---
description: Page 3 - Discover the best Network Security Software in New Zealand. Compare top Network Security Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 3 - Best Network Security Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software) > [Page 3](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3)

# Network Security Software

Canonical: https://www.softwareadvice.co.nz/directory/4170/network-security/software

Page: 3 / 11\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=4)

-----

## Products

1. [Orca Security](https://www.softwareadvice.co.nz/software/432007/orca-security) — 4.8/5 (60 reviews) — Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud est...
2. [Adguard](https://www.softwareadvice.co.nz/software/470095/Adguard) — 4.6/5 (56 reviews) — AdGuard is a network security solution that comes with all features available in the personal version, plus the optio...
3. [OpenText Core DNS Protection](https://www.softwareadvice.co.nz/software/222460/secureanywhere-dns-protection) — 4.5/5 (55 reviews) — OpenText™ Core DNS Protection is a cloud-native solution that filters every DNS request -- from browsers, app, or bac...
4. [CrowdStrike](https://www.softwareadvice.co.nz/software/135499/crowdstrike) — 4.7/5 (55 reviews) — CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus pr...
5. [UserLock](https://www.softwareadvice.co.nz/software/296235/userlock) — 4.7/5 (55 reviews) — UserLock brings modern identity and access management (IAM) to on-premises and hybrid Active Directory environments. ...
6. [ConnectWise SIEM](https://www.softwareadvice.co.nz/software/118233/perch-security) — 4.6/5 (52 reviews) — ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to...
7. [Symantec Enterprise Cloud](https://www.softwareadvice.co.nz/software/414489/symantec-enterprise-cloud) — 4.5/5 (52 reviews) — Symantec Endpoint Encryption is an encryption solution that allows businesses to protect sensitive information by enc...
8. [Zscaler](https://www.softwareadvice.co.nz/software/241644/zscaler-internet-access) — 4.3/5 (48 reviews) — Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and...
9. [Proton VPN](https://www.softwareadvice.co.nz/software/502767/ProtonVPN) — 4.5/5 (44 reviews) — Proton VPN is a virtual private network that encrypts internet traffic and hides IP addresses to enhance online priva...
10. [Cato Networks Suite](https://www.softwareadvice.co.nz/software/228235/cato-networks-suite) — 4.7/5 (42 reviews) — Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other asse...
11. [Workspace ONE](https://www.softwareadvice.co.nz/software/445973/workspace-one) — 4.6/5 (40 reviews) — Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage...
12. [Xcitium Endpoint Detection & Resonse](https://www.softwareadvice.co.nz/software/345400/comodo-endpoint-security-manager) — 4.3/5 (39 reviews) — Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the c...
13. [Jamf Protect](https://www.softwareadvice.co.nz/software/346027/jamf-protect) — 4.5/5 (37 reviews) — Jamf Protect is an endpoint security solution designed to help businesses identify, prevent and resolve threats acros...
14. [runZero](https://www.softwareadvice.co.nz/software/431387/runzero) — 4.9/5 (37 reviews) — runZero provides asset inventory and network visibility for security and IT teams. You can discover your entire inven...
15. [Blackpoint MDR](https://www.softwareadvice.co.nz/software/318796/blackpoint) — 4.8/5 (36 reviews) — Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was establ...
16. [Lightspeed Filter](https://www.softwareadvice.co.nz/software/183406/lightspeed-filter) — 4.6/5 (36 reviews) — Lightspeed Filter is the best-in-class solution that protects students from harmful material to ensure their online s...
17. [XG Firewall](https://www.softwareadvice.co.nz/software/149083/xg-firewall) — 4.5/5 (35 reviews) — XG Firewall is a network security solution that helps businesses streamline endpoint detection and response, firewall...
18. [SafeDNS](https://www.softwareadvice.co.nz/software/167341/safedns) — 4.7/5 (35 reviews) — SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection...
19. [Acunetix](https://www.softwareadvice.co.nz/software/77622/acunetix) — 4.4/5 (35 reviews) — Acunetix is a cloud-based digital security solution that assist security analysts with data protection, manual testin...
20. [REVE Antivirus](https://www.softwareadvice.co.nz/software/366146/reve-antivirus) — 4.4/5 (34 reviews) — REVE Antivirus is a computer and network security solution for home users and enterprises. Turbo scan is a quick scan...
21. [Qualys Cloud Platform](https://www.softwareadvice.co.nz/software/262425/qualysguard-enterprise) — 4.0/5 (33 reviews) — Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize t...
