---
description: Page 20 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Page 20 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Cybersecurity Software](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software) > [Page 20](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20)

# Cybersecurity Software

Canonical: https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software

Page: 20 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=19)

-----

## Products

1. [Blacklock](https://www.softwareadvice.co.nz/software/322512/blacklock) (0 reviews) — Blacklock is a Penetration Testing as a Service (PTaaS) platform that combines automated vulnerability scanning with ...
2. [MetaDefender Storage Security](https://www.softwareadvice.co.nz/software/534734/MetaDefender-Storage-Security) (0 reviews) — MetaDefender Storage Security is an enterprise platform that secures on-premises, hybrid, and cloud-native storage ag...
3. [Novee](https://www.softwareadvice.co.nz/software/538409/Novee) (0 reviews) — Novee is an AI-driven penetration testing platform designed to identify and address security vulnerabilities in live ...
4. [Shield Sphere](https://www.softwareadvice.co.nz/software/538913/Shield-Sphere) (0 reviews) — Shield Sphere is a comprehensive cybersecurity platform designed to help modern organizations defend against evolving...
5. [CyberCaution](https://www.softwareadvice.co.nz/software/539141/CyberCaution) (0 reviews) — CyberCaution is a ransomware readiness assessment platform designed to help organizations evaluate their vulnerabilit...
6. [NOVA DRIM](https://www.softwareadvice.co.nz/software/539099/NOVA-DRIM) (0 reviews) — NOVA DRIM is a cyber risk quantification platform that converts technical security exposures into financial insights ...
7. [Siberson Verifim File Integrity Monitoring](https://www.softwareadvice.co.nz/software/543214/Siberson-Verifim-File-Integrity-Monitoring) (0 reviews) — Siberson Verifim File Integrity Monitoring is a security tool designed to track changes to critical files and systems...

-----

Page: 20 / 20\
Prev: [Previous page](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=19)

