/Analytics
Vulnerability Scanning
Real-Time Monitoring
This information was sourced from verified user reviews of Webroot Business Endpoint Protection
Pros:
I haven't had any virus infections since installing the software. It's easy to navigate through the different functions and set up specific parameters.
Read more
Cons:
Mac integration has been difficult since Catalina. Sometimes endpoint updates have adverse effects on performance.
Read more
This information was sourced from Webroot Business Endpoint Protection
Who Uses Webroot Business Endpoint Protection?
Webroot® Business Endpoint Protection is for any size of organization but because of its high effectiveness and low management overheads is particular...
Sponsored
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest.
Vendors who bid for placement can be identified by the orange “Visit Website” button on their listing.
Highest Rated
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.
Capterra is free for users because vendors pay us when they receive web traffic and sales opportunities. Capterra directories list all vendors—not just those that pay us—so that you can make the best-informed purchase decision possible.