22. [NordLayer](https://www.softwareadvice.co.nz/software/336763/nordvpn-teams) — 4.6/5 (33 reviews) — NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, ...
23. [Lockwell](https://www.softwareadvice.co.nz/software/411863/lockwell) — 4.7/5 (32 reviews) — Go from zero to secure in minutes—with a platform that’s smart, supportive, and built for teams with limited resource...
24. [PhishingBox](https://www.softwareadvice.co.nz/software/270218/phishingbox) — 4.7/5 (31 reviews) — PhishingBox is a cloud-based security awareness training platform that helps small to large organizations conduct sim...
25. [Black Duck](https://www.softwareadvice.co.nz/software/264429/black-duck-hub) — 4.3/5 (31 reviews) — From small businesses to large enterprises, the amount of open source code being used in software applications today ...

-----

Page: 3 / 11\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=2)\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=4)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Network Monitoring Tools](https://www.softwareadvice.co.nz/directory/4307/network-monitoring/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Security Software","description":"Page 3 - Discover the best Network Security Software in New Zealand. Compare top Network Security Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3","about":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Security Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4170/network-security/software","@type":"ListItem"},{"name":"Page 3","position":3,"item":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 3 - Best Network Security Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4170/network-security/software?page=3#itemlist","@type":"ItemList","itemListElement":[{"name":"Orca Security","position":1,"description":"Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform  that provides security teams with 100% coverage of their entire cloud environment.\n\nInstead of layering multiple siloed tools together or deploying cumbersome agents, Orca combines two revolutionary approaches - SideScanning, that enables frictionless and complete coverage without the need to maintain agents, and the Unified Data Model, that allows centralized contextual analysis of your entire cloud estate. Together, Orca has created the most comprehensive cloud security platform available on the marketplace.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dc4da2bc-b63d-49f4-a76e-5b0814fe7d80.jpeg","url":"https://www.softwareadvice.co.nz/software/432007/orca-security","@type":"ListItem"},{"name":"Adguard","position":2,"description":"AdGuard is a network security solution that comes with all features available in the personal version, plus the option to configure filtering by country. The platform is available for businesses with a variety of sizes and budgets.\n\nWhitelisting is also an option for both administrators and users, that allows them to access specific domains or a website's content. AdGuard Business supports multilingual websites and applications and works with any OS and browser, whether Windows, macOS or Linux, Chrome or Firefox. With minimum hardware requirements of Pentium II processor and 512 MB RAM, it is a versatile solution for your business network.\n\nAdguard enables businesses to completely block advertisements, block malware and phishing attacks, whitelist specific sites as well as eliminate trackers that collect browsing activity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8a1c9047-6cfe-47f2-a164-308cbb6ea9b3.png","url":"https://www.softwareadvice.co.nz/software/470095/Adguard","@type":"ListItem"},{"name":"OpenText Core DNS Protection","position":3,"description":"OpenText™ Core DNS Protection is a cloud-native solution that filters every DNS request -- from browsers, app, or background process -- to block threats before they reach your network or device. It stops access to malicious domains, prevents DNS leaks on the fly, and ensures encrypted DNS traffic is resolved only by trusted sources.\n\nKey benefits:\n\nPrevent malware by blocking access to malicious domains and servers \n\nStop data exfiltration by cutting off access to Command and Control servers\n\nGain full visibility to all DNS activity with comprehensive logs\n\nDeploy in seconds with immediate protection\n\nSecure users and devices on any network, even at home","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1eaf8f65-6651-413b-857c-e919e1e9d173.png","url":"https://www.softwareadvice.co.nz/software/222460/secureanywhere-dns-protection","@type":"ListItem"},{"name":"CrowdStrike","position":4,"description":"CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. \n\n\nThe application helps network administrators monitor malicious activities, apply mitigation techniques and block data tampering across multiple devices. System engineers can use the solution to detect unauthorized access in real-time, review and categorize hackers under blacklist or whitelist. Additionally, it helps users identify and block various malware activities such as polymorphic, obfuscated and more. \n\n\nCrowdStrike comes with a feature which enables managers to provide user-based access to USBs, monitor usage and track security risks. It comes with a mobile application for Android and is available on an annual subscription. The solution offers different support options to customers, including email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e223712f-b823-4608-92e0-14d1f76a5f6e.png","url":"https://www.softwareadvice.co.nz/software/135499/crowdstrike","@type":"ListItem"},{"name":"UserLock","position":5,"description":"UserLock brings modern identity and access management (IAM) to on-premises and hybrid Active Directory environments. Add multi-factor authentication (MFA), single sign-on (SSO), and context-aware access controls for strong on-premise Active Directory identity authentication. \n\nThe result: low-friction security for end users and simple, scalable management for IT teams.