## Related Categories

- [Cloud Security Software](https://www.softwareadvice.co.nz/directory/4329/cloud-security/software)
- [Computer Security Software](https://www.softwareadvice.co.nz/directory/4528/security/software)
- [Endpoint Protection Software](https://www.softwareadvice.co.nz/directory/4777/endpoint-protection-software/software)
- [Vulnerability Management Software](https://www.softwareadvice.co.nz/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cybersecurity Software","description":"Page 20 - Discover the best Cybersecurity Software in New Zealand. Compare top Cybersecurity Software tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20","about":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Cybersecurity Software","position":2,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software","@type":"ListItem"},{"name":"Page 20","position":3,"item":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 20 - Best Cybersecurity Software in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4643/cybersecurity/software?page=20#itemlist","@type":"ItemList","itemListElement":[{"name":"Blacklock","position":1,"description":"Blacklock is a Penetration Testing as a Service (PTaaS) platform that combines automated vulnerability scanning with manual penetration testing by CREST-certified professionals. It is designed for organizations in various industries aiming to enhance their cybersecurity measures and meet compliance standards such as PCI, ISO 27001, SOC-2, HIPAA, and GDPR.\n\nThe platform provides continuous vulnerability scanning for web applications, APIs, and infrastructure, with options for scheduled and on-demand testing. It includes manual penetration testing by experts with certifications such as OSCP, OSWE, and CISSP. Additional features include Static Application Security Testing (SAST) for over thirty programming languages, Software Bill of Materials (SBOM) generation and management, and AI-powered remediation assistance offering code suggestions based on the application stack.\n\nBlacklock simplifies security management with a vulnerability orchestration dashboard, allowing organizations to visualize and track security findings. It offers three types of reports tailored for different audiences: Executive, Developer, and Full Penetration Test reports. The platform supports integration with CI/CD pipelines, facilitating automated security testing throughout the development process.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/29e09acb-4bf7-4ad0-bb62-b00129b30e88.png","url":"https://www.softwareadvice.co.nz/software/322512/blacklock","@type":"ListItem"},{"name":"MetaDefender Storage Security","position":2,"description":"MetaDefender Storage Security is an enterprise platform that secures on-premises, hybrid, and cloud-native storage against breaches, downtime, and compliance violations. It integrates with leading storage solutions like Amazon S3, Microsoft Azure, NetApp, Dell EMC, OneDrive, Box, and any SMB/NFS/SFTP/FTP or S3-compatible storage. The platform offers real-time, scheduled, and on-demand file scanning using advanced technologies such as Deep CDR, Metascan Multiscanning, Adaptive Sandbox, Proactive DLP, and vulnerability assessment to detect and neutralize threats. Features include customizable remediation workflows, file tagging for forensic analysis, partition-based scanning policies, and centralized compliance reporting. Deployment options include virtual machines, Kubernetes, or cloud-based SaaS/IaaS models.\n\nMetaDefender Storage Security provides benefits for organizations across all verticals and sizes with:\n• MetaDefender Storage Security offers seamless integration with existing workflows, enabling real-time, on-demand or scheduled scanning across multiple storage repositories, including on-prem, hybrid, and cloud-native environments.\n• Guard against zero-day threats and advanced targeted attacks using leading technologies from OPSWAT.\n• Multi-layered solutions deliver real-time threat detection and prevention to ensure comprehensive storage security.\n• Deploy easily and cost-effectively into your existing infrastructure. Configure and start scanning in minutes, with no need for extensive setup or storage administration. The SaaS-native solution makes this even more effortless by providing ready-to-use protection right in the cloud.\n• Seamlessly integrate with Amazon S3, SharePoint Online, Azure, any SMB/NFS/SFTP or S3 compatible storage. \n• Tailor policies and workflows to comply with stringent regulations like PCI, HIPAA, GLBA, and FINRA. MetaDefender Storage Security’s cloud-native solution provides automatic compliance with no manual oversight required.\n• Prevent sensitive data loss or leakage by controlling data entry and exit within the organization.\n• MetaDefender adapts to your storage environment, from local systems to fully cloud-native architectures, ensuring protection at any scale.\n• Ensure continuous protection with support for redundant and distributed architectures, minimizing downtime and maintaining service reliability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1a12d23b-3d72-4856-90a3-206da496ad95.jpeg","url":"https://www.softwareadvice.co.nz/software/534734/MetaDefender-Storage-Security","@type":"ListItem"},{"name":"Novee","position":3,"description":"Novee is an AI-driven penetration testing platform designed to identify and address security vulnerabilities in live environments. It is intended for security teams and organizations aiming to protect against automated attacks. Unlike traditional annual penetration tests and generic vulnerability scanners, Novee offers continuous security assessments that adapt to changing infrastructure and emerging threats.\n\nThe platform uses an AI reasoning model built with knowledge of offensive tradecraft, exploitation techniques, and security tools. It can start assessments with no prior information in black box mode and expand to gray-box and white-box contexts for thorough coverage. Novee continuously maps environments, identifies exploit chains and business logic flaws, and validates findings with clear replication steps to reduce false positives. The platform follows a five-phase process: discovery, detection, validation, remediation, and continuous retesting.\n\nNovee offers step-by-step remediation guidance tailored to each organization's architecture and technology stack. After fixes are implemented, it automatically retests to confirm successful remediation. The system adapts to infrastructure changes, new code deployments, and evolving attack patterns to ensure ongoing protection. Findings include detailed impact assessments and actionable instructions, helping security teams focus on genuine risks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3d1f84bb-566b-459c-b179-5df6958c670b.jpeg","url":"https://www.softwareadvice.co.nz/software/538409/Novee","@type":"ListItem"},{"name":"Shield Sphere","position":4,"description":"Shield Sphere is a comprehensive cybersecurity platform designed to help modern organizations defend against evolving digital threats. Built for businesses that require proactive protection, Shield Sphere delivers real-time monitoring, threat detection, and automated response capabilities across networks, systems, and cloud environments.\n\nThe platform provides centralized visibility into your security ecosystem, allowing security teams to monitor activities, detect vulnerabilities, and respond to incidents faster. With advanced analytics and threat intelligence, Shield Sphere identifies suspicious behavior and potential attacks before they can impact your organization.