\n\nDeployed on-premise alongside Active Directory, UserLock sits at the AD authentication layer. Easy to implement and use, UserLock helps organizations secure, monitor, and manage Windows logins, Remote Desktop (RDP, RD Gateway, RemoteApp), IIS sessions, VPN connections, and SaaS applications.\n\nAdministrators gain real-time visibility and control over user sessions, making it easy to prevent account sharing, limit concurrent logins, and respond immediately to suspicious activity.\n\nUserLock's comprehensive auditing and reporting capabilities support compliance with standards such as ISO 27001, HIPAA, and NIS2.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1ae9fd81-097e-4a26-8811-d253b394b2dc.png","url":"https://www.softwareadvice.co.nz/software/296235/userlock","@type":"ListItem"},{"name":"ConnectWise SIEM","position":6,"description":"ConnectWise SIEM (formerly Perch) is a threat detection and response management solution that allows organizations to design, deploy and manage custom cybersecurity programs. The platform includes a threat hunting functionality with drill-down capabilities, which assist administrators with evaluating threat alerts, logs and related information.\n\n\nConnectWise SIEM allows enterprises to detect potential threats, security issues and malicious activities across the network and connected devices via a unified portal. IT professionals can gain visibility into Windows logs, active assets, HIPAA and PCI DSS compliance, networking status and other metrics via a dashboard. Additionally, users can evaluate issues, instance and other events through real-time alerts and store the information in a repository for future reference.\n\n\nConnectWise SIEM supports integration with a variety of third-party applications such as G Suite, Microsoft teams, Cisco, Salesforce, Bitdefender, Freshdesk, and more. Pricing includes monthly subscriptions and support is provided via phone, email and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d34dcfe8-0d4f-4a8b-8316-e96618c26019.png","url":"https://www.softwareadvice.co.nz/software/118233/perch-security","@type":"ListItem"},{"name":"Symantec Enterprise Cloud","position":7,"description":"Symantec Endpoint Encryption is an encryption solution that allows businesses to protect sensitive information by encrypting data on any hard drive, ensuring maximum data security. Symantec Endpoint Encryption supports file encryption on Windows, Mac, self-encrypting drives, and removable media, minimizing risks across all business devices. \n\n\nWith Symantec Endpoint Encryption, users can launch and manage file encryption from a single console. In addition to file encryption, Symantec Endpoint Encryption utilizes an email encryption gateway that automatically encrypts and decrypts emails between internal and external clients. Users can easily configure encryption rules across all devices, allowing users to encrypt data at rest, in motion, and in use.\n\n\nFor existing encryption systems, Symantec Endpoint Encryption also supports BitLocker and File Vault encrypted devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d3a23625-aab8-4741-9746-340f02ec3c7e.jpeg","url":"https://www.softwareadvice.co.nz/software/414489/symantec-enterprise-cloud","@type":"ListItem"},{"name":"Zscaler","position":8,"description":"Zscaler is a network security platform, which enables businesses to detect threats, secure access to applications and manage, track and connect IT devices across multiple locations. The system provides protection against malicious web content including malware callbacks, scripts, botnets and browser exploits.\n\nOrganizations can remediate misconfigurations for SaaS and PaaS applications, identify instances of confidential data loss and monitor access to streaming, social media, email or other web applications. Zscaler allows administrators to configure access permissions based on user, group, time, location or quota and utilize reports to gain insights into web transactions across multiple geographies. Additionally, enterprises can enforce bandwidth policies, inspect Secure Sockets Layer (SSL) traffic and analyze unknown files to detect malicious behavior.\n\nZscaler facilitates integration with several third-party technology providers such as AT&T, VMware, Accenture, Splunk and more. Pricing is available on request and support is extended via live chat, documentation, knowledge base, forums, FAQs, email, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a6796f9-1449-4617-8dd6-deb7827a0caa.png","url":"https://www.softwareadvice.co.nz/software/241644/zscaler-internet-access","@type":"ListItem"},{"name":"Proton VPN","position":9,"description":"Proton VPN is a virtual private network that encrypts internet traffic and hides IP addresses to enhance online privacy and security. It is designed to protect users' digital activity from tracking by websites, advertisers, and internet service providers. \n\nThe service provides a global network of servers across many countries, enabling access to geo-restricted content and bypassing censorship. It follows a strict no-logs policy, verified through independent audits, to ensure user activity remains private. Features include the NetShield ad-blocker, which blocks ads and malware, and a custom Stealth protocol for navigating government restrictions. Its high-speed server network, combined with VPN Accelerator technology, is designed to maintain fast connection speeds while prioritizing security.\n\nProton VPN is compatible with platforms such as Windows, macOS, Linux, Android, iOS, and browser extensions. It allows multiple devices to connect simultaneously under a single account. All applications are open-source, enabling code inspection and regular independent security audits. The service uses strong encryption standards, including AES-256 and ChaCha20, and secure protocols such as WireGuard and OpenVPN to protect user data.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/aee6c1cc-b9eb-4abc-9b00-47b9cce7ddd9.png","url":"https://www.softwareadvice.co.nz/software/502767/ProtonVPN","@type":"ListItem"},{"name":"Cato Networks Suite","position":10,"description":"Cato Networks Suite automatically connects data centers, networks, assets, userbase, cloud application and other assets across the organizations on a unified and secure network. It enables businesses to manage traffic optimization and routing for wide area networks (WAN) and cloud traffic to ensure maximum uptime.\n\nCato Networks Suite allows enterprises to share and route data using a converged network of point of presence (PoP) access points to improve data access speed. The platform offers an integrated stack of security applications, which includes firewalls, secure web gateway with URL filtering (SWG), anti-malware protection, IPS-as-a-service (IPS) and managed threat detection and response (MDR) system. Additionally, administrators can track usage of various applications, network topology/ activities and trends.\n\nCato Networks Suite lets managers enable or disable connectivity between sites, restrict or allow specific applications and monitor security events. Pricing details are available on request and support is extended via email and an online portal.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/979dc7eb-f9d0-4b41-a083-8aebcd2576e0.png","url":"https://www.softwareadvice.co.nz/software/228235/cato-networks-suite","@type":"ListItem"},{"name":"Workspace ONE","position":11,"description":"Workspace ONE is a user-friendly intelligence-driven digital workspace solution that enables users to securely manage and deliver any app anywhere and on any device. It provides one source of truth for end user access,  provisioning, security, compliance, and management across all devices","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c6cdd3de-a711-4714-84b9-b152bcdf6e3b.png","url":"https://www.softwareadvice.co.nz/software/445973/workspace-one","@type":"ListItem"},{"name":"Xcitium Endpoint Detection & Resonse","position":12,"description":"Xcitium's Endpoint Detection and Response (EDR), also known as Endpoint Detection and Threat Response (EDTR) in the cybersecurity industry, is a sophisticated solution for monitoring endpoint devices continually. It is engineered not only to detect and respond to serious threats like malware and ransomware but also to provide deep insights into the attack dynamics, pinpoint vulnerabilities, and enhance future defenses.\n\nThe solution operates with an agent installed on endpoint devices, working closely with a central management console and utilizing a cloud-based analytics service. This agent monitors device activities, sending data to the console where potential threats are analyzed.\n\nEDR platforms, while varying slightly between vendors, generally share key functionalities, including threat detection using behavioral analytics, heuristics, and machine learning to spot suspicious activities. Upon detecting a threat, actions such as quarantining or deleting infected files and isolating the affected device can be executed. These platforms also offer detailed reporting and alerts to facilitate rapid response to threats.\n\nWhen choosing an EDR solution, it's crucial to consider its detection and response effectiveness, impact on system performance, and false positive rate. The ideal EDR should maintain high detection rates for all threats while optimizing system performance and minimizing false alerts.\n\nThe advantages of EDR include better visibility of endpoint actions, improved detection, quicker response times, enhanced forensic data for investigations, and lower false positive rates, which strengthen an organization’s cybersecurity stance.\n\nImplementing EDR involves setting specific security goals, choosing a suitable platform, deploying it, configuring detection rules, and actively managing alerts to respond appropriately to threats.\n\nXcitium's EDR emphasizes not just threat detection but also immediate containment within a \"ZeroDwell\" time environment, advocating for preemptive action against unknown threats by virtualizing them. This approach improves upon traditional EDR capabilities by adding more robust awareness and remediation features.