\n\nShield Sphere integrates seamlessly with existing IT infrastructure and popular enterprise tools, enabling organizations to strengthen their security posture without disrupting current workflows. Automated alerts, customizable dashboards, and detailed reporting help teams maintain compliance and maintain full visibility over security operations.\n\nDesigned with scalability and reliability in mind, Shield Sphere supports businesses of all sizes—from growing startups to enterprise environments that require high-level security controls.\n\nKey Features\n- Real-Time threat detection – Identify malicious activities and suspicious behavior across networks and systems.\n- Automated security monitoring – Continuous monitoring to detect vulnerabilities and prevent breaches.\n- Centralized security dashboard – Manage and visualize security events from a single interface.\n- Incident response automation – Rapid response tools to contain and mitigate threats.\n- Advanced threat intelligence – Data-driven insights to anticipate and prevent emerging cyber risks.\n- Custom alerts & reporting – Configurable notifications and detailed security analytics.\n- Integration ready – Works with existing security tools, SIEM systems, and cloud infrastructure.\n- Enterprise-grade security – Role-based access control, encrypted data handling, and compliance-ready architecture.\n\nShield Sphere is designed with security best practices, including encrypted communications, secure authentication, and access control mechanisms that help organizations maintain compliance with industry standards and internal security policies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/63c0fefc-a730-48a2-bdfa-84b6e89e1280.jpeg","url":"https://www.softwareadvice.co.nz/software/538913/Shield-Sphere","@type":"ListItem"},{"name":"CyberCaution","position":5,"description":"CyberCaution is a ransomware readiness assessment platform designed to help organizations evaluate their vulnerability to ransomware threats. It uses structured, questionnaire-based evaluations tailored to eight industry sectors, including healthcare, finance, and government. The platform provides sector-specific threat intelligence and framework-aligned assessments to help organizations understand their risk posture before incidents occur.\n\nThe platform supports assessments aligned with security frameworks such as NIST, ISO, HIPAA, and CISA, enabling organizations to evaluate readiness through various compliance perspectives. Each assessment generates a PDF report summarizing findings in a format suitable for leadership teams, boards, and insurance providers. The Threat Radar feature offers sector-specific threat insights, helping organizations identify high-risk attack paths and threats relevant to their environment. A Control Evidence Tracker links security controls to documentation, creating a record of readiness measures. The Cascade feature prioritizes remediation efforts based on actual threat impact.\n\nThe platform provides a phased remediation roadmap with prioritized defense workflows. It offers both web-based assessments and a desktop application for local data processing. Posture views consolidate sector context, asset details, and third-party relationships into unified reports designed for non-technical stakeholders.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/541f1378-bb03-43d1-8af1-48ed9e45a8ea.png","url":"https://www.softwareadvice.co.nz/software/539141/CyberCaution","@type":"ListItem"},{"name":"NOVA DRIM","position":6,"description":"NOVA DRIM is a cyber risk quantification platform that converts technical security exposures into financial insights for enterprise decision-making. It is used by regulated businesses in sectors such as financial services, healthcare, manufacturing, retail, government, and energy utilities. Organizations following compliance frameworks such as NIST CSF, HIPAA, SOC 2, RBI cybersecurity guidelines, DPDP Act, SEBI CSCRF, and ISO 27001 use the platform to maintain continuous risk governance aligned with regulatory requirements.\n\nThe platform uses a five-layer computational architecture to process data from six security domains: External Attack Surface Monitoring, Third Party Risk Management, Governance Risk and Compliance, Vulnerability Management, VAPT, and 24/7 SOC operations. NOVA DRIM applies a deterministic risk calculation methodology using the formula Likelihood × Impact × Control Adjustment, with likelihood based on live exposure data. It features a dual-layer confidence engine that distinguishes between detection confidence and risk confidence, classifying risk stability as transient, recurring, structural, or accepted. Risk recalculation occurs automatically when exposure state changes are detected, such as newly exposed services or remediated vulnerabilities. The AI explainability module provides traceable reasoning artifacts and root-cause statements, ensuring outputs are audit-ready with full decision provenance.\n\nNOVA DRIM translates technical findings into business consequences by estimating financial loss, regulatory penalty exposure, operational disruption levels, and reputational damage, weighted by asset criticality and data sensitivity. It maintains visibility across cloud, on-premises, and SaaS environments while monitoring credential leakage, application misconfigurations, and vendor security risks within a unified framework. The system achieves high platform uptime and delivers initial insights quickly. Board-level stakeholders receive explainable risk narratives and executive dashboard alerts triggered by risk delta thresholds, enabling data-driven decisions with complete traceability and stakeholder-ready documentation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/73eb26e4-adae-407a-9297-6f64928d99d7.jpg","url":"https://www.softwareadvice.co.nz/software/539099/NOVA-DRIM","@type":"ListItem"},{"name":"Siberson Verifim File Integrity Monitoring","position":7,"description":"Siberson Verifim File Integrity Monitoring is a security tool designed to track changes to critical files and systems. It detects unauthorized modifications and provides real-time visibility into potential security risks. The platform is intended for organizations that require strict security controls and need to meet regulatory compliance standards across their IT environments. It helps identify early-stage cyberattacks, assess configuration vulnerabilities, and maintain system integrity.\n\nThe software offers real-time change detection, continuously monitoring files and systems to identify both authorized and unauthorized modifications. It includes policy management features that support a wide range of platforms, security policies, and compliance standards. Automated remediation options and customizable configurations are also available. Integrity management is supported through scanning capabilities that detect threats, reduce configuration drift, and identify unauthorized changes across diverse environments. It can be deployed on platforms such as Windows, Linux, Ubuntu, MacOS, cloud environments, and SaaS platforms, with options for agent-based or agentless configuration assessments.\n\nThe platform supports compliance with security standards such as ISO 27001, PCI/DSS, SOX, FISMA, FDCC, NERC, HIPAA, GLBA, and CIS through continuous monitoring and detailed reporting. Features include content analysis, automated alerts, and reporting tools that provide actionable insights for security teams. Additional functionalities include uninstall protection, CPU usage controls, automatic updates, and support for integration with other security systems.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/679220b7-cb86-4836-9a16-00851387fcf6.jpeg","url":"https://www.softwareadvice.co.nz/software/543214/Siberson-Verifim-File-Integrity-Monitoring","@type":"ListItem"}],"numberOfItems":7}
</script>