\n\nIn summary, Xcitium's EDR platform provides a thorough, analytical approach to cybersecurity, enabling organizations to proactively manage threats with advanced detection, response, and containment strategies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cfe8a5f4-c6b4-435f-a4ea-22874f613764.png","url":"https://www.softwareadvice.co.nz/software/345400/comodo-endpoint-security-manager","@type":"ListItem"},{"name":"Jamf Protect","position":13,"description":"Jamf Protect is an endpoint security solution designed to help businesses identify, prevent and resolve threats across Mac devices. The application allows users to gain visibility across remote devices and send automated alerts in case suspicious activities are detected across scripts and software.\n\nBusinesses can connect Jamf Protect with Jamf Pro and Jamf Connect to facilitate investigation management, machine isolation, threat response and security configuration administration. It stores data in a centralized repository and monitors devices in compliance with industry benchmarks such as the Center for Internet Security (CIS). Additionally, IT teams can receive notifications if devices deviate from defined OS hardening configurations.\n\nIt offers an application programming interface, which lets businesses integrate Jamf Protect with other systems such as Splunk. Pricing is available on monthly subscriptions and support is extended via videos, documentation, phone and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2167838a-52aa-41ff-b9da-b2ad95edb67f.png","url":"https://www.softwareadvice.co.nz/software/346027/jamf-protect","@type":"ListItem"},{"name":"runZero","position":14,"description":"runZero provides asset inventory and network visibility for security and IT teams. You can discover your entire inventory including managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. runZero's secret sauce is its proprietary unauthenticated scanner powered by high-fidelity fingerprinting that gathers more details than other solutions. You can also augment the inventory with integrations for MDMs, EDRs, cloud service providers, and virtual environments. The solution also provides network visibility by uncovering unknown subnets and scanning RFC1918 subnets quickly. runZero integrates well with SIEMs & CMDBs and its Explorer deploys in minutes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8911edc-294f-4cc5-aacd-639ecfdbdc99.png","url":"https://www.softwareadvice.co.nz/software/431387/runzero","@type":"ListItem"},{"name":"Blackpoint MDR","position":15,"description":"Blackpoint Cyber is a technology-focused cybersecurity company headquartered in Maryland, USA. The company was established by former US Department of Defense and Intelligence security experts and leverages its real-world cyber experience and knowledge of malicious tradecraft to help MSPs safeguard their infrastructure and operations. \n\nOffering the only world-class, nation state-grade cybersecurity ecosystem, Blackpoint serves the MSP community using its own proprietary security operations and incident response platform, SNAP-Defense, which is available as a product or as a True Managed Detection and Response (MDR) service. Blackpoint not only detects breaches earlier than any other solution on the market, but its dedicated MDR security analysts work 24x7 to combine network visualization, insider threat monitoring, anti-malware, traffic analysis, and endpoint security in one rapidly deployed service to monitor and detain threats before it's too late.  \n \nIn addition to its MDR services, Blackpoint is launching LogIC, its new logging with integrated compliance service to help MSPs and their clients satisfy cyber compliance requirements, including assessments and audits. With simple push-button setup, LogIC’s hyper-efficient logging architecture and self-service web application allows you to generate compliance reports and manage all aspects of event and log collection. Streamline how you prepare for audits and know exactly where you are already covered without compromising your security posture.  \n \nBlackpoint Cyber continues to work hard to deliver an end-to-end, effective cybersecurity ecosystem to the MSP community. The mission? Provide absolute, unified detection and response services for MSPs of all sizes to combat a constantly changing threat landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0d48533f-1f0d-4bcb-be5c-794399a68dab.png","url":"https://www.softwareadvice.co.nz/software/318796/blackpoint","@type":"ListItem"},{"name":"Lightspeed Filter","position":16,"description":"Lightspeed Filter is the best-in-class solution that protects students from harmful material to ensure their online safety. Our solution leverages human review by data scientists and machine learning to block inappropriate sites—including new and unknown ones—while still allowing access to critical educational materials. With 138 categories that differentiate sites such as adult gaming versus educational gaming, Lightspeed Filter is the most precise web filter on the market: this ensures comprehensive protection without over-blocking. \n\nThis tool also helps technology teams scale student safety with our cloud-based, device-level protections that work across all devices, operating systems, and learning environments. With Lightspeed Filter, enjoy end-to-end cloud-based filtering protection, simplified SSL decryption, fast and accurate roster syncing, and easy hardware-free setup. \n\n**Fast and accurate roster syncing: Simultaneously sync any combination of student information systems\n(SIS) and directory services to one centralized place with Lightspeed SmartSync technology.\n\n**Flexible policy management: Quickly locate and manage group policies, reports, and more with quick\nsearch functionality, sophisticated hierarchical breadcrumb navigation, and granular group filtering with Lightspeed SmartPolicy technology.\n\n**The Most Precise Web Filter: With 138 categories that differentiate sites such as adult gaming versus educational gaming, Lightspeed Filter is the most precise web filter on the market ensuring\ncomprehensiveness without over blocking, unlike other filters.\n\n**Adaptive AI Database: From 20 years of web crawling, Lightspeed has the most mature and complete\nK-12 database in the industry leveraging machine learning and human review by data scientists and to\nblock inappropriate, new, and unknown sites and allow access to valuable educational materials.\n\n**Easy SSL Decryption: Provide multi-OS SSL decryption without the need to configure proxies, PACs, or\ntrust certificates. Lightspeed SmartAgents put the power of a filter inside each device.\n\n**Granular YouTube Controls: SmartPlay takes control of YouTube. Allow educational videos and block\ninappropriate content, thumbnails and time-wasters—in just a click.\n\n**Dynamic Reports: Get high-level data on device use or detailed, granular reports on individual students.\nLightspeed Systems® offers the most powerful, actionable, and shareable reports.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f93a4f99-ceb0-4b5b-bda2-a47c538a9ec2.png","url":"https://www.softwareadvice.co.nz/software/183406/lightspeed-filter","@type":"ListItem"},{"name":"XG Firewall","position":17,"description":"XG Firewall is a network security solution that helps businesses streamline endpoint detection and response, firewall security and compliance management operations. The application enables employees to detect cyber threats, block suspicious applications and assess data breach risks via a unified platform.\n\n\nIt lets administrators isolate a compromised network host to prevent data leakage, malware or virus spread and hacker communication. Features of XG Firewall include data synchronization, access control, security management, analytics, email tracking, auditing and more. Additionally, it allows IT teams to trigger an automated response with dynamic firewall rules and lateral movement protection to identified threats.\n\n\nXG Firewall comes with an application programming interface (API), which lets businesses integrate the system with several third-party endpoint security management platforms. It offers a free version and additional pricing details are available on request. Support is extended via phone, email, documentation, forums and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/21fe3e60-213f-4e65-b50c-0382e0ff4d9b.png","url":"https://www.softwareadvice.co.nz/software/149083/xg-firewall","@type":"ListItem"},{"name":"SafeDNS","position":18,"description":"SafeDNS is a cloud-based internet security and web content filtering service that provides businesses with protection against dangerous, inappropriate and irrelevant sites. The solution also caters to educational institutions and home users.\n\n\nSafeDNS can be installed on individual devices and on routers to protect all users on a network. The SafeDNS service helps users block entire content categories and specific websites. The solution filters out botnets, malicious and phishing websites and most of online advertising such as context ads, video and audio advertisements, banners and pop-ups.\n\n\nSafeDNS filters online content according to user-introduced filtering rules. The SafeDNS service resolves DNS requests and matches them with its existing database of categorized internet resources.\n\n\nThe service is compliant with the Children's Internet Protection Act (CIPA) and is appropriate for educational institutions including K-12 schools and higher education. It also offers an allowlist-only mode which enables network administrators give users access to permitted websites from the user's allowlist.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0f42c621-01dc-4513-8253-079efce52947.png","url":"https://www.softwareadvice.co.nz/software/167341/safedns","@type":"ListItem"},{"name":"Acunetix","position":19,"description":"Acunetix is a cloud-based digital security solution that assist security analysts with data protection, manual testing and compliance reporting. It is primarily designed to scan websites and identify vulnerabilities that can compromise networks.\n\nKey features include site crawling, analysis, threat detection, SQL injection testing, network scanning and testing. Its vulnerability scanner crawls through open-source software and custom-built applications using black box and grey box techniques. With its network security module, users can test routers, firewalls and switches and detect misconfigurations.\n\nAcunetix comes with an application programming interface (API) that enables firms to integrate it with their workflows and processes. It if offered on a one-time subscription basis and support is provided via phone and email.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9a1f201e-3bde-45b3-a0e2-bfe0c3a29b9e.png","url":"https://www.softwareadvice.co.nz/software/77622/acunetix","@type":"ListItem"},{"name":"REVE Antivirus","position":20,"description":"REVE Antivirus is a computer and network security solution for home users and enterprises. Turbo scan is a quick scan that scans all your files in seconds and provides you with the results of the scan in one click.\n\nAnti-Rootkit is an advanced virus detection technology that detects and removes rootkits from your system. It uses both signature-based and heuristic methods to detect rootkits. Rootkits use different techniques to hide from the operating system, making it difficult for antivirus software to detect them. Anti-Rootkit uses advanced techniques to detect these rootkits and remove them from your system.\n\nAnti-Malware protects against malware attacks by detecting malicious files before they can infect your computer or steal personal information from it. It automatically updates itself with new virus definitions so that you are always protected against new threats as soon as they're released into the wild!\n\nAdvanced parental control with live notification functionality allows you to monitor what websites kids visit online and receive live notifications whenever they access inappropriate content.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cde04a2b-ea46-4f67-bafc-716a936f1b7f.png","url":"https://www.softwareadvice.co.nz/software/366146/reve-antivirus","@type":"ListItem"},{"name":"Qualys Cloud Platform","position":21,"description":"Qualys Cloud is a network security management software designed to help businesses monitor IT assets and prioritize threats in real-time. Administrators can receive alerts regarding vulnerabilities, suspicious activities and attacks and address potential threats.\n\nThe platform allows managers to track expired licenses, application versions and out-of-date operating systems to maintain asset inventory. Qualys Cloud enables teams to evaluate files in accordance with payment card industry data security standard (PCI DSS) and health insurance portability and accountability act (HIPAA) compliance protocols. Additionally, operators can access endpoints to quarantine files, fix misconfigurations and remove exploits on a unified interface.\n\nQualys Cloud offers an application programming interface (API), which lets businesses integrate the system with several third-party applications including Amazon Web Services, Microsoft Azure and Google Cloud Platform. Pricing is available on request and support is extended via knowledge base, phone, chat, email, FAQs and forum.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/296fda38-71c2-40bb-91b2-b8813c1a7c14.png","url":"https://www.softwareadvice.co.nz/software/262425/qualysguard-enterprise","@type":"ListItem"},{"name":"NordLayer","position":22,"description":"NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, protection, detection, and response for companies adapting to hybrid work and evolving cybersecurity needs. Built on NordVPN standards, it offers trusted network security with flexible yet robust protection that integrates with any setup.\n\nSecuring remote and hybrid teams requires granular access controls and strong identity verification to prevent cyber threats. NordLayer enables IT teams to manage security through Identity & Access Management (IAM), device posture monitoring, and context-based access policies. Employees can authenticate with biometric verification, one-time passwords (OTP), or Single Sign-On (SSO) integrations with major providers.\n\nThe platform-based approach ensures comprehensive security without disrupting workflows. As a hardware-free, cloud-based solution, NordLayer deploys quickly, adapts to existing infrastructure, and scales with business growth.\n\nSome key features include:\n\n• Cutting-edge Business VPN: Provides encrypted access to company resources while maintaining privacy and compliance\n• Cloud LAN: Securely connects distributed teams, enabling file sharing, troubleshooting, and remote collaboration\n• Zero Trust Network Access (ZTNA): Ensures only authorized users can access business-critical applications and data\n• Cloud Firewall: Creates granular security rules to control and filter network traffic\n• Device Posture Monitoring: Checks device compliance with security policies, blocking risky endpoints before they access the network\n• Threat Protection: Shields employees from malware, phishing, and malicious downloads through deep packet inspection (Lite) and file scanning\n\nWith NordLayer, businesses maintain security across multiple locations. Network segmentation, traffic filtering, and private gateways ensure company data stays protected. The Business VPN, built on up to 1 Gbps servers across 40+ locations, encrypts traffic using AES-256 and ChaCha20 encryption, reducing the risk of cyber-attacks.\n\nNordLayer offers quick deployment, with onboarding in under 10 minutes and an intuitive Control Panel for managing security policies, monitoring access, and handling billing. 24/7 active support ensures quick resolution, with an average response time of 44 seconds.\n\nNordLayer is a scalable, compliance-ready solution that keeps businesses secure without complexity. Flexible pricing, no vendor lock-in, and integrations with leading identity providers allow companies to adapt security to their needs.\n\n--\n\nIf you’re looking for a partnership, check out the NordLayer Partner Program for MSPs, resellers, and agents. Partners benefit from high-profit margins, dedicated training, 24/7 support, and no upfront investment.\n\nLearn more: nordlayer.com/partner-program","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81bce581-210b-4f70-b9dc-8023c4b3d2c5.png","url":"https://www.softwareadvice.co.nz/software/336763/nordvpn-teams","@type":"ListItem"},{"name":"Lockwell","position":23,"description":"Go from zero to secure in minutes—with a platform that’s smart, supportive, and built for  teams with limited resources.\n\nLockwell is the #1 Fully Automated Cybersecurity Platform for Small Business Owners. In a digital world where threats are constant and resources are tight, Lockwell gives you a smarter, simpler, and more affordable way to stay protected and compliant—without hiring an IT team or wading through technical complexity.\n\nWhat You Get with Lockwell:\n\nLockwell unifies enterprise-grade protection into one easy-to-use platform. Our four core pillars give you everything you need to stay secure and audit-ready:\n🔹 Security Tools: Get complete visibility and protection across all devices, accounts, emails, and networks. Lockwell includes a powerful suite of tools—VPN, device protection, anti-malware, email firewall, password manager, safe browsing, and more—monitored and managed 24/7 by Elle, your AI Cyber Defense Agent.\n\n\n🔹 Cyber Posture Management: Stay ahead of risks with continuous vulnerability scanning, vendor monitoring, penetration testing, and security awareness training. Lockwell keeps your organization strong and resilient with guided, prioritized action plans.\n\n\n🔹 Compliance & Reporting: Achieve NIST compliance in as little as 7 days, with no spreadsheets, no consultants, and no stress. Lockwell automates policy creation, audit logging, risk assessments, and executive-ready reporting—so you can prove you’re secure without lifting a finger.\n\n🔹 AI-Driven Simplicity: Elle takes care of the heavy lifting. She detects issues, alerts your team, helps resolve them, and prepares compliance reports. She’s your real-time assistant, giving you peace of mind even when you’re not watching.\n\n\nBuilt for Small Teams. Trusted by Thousands.\n\nUnlike traditional security providers that rely on disconnected tools and expensive services, Lockwell is built from the ground up to serve small organizations better. \nThat means:\n🔹 No long setup or learning curve\n🔹 No expensive consultants\n🔹 No tech jargon\n🔹 No locked-in contracts\n\n\nJust real protection, fast.\n\nFrom Risk to Resilience—Fast\nWith Lockwell, you can go from unprotected to fully secured in minutes. Whether you're handling sensitive client data, trying to meet compliance standards, or responding to a cyber insurance request, Lockwell makes it easy to get it right—without slowing your business down.\n\nWe don’t just help you pass audits. We help you build client confidence, strengthen your operations, and create new growth opportunities through better cybersecurity.\n\nCybersecurity doesn’t have to be expensive or complicated. Lockwell provides everything you need to secure your business—without the hassle.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bf5b3952-34fd-42d6-8814-cd8255d1e356.png","url":"https://www.softwareadvice.co.nz/software/411863/lockwell","@type":"ListItem"},{"name":"PhishingBox","position":24,"description":"PhishingBox is a cloud-based security awareness training platform that helps small to large organizations conduct simulated phishing attacks to identify end-users’ susceptibility to threats. Features include pre-defined phishing emails, automated workflows, reporting, real-time alerts and website cloning. \n\nThe solution enables administrators to set up training courses, auto-enroll employees, and analyze the security posture across the entire organization. With its phishing simulator module, trainers can create multiple tests targeting specific groups, build custom phishing templates using the editor and configure email content, training moments and more. Additionally, supervisors can send security tips to employees and provide real-time information to end-users who failed the test. \n\nPhishingBox offers integration with several third-party platforms such as Bridge, Moodle, Okta, Ping Identity and more. The solution is available on annual subscriptions and support is extended via email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/98d140d6-f4c0-4002-a1a5-b896875d3e41.png","url":"https://www.softwareadvice.co.nz/software/270218/phishingbox","@type":"ListItem"},{"name":"Black Duck","position":25,"description":"From small businesses to large enterprises, the amount of open source code being used in software applications today is increasing substantially. Black Duck is the industry's leading solution for open source management and license compliance. The comprehensive  Black Duck Knowledge Base contains over 4.5 million open source projects and 2,750 open source licenses, enabling our software to identify and mitigate critical risks in your applications and containers. Black Duck finds vulnerabilities and provides specific remediation guidance for eliminating these risks. In addition to source code, Black Duck Binary Analysis scans binary code for open source components. The tool continues to automatically monitor for new vulnerabilities that emerge throughout the development life cycle. For developers, security personnel, and legal teams alike, Black Duck provides the most complete security coverage and license compliance in the industry.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87dcb539-5cd1-4a3a-81c1-2fcf60604328.jpeg","url":"https://www.softwareadvice.co.nz/software/264429/black-duck-hub","@type":"ListItem"}],"numberOfItems":25}
